Results

By type

          2022-08-24 03:14:53,724 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-08-24 03:14:54,663 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-08-24 03:14:55.390  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Aug 24, 2022 3:14:57 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Aug 24, 2022 3:14:57 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Aug 24, 2022 3:14:57 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Aug 24, 2022 3:14:57 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-08-24 03:14:57.769 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-08-24 03:14:58.073  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-08-24 03:14:58.222  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-08-24 03:14:58.879 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-08-24 03:14:58.881 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
2022-08-24 03:14:58.883 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-08-24 03:14:58.886 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-08-24 03:14:58.927 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
2022-08-24 03:14:58.931 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
	{GET [/docs]}: redirectToUi(HttpServletRequest)
2022-08-24 03:14:59.058 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-08-24 03:14:59.578 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Aug 24, 2022 3:15:00 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-08-24 03:15:00.477  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 7.453 seconds (JVM running for 9.147)
Aug 24, 2022 3:15:25 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-08-24 03:15:37.983  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-08-24 03:15:37.991 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-08-24 03:15:38.026 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-08-24 03:15:38.029 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-08-24 03:15:38.044  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-08-24 03:15:38.047  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-08-24 03:15:38.048  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-08-24 03:15:38.049 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-08-24 03:15:38.049 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-24 03:15:38.053 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-08-24 03:15:38.059 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-08-24 03:15:38.062 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-08-24 03:15:38.096 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-08-24 03:15:38.100 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-24 03:15:38.100 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-24 03:15:38.104 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-24 03:15:38.844  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-08-24 03:15:38.846  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-08-24 03:15:38.846 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-08-24 03:15:38.848 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-24 03:15:38.857  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-08-24 03:15:38.858  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-08-24 03:15:38.858 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-24 03:15:38.859 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-24 03:15:38.859 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-24 03:15:38.870 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-24 03:15:38.870 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-24 03:15:38.870 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-24 03:15:38.876 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-24 03:15:38.876 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-24 03:15:38.876 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-24 03:15:38.878 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-08-24 03:15:38.905 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 603730491443846387820755039906205363827037642795
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Aug 24 03:08:59 UTC 2022
           Final Date: Mon Aug 23 03:08:58 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [fc:9d:21:f3:ec:c4:5c:ea:68:96:03:0c:a7:ef:a8:38:92:2d:e8:49]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: dcd9902a583f99c2e9170fd1110f6323b91771ab
                       647490af28f4e701c331c0c75afc7670404cfc5d
                       331eb6abb7dc1f52877f54e30c390ecb1fb55f7c
                       2c29f2247ac505e4f46dceca746039b975ccd0aa
                       2a2546eb20eefba04ec5b3c48852376de677cc33
                       fd4cb198dc525b75a305801ee7aee7cf8bb3be34
                       85b796ee0a8fd5f8ad5a901cf123cf97652c76a4
                       8a83ee714bd22f86e6b81f90dd06c722ffa44674
                       44a07325142154552a04fa461fad89b58b28c5cb
                       bff66e7fa33dc3117b64e2813b0ae93c02197d19
                       1be619d42d2f4c7c04dad4a194aead8a19fbd51b
                       f7dadf41c3680444773cc90f203fbf7e34a38543
                       e25937c965cd2bbf13c3b4f24d7c28f1b5677ed0
                       091b69292611e5a58a7ed6c907c867fed7575138
                       949abf7f1747f4d0005a59c9d0b1b53ad442c6af
                       439a81866abc6f1ce45d47a851637a8ee8bb1d98
                       6ec09d86da9da62355c61dd84e396c478e28465e
                       e27fdcc055428d3f1ed3d2a56fc3324c2f1a50d1
                       68a20cb1616d01d259d3b37c83e0aaf26064fd3c
                       d850ca12
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [9c:fd:32:20:c5:0d:91:45:fc:dc:9b:56:03:ab:50:fc:7f:65:ab:35]
            modulus: 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
    public exponent: 10001

] 
2022-08-24 04:10:52.656  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-08-24 04:10:52.658 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-08-24 04:10:52.660 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-08-24 04:10:52.661 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-08-24 04:10:52.662  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-08-24 04:10:52.663  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-08-24 04:10:52.663  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-08-24 04:10:52.664 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-08-24 04:10:52.664 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-08-24 04:10:52.665 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-08-24 04:10:52.677 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-08-24 04:10:52.678 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-24 04:10:52.678 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-24 04:10:52.679 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-24 04:10:53.141  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-08-24 04:10:53.143  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-08-24 04:10:53.143 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-08-24 04:10:53.144 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-24 04:10:53.146  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-08-24 04:10:53.147  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-08-24 04:10:53.148 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-24 04:10:53.148 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-24 04:10:53.149 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-24 04:10:53.150 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-24 04:10:53.150 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-24 04:10:53.151 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-24 04:10:53.152 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-24 04:10:53.152 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-24 04:10:53.153 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-24 04:10:53.154 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-08-24 04:10:53.159 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 603730491443846387820755039906205363827037642795
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Aug 24 03:08:59 UTC 2022
           Final Date: Mon Aug 23 03:08:58 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [fc:9d:21:f3:ec:c4:5c:ea:68:96:03:0c:a7:ef:a8:38:92:2d:e8:49]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: dcd9902a583f99c2e9170fd1110f6323b91771ab
                       647490af28f4e701c331c0c75afc7670404cfc5d
                       331eb6abb7dc1f52877f54e30c390ecb1fb55f7c
                       2c29f2247ac505e4f46dceca746039b975ccd0aa
                       2a2546eb20eefba04ec5b3c48852376de677cc33
                       fd4cb198dc525b75a305801ee7aee7cf8bb3be34
                       85b796ee0a8fd5f8ad5a901cf123cf97652c76a4
                       8a83ee714bd22f86e6b81f90dd06c722ffa44674
                       44a07325142154552a04fa461fad89b58b28c5cb
                       bff66e7fa33dc3117b64e2813b0ae93c02197d19
                       1be619d42d2f4c7c04dad4a194aead8a19fbd51b
                       f7dadf41c3680444773cc90f203fbf7e34a38543
                       e25937c965cd2bbf13c3b4f24d7c28f1b5677ed0
                       091b69292611e5a58a7ed6c907c867fed7575138
                       949abf7f1747f4d0005a59c9d0b1b53ad442c6af
                       439a81866abc6f1ce45d47a851637a8ee8bb1d98
                       6ec09d86da9da62355c61dd84e396c478e28465e
                       e27fdcc055428d3f1ed3d2a56fc3324c2f1a50d1
                       68a20cb1616d01d259d3b37c83e0aaf26064fd3c
                       d850ca12
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [dc:1b:a5:81:47:54:cb:47:81:86:6b:45:50:67:03:ef:f9:c7:46:ed]
            modulus: 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
    public exponent: 10001

] 
2022-08-24 04:12:52.760  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-08-24 04:12:52.761 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-08-24 04:12:52.763 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-08-24 04:12:52.764 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-08-24 04:12:52.764  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-08-24 04:12:52.765  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-08-24 04:12:52.766  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-08-24 04:12:52.766 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-08-24 04:12:52.767 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-08-24 04:12:52.768 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-08-24 04:12:52.779 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-08-24 04:12:52.780 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-24 04:12:52.781 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-24 04:12:52.781 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-24 04:12:53.175  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-08-24 04:12:53.176  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-08-24 04:12:53.176 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-08-24 04:12:53.176 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-24 04:12:53.178  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-08-24 04:12:53.179  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-08-24 04:12:53.179 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-24 04:12:53.179 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-24 04:12:53.180 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-24 04:12:53.181 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-24 04:12:53.181 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-24 04:12:53.181 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-24 04:12:53.182 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-24 04:12:53.182 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-24 04:12:53.183 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-24 04:12:53.184 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-08-24 04:12:53.187 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 603730491443846387820755039906205363827037642795
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Aug 24 03:08:59 UTC 2022
           Final Date: Mon Aug 23 03:08:58 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [fc:9d:21:f3:ec:c4:5c:ea:68:96:03:0c:a7:ef:a8:38:92:2d:e8:49]
            modulus: f256bdef73d64f1508a3290c38a711c135f3e2eb254c5a47cbb0e50ec93b08102900ac9622275e46c5eba7d5c34c46f5042c79cdc030f24acb8ee3de9837c7d206d51662bbaec7a2e657c9af4ca34ed5f8b68ec14b748c0176f10e19e660d9827feb990bc422dc6ea6b1f86482eed375c077662c57e1f266e71d3c9d4c2879421972a1d98a0e032e00e6c8de0af7d93919ec8a793100e4aa864226208aa76287d8e370264f72a4172b5652403125e9daa0ae3cc9193ce2175d38802f3b9e278041e004eafc4b30e314c8deb7b361d42fbfca944c74aeacf6d0b6eae5f53ec9579b94d5d9fdb89d5570d473a1db69d3f4e1de15055867df9c0c689ddcd5577d72ca6dfbf1f1eaf79e6c24e98841263dbb220bc755f76c7da3f84fa63714edf80485ef8fad747090e167c2c97047b3b6d4a10e2bc973abaf09dd092c9f22fb9388ed081a49af198db412771bb6a45e226236a1c1830b12f90854e3fb3e82e3ff69fab14c1d954fe03871284b05598cc0616b41a71558fac675138f0a7bd575aa0f
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: dcd9902a583f99c2e9170fd1110f6323b91771ab
                       647490af28f4e701c331c0c75afc7670404cfc5d
                       331eb6abb7dc1f52877f54e30c390ecb1fb55f7c
                       2c29f2247ac505e4f46dceca746039b975ccd0aa
                       2a2546eb20eefba04ec5b3c48852376de677cc33
                       fd4cb198dc525b75a305801ee7aee7cf8bb3be34
                       85b796ee0a8fd5f8ad5a901cf123cf97652c76a4
                       8a83ee714bd22f86e6b81f90dd06c722ffa44674
                       44a07325142154552a04fa461fad89b58b28c5cb
                       bff66e7fa33dc3117b64e2813b0ae93c02197d19
                       1be619d42d2f4c7c04dad4a194aead8a19fbd51b
                       f7dadf41c3680444773cc90f203fbf7e34a38543
                       e25937c965cd2bbf13c3b4f24d7c28f1b5677ed0
                       091b69292611e5a58a7ed6c907c867fed7575138
                       949abf7f1747f4d0005a59c9d0b1b53ad442c6af
                       439a81866abc6f1ce45d47a851637a8ee8bb1d98
                       6ec09d86da9da62355c61dd84e396c478e28465e
                       e27fdcc055428d3f1ed3d2a56fc3324c2f1a50d1
                       68a20cb1616d01d259d3b37c83e0aaf26064fd3c
                       d850ca12
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [43:c2:9b:16:f1:1a:80:98:fc:42:d9:5f:fc:64:33:95:c3:1d:fd:a8]
            modulus: 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
    public exponent: 10001

] 
2022-08-24 04:13:56.533  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-08-24 04:13:56.534 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-08-24 04:13:56.535 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-08-24 04:13:56.536 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-08-24 04:13:56.536  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-08-24 04:13:56.537  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-08-24 04:13:56.538  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-08-24 04:13:56.538 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-08-24 04:13:56.538 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-08-24 04:13:56.539 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-08-24 04:13:56.543 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-08-24 04:13:56.543 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-24 04:13:56.544 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-24 04:13:56.544 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-24 04:13:56.902  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-08-24 04:13:56.903  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-08-24 04:13:56.903 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-08-24 04:13:56.904 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-24 04:13:56.905  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-08-24 04:13:56.906  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-08-24 04:13:56.906 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-24 04:13:56.907 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-24 04:13:56.907 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-24 04:13:56.908 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-24 04:13:56.908 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-24 04:13:56.909 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-24 04:13:56.909 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-24 04:13:56.910 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-24 04:13:56.910 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-24 04:13:56.911 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-08-24 04:13:56.914 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 603730491443846387820755039906205363827037642795
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Aug 24 03:08:59 UTC 2022
           Final Date: Mon Aug 23 03:08:58 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [fc:9d:21:f3:ec:c4:5c:ea:68:96:03:0c:a7:ef:a8:38:92:2d:e8:49]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: dcd9902a583f99c2e9170fd1110f6323b91771ab
                       647490af28f4e701c331c0c75afc7670404cfc5d
                       331eb6abb7dc1f52877f54e30c390ecb1fb55f7c
                       2c29f2247ac505e4f46dceca746039b975ccd0aa
                       2a2546eb20eefba04ec5b3c48852376de677cc33
                       fd4cb198dc525b75a305801ee7aee7cf8bb3be34
                       85b796ee0a8fd5f8ad5a901cf123cf97652c76a4
                       8a83ee714bd22f86e6b81f90dd06c722ffa44674
                       44a07325142154552a04fa461fad89b58b28c5cb
                       bff66e7fa33dc3117b64e2813b0ae93c02197d19
                       1be619d42d2f4c7c04dad4a194aead8a19fbd51b
                       f7dadf41c3680444773cc90f203fbf7e34a38543
                       e25937c965cd2bbf13c3b4f24d7c28f1b5677ed0
                       091b69292611e5a58a7ed6c907c867fed7575138
                       949abf7f1747f4d0005a59c9d0b1b53ad442c6af
                       439a81866abc6f1ce45d47a851637a8ee8bb1d98
                       6ec09d86da9da62355c61dd84e396c478e28465e
                       e27fdcc055428d3f1ed3d2a56fc3324c2f1a50d1
                       68a20cb1616d01d259d3b37c83e0aaf26064fd3c
                       d850ca12
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [77:e0:92:e0:4c:0e:d4:6d:58:a3:a9:9e:49:86:0e:41:85:59:f2:b8]
            modulus: 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
    public exponent: 10001

] 
2022-08-24 04:15:55.736  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-08-24 04:15:55.738 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-08-24 04:15:55.741 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-08-24 04:15:55.742 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-08-24 04:15:55.742  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-08-24 04:15:55.744  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-08-24 04:15:55.744  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-08-24 04:15:55.745 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-08-24 04:15:55.745 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-08-24 04:15:55.746 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-08-24 04:15:55.751 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-08-24 04:15:55.752 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-24 04:15:55.753 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-24 04:15:55.753 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-24 04:15:56.033  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-08-24 04:15:56.034  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-08-24 04:15:56.034 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-08-24 04:15:56.034 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-24 04:15:56.036  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-08-24 04:15:56.037  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-08-24 04:15:56.037 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-24 04:15:56.038 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-24 04:15:56.038 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-24 04:15:56.039 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-24 04:15:56.040 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-24 04:15:56.040 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-24 04:15:56.041 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-24 04:15:56.041 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-24 04:15:56.042 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-24 04:15:56.044 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-08-24 04:15:56.048 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 603730491443846387820755039906205363827037642795
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Aug 24 03:08:59 UTC 2022
           Final Date: Mon Aug 23 03:08:58 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [fc:9d:21:f3:ec:c4:5c:ea:68:96:03:0c:a7:ef:a8:38:92:2d:e8:49]
            modulus: f256bdef73d64f1508a3290c38a711c135f3e2eb254c5a47cbb0e50ec93b08102900ac9622275e46c5eba7d5c34c46f5042c79cdc030f24acb8ee3de9837c7d206d51662bbaec7a2e657c9af4ca34ed5f8b68ec14b748c0176f10e19e660d9827feb990bc422dc6ea6b1f86482eed375c077662c57e1f266e71d3c9d4c2879421972a1d98a0e032e00e6c8de0af7d93919ec8a793100e4aa864226208aa76287d8e370264f72a4172b5652403125e9daa0ae3cc9193ce2175d38802f3b9e278041e004eafc4b30e314c8deb7b361d42fbfca944c74aeacf6d0b6eae5f53ec9579b94d5d9fdb89d5570d473a1db69d3f4e1de15055867df9c0c689ddcd5577d72ca6dfbf1f1eaf79e6c24e98841263dbb220bc755f76c7da3f84fa63714edf80485ef8fad747090e167c2c97047b3b6d4a10e2bc973abaf09dd092c9f22fb9388ed081a49af198db412771bb6a45e226236a1c1830b12f90854e3fb3e82e3ff69fab14c1d954fe03871284b05598cc0616b41a71558fac675138f0a7bd575aa0f
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: dcd9902a583f99c2e9170fd1110f6323b91771ab
                       647490af28f4e701c331c0c75afc7670404cfc5d
                       331eb6abb7dc1f52877f54e30c390ecb1fb55f7c
                       2c29f2247ac505e4f46dceca746039b975ccd0aa
                       2a2546eb20eefba04ec5b3c48852376de677cc33
                       fd4cb198dc525b75a305801ee7aee7cf8bb3be34
                       85b796ee0a8fd5f8ad5a901cf123cf97652c76a4
                       8a83ee714bd22f86e6b81f90dd06c722ffa44674
                       44a07325142154552a04fa461fad89b58b28c5cb
                       bff66e7fa33dc3117b64e2813b0ae93c02197d19
                       1be619d42d2f4c7c04dad4a194aead8a19fbd51b
                       f7dadf41c3680444773cc90f203fbf7e34a38543
                       e25937c965cd2bbf13c3b4f24d7c28f1b5677ed0
                       091b69292611e5a58a7ed6c907c867fed7575138
                       949abf7f1747f4d0005a59c9d0b1b53ad442c6af
                       439a81866abc6f1ce45d47a851637a8ee8bb1d98
                       6ec09d86da9da62355c61dd84e396c478e28465e
                       e27fdcc055428d3f1ed3d2a56fc3324c2f1a50d1
                       68a20cb1616d01d259d3b37c83e0aaf26064fd3c
                       d850ca12
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [cc:9d:6a:58:3b:2f:62:2b:e8:cf:3c:aa:5a:5b:ab:74:56:a6:92:47]
            modulus: d592406c8eb9d9dbc2d819d9b3b77de152687b89b05543079536ad0d40d1df20ee73b8131a383168ec722b4bd8215f2073430b1b7f474f7cbbe1370571dcd5caa0c3f6da854cbe7fbebddcce41f64e50f5fab903cac5938be91a2573bb030bd5c6549decc2a64829c27e05a3da9d65f053970d9e39fb66d544c72a25bb8848235dddb33b5560005b6af8de54eb736abe3cace162fb0a2231949cc2316848f36d8c979238ddea5f30b9e5b05e35b96b7f0703531d5856fa6ac214362e77375984bc916cfb06f9229345ef269e177156d9d7986ed65f22d7a9179553192cc8aa1056d9d105d0005966b7df5a8fc1eaf96c3b8ef4055380328c13c9bcaf2052b9b1
    public exponent: 10001

] 
2022-08-24 04:19:25.341  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-08-24 04:19:25.342 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-08-24 04:19:25.344 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-08-24 04:19:25.344 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-08-24 04:19:25.345  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-08-24 04:19:25.345  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-08-24 04:19:25.346  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-08-24 04:19:25.346 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-08-24 04:19:25.346 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-08-24 04:19:25.347 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-08-24 04:19:25.352 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-08-24 04:19:25.353 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-24 04:19:25.353 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-24 04:19:25.353 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-24 04:19:25.562  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-08-24 04:19:25.563  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-08-24 04:19:25.563 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-08-24 04:19:25.563 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-24 04:19:25.565  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-08-24 04:19:25.565  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-08-24 04:19:25.565 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-24 04:19:25.566 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-24 04:19:25.566 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-24 04:19:25.567 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-24 04:19:25.567 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-24 04:19:25.567 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-24 04:19:25.568 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-24 04:19:25.568 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-24 04:19:25.568 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-24 04:19:25.569 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-08-24 04:19:25.573 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 603730491443846387820755039906205363827037642795
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Aug 24 03:08:59 UTC 2022
           Final Date: Mon Aug 23 03:08:58 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [fc:9d:21:f3:ec:c4:5c:ea:68:96:03:0c:a7:ef:a8:38:92:2d:e8:49]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: dcd9902a583f99c2e9170fd1110f6323b91771ab
                       647490af28f4e701c331c0c75afc7670404cfc5d
                       331eb6abb7dc1f52877f54e30c390ecb1fb55f7c
                       2c29f2247ac505e4f46dceca746039b975ccd0aa
                       2a2546eb20eefba04ec5b3c48852376de677cc33
                       fd4cb198dc525b75a305801ee7aee7cf8bb3be34
                       85b796ee0a8fd5f8ad5a901cf123cf97652c76a4
                       8a83ee714bd22f86e6b81f90dd06c722ffa44674
                       44a07325142154552a04fa461fad89b58b28c5cb
                       bff66e7fa33dc3117b64e2813b0ae93c02197d19
                       1be619d42d2f4c7c04dad4a194aead8a19fbd51b
                       f7dadf41c3680444773cc90f203fbf7e34a38543
                       e25937c965cd2bbf13c3b4f24d7c28f1b5677ed0
                       091b69292611e5a58a7ed6c907c867fed7575138
                       949abf7f1747f4d0005a59c9d0b1b53ad442c6af
                       439a81866abc6f1ce45d47a851637a8ee8bb1d98
                       6ec09d86da9da62355c61dd84e396c478e28465e
                       e27fdcc055428d3f1ed3d2a56fc3324c2f1a50d1
                       68a20cb1616d01d259d3b37c83e0aaf26064fd3c
                       d850ca12
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [47:a1:0f:97:77:06:fb:cd:ab:23:80:30:f3:67:ec:02:66:4d:74:28]
            modulus: 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
    public exponent: 10001

] 
2022-08-24 04:22:42.207  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-08-24 04:22:42.209 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-08-24 04:22:42.211 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-08-24 04:22:42.212 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-08-24 04:22:42.213  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-08-24 04:22:42.213  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-08-24 04:22:42.214  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-08-24 04:22:42.214 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-08-24 04:22:42.214 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-08-24 04:22:42.215 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-08-24 04:22:42.220 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-08-24 04:22:42.221 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-24 04:22:42.221 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-24 04:22:42.221 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-24 04:22:42.920  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-08-24 04:22:42.921  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-08-24 04:22:42.921 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-08-24 04:22:42.921 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-24 04:22:42.923  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-08-24 04:22:42.923  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-08-24 04:22:42.923 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-24 04:22:42.924 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-24 04:22:42.924 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-24 04:22:42.925 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-24 04:22:42.925 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-24 04:22:42.925 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-24 04:22:42.926 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-24 04:22:42.926 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-24 04:22:42.927 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-24 04:22:42.927 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-08-24 04:22:42.931 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 603730491443846387820755039906205363827037642795
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Aug 24 03:08:59 UTC 2022
           Final Date: Mon Aug 23 03:08:58 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [fc:9d:21:f3:ec:c4:5c:ea:68:96:03:0c:a7:ef:a8:38:92:2d:e8:49]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: dcd9902a583f99c2e9170fd1110f6323b91771ab
                       647490af28f4e701c331c0c75afc7670404cfc5d
                       331eb6abb7dc1f52877f54e30c390ecb1fb55f7c
                       2c29f2247ac505e4f46dceca746039b975ccd0aa
                       2a2546eb20eefba04ec5b3c48852376de677cc33
                       fd4cb198dc525b75a305801ee7aee7cf8bb3be34
                       85b796ee0a8fd5f8ad5a901cf123cf97652c76a4
                       8a83ee714bd22f86e6b81f90dd06c722ffa44674
                       44a07325142154552a04fa461fad89b58b28c5cb
                       bff66e7fa33dc3117b64e2813b0ae93c02197d19
                       1be619d42d2f4c7c04dad4a194aead8a19fbd51b
                       f7dadf41c3680444773cc90f203fbf7e34a38543
                       e25937c965cd2bbf13c3b4f24d7c28f1b5677ed0
                       091b69292611e5a58a7ed6c907c867fed7575138
                       949abf7f1747f4d0005a59c9d0b1b53ad442c6af
                       439a81866abc6f1ce45d47a851637a8ee8bb1d98
                       6ec09d86da9da62355c61dd84e396c478e28465e
                       e27fdcc055428d3f1ed3d2a56fc3324c2f1a50d1
                       68a20cb1616d01d259d3b37c83e0aaf26064fd3c
                       d850ca12
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [22:e7:10:ea:cc:0b:ea:08:b1:8f:55:7e:18:4e:96:05:51:14:39:9f]
            modulus: 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
    public exponent: 10001

] 
2022-08-24 04:26:33.519  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-08-24 04:26:33.521 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-08-24 04:26:33.523 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-08-24 04:26:33.524 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-08-24 04:26:33.525  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-08-24 04:26:33.526  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-08-24 04:26:33.526  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-08-24 04:26:33.526 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-08-24 04:26:33.527 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-08-24 04:26:33.528 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-08-24 04:26:33.533 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-08-24 04:26:33.534 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-24 04:26:33.534 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-24 04:26:33.535 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-24 04:26:34.020  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-08-24 04:26:34.020  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-08-24 04:26:34.021 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-08-24 04:26:34.021 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-24 04:26:34.023  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-08-24 04:26:34.023  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-08-24 04:26:34.024 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-24 04:26:34.025 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-24 04:26:34.025 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-24 04:26:34.026 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-24 04:26:34.027 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-24 04:26:34.027 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-24 04:26:34.028 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-24 04:26:34.029 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-24 04:26:34.029 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-24 04:26:34.030 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-08-24 04:26:34.034 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 603730491443846387820755039906205363827037642795
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Aug 24 03:08:59 UTC 2022
           Final Date: Mon Aug 23 03:08:58 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [fc:9d:21:f3:ec:c4:5c:ea:68:96:03:0c:a7:ef:a8:38:92:2d:e8:49]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: dcd9902a583f99c2e9170fd1110f6323b91771ab
                       647490af28f4e701c331c0c75afc7670404cfc5d
                       331eb6abb7dc1f52877f54e30c390ecb1fb55f7c
                       2c29f2247ac505e4f46dceca746039b975ccd0aa
                       2a2546eb20eefba04ec5b3c48852376de677cc33
                       fd4cb198dc525b75a305801ee7aee7cf8bb3be34
                       85b796ee0a8fd5f8ad5a901cf123cf97652c76a4
                       8a83ee714bd22f86e6b81f90dd06c722ffa44674
                       44a07325142154552a04fa461fad89b58b28c5cb
                       bff66e7fa33dc3117b64e2813b0ae93c02197d19
                       1be619d42d2f4c7c04dad4a194aead8a19fbd51b
                       f7dadf41c3680444773cc90f203fbf7e34a38543
                       e25937c965cd2bbf13c3b4f24d7c28f1b5677ed0
                       091b69292611e5a58a7ed6c907c867fed7575138
                       949abf7f1747f4d0005a59c9d0b1b53ad442c6af
                       439a81866abc6f1ce45d47a851637a8ee8bb1d98
                       6ec09d86da9da62355c61dd84e396c478e28465e
                       e27fdcc055428d3f1ed3d2a56fc3324c2f1a50d1
                       68a20cb1616d01d259d3b37c83e0aaf26064fd3c
                       d850ca12
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [26:72:19:3f:e6:f1:22:8d:94:7d:fb:1d:c5:47:ee:c9:1d:8d:23:96]
            modulus: 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
    public exponent: 10001

] 
2022-08-24 04:28:05.762  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-08-24 04:28:05.765 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-08-24 04:28:05.768 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-08-24 04:28:05.769 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-08-24 04:28:05.769  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-08-24 04:28:05.772  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-08-24 04:28:05.772  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-08-24 04:28:05.773 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-08-24 04:28:05.773 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-08-24 04:28:05.773 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-08-24 04:28:05.778 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-08-24 04:28:05.779 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-24 04:28:05.779 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-24 04:28:05.779 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-24 04:28:06.067  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-08-24 04:28:06.067  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-08-24 04:28:06.068 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-08-24 04:28:06.068 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-24 04:28:06.069  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-08-24 04:28:06.070  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-08-24 04:28:06.070 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-24 04:28:06.070 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-24 04:28:06.071 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-24 04:28:06.072 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-24 04:28:06.072 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-24 04:28:06.072 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-24 04:28:06.073 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-24 04:28:06.073 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-24 04:28:06.073 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-24 04:28:06.074 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-08-24 04:28:06.078 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 603730491443846387820755039906205363827037642795
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Aug 24 03:08:59 UTC 2022
           Final Date: Mon Aug 23 03:08:58 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [fc:9d:21:f3:ec:c4:5c:ea:68:96:03:0c:a7:ef:a8:38:92:2d:e8:49]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: dcd9902a583f99c2e9170fd1110f6323b91771ab
                       647490af28f4e701c331c0c75afc7670404cfc5d
                       331eb6abb7dc1f52877f54e30c390ecb1fb55f7c
                       2c29f2247ac505e4f46dceca746039b975ccd0aa
                       2a2546eb20eefba04ec5b3c48852376de677cc33
                       fd4cb198dc525b75a305801ee7aee7cf8bb3be34
                       85b796ee0a8fd5f8ad5a901cf123cf97652c76a4
                       8a83ee714bd22f86e6b81f90dd06c722ffa44674
                       44a07325142154552a04fa461fad89b58b28c5cb
                       bff66e7fa33dc3117b64e2813b0ae93c02197d19
                       1be619d42d2f4c7c04dad4a194aead8a19fbd51b
                       f7dadf41c3680444773cc90f203fbf7e34a38543
                       e25937c965cd2bbf13c3b4f24d7c28f1b5677ed0
                       091b69292611e5a58a7ed6c907c867fed7575138
                       949abf7f1747f4d0005a59c9d0b1b53ad442c6af
                       439a81866abc6f1ce45d47a851637a8ee8bb1d98
                       6ec09d86da9da62355c61dd84e396c478e28465e
                       e27fdcc055428d3f1ed3d2a56fc3324c2f1a50d1
                       68a20cb1616d01d259d3b37c83e0aaf26064fd3c
                       d850ca12
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [f8:b3:92:37:13:60:41:5e:35:59:2c:21:0c:ab:97:d8:01:64:0c:5f]
            modulus: bd4ff9eecc73542c5a24d35c420e37c2da65b0ae33feba77c7e49d3793a39141a84f2607003ab84f66080e0c85acbb238dd84ae7323b846b035a17046988cb9f9d363339b136dd47a9c49d5bc1f78397d7d188a3668879962f3069573582659495556509db43dae36ff1c88aa0661c6aacf8b4ee19d7afa716b74489dec990f7810415434e540e06c72b8935310478bd5c7e0143e11c24fb71e17502f4a00af6058b89492d26cf9d08e5765f20e8fa96e1e4dfe9d17cecc2be10f7a725211cd445eaa36e8a94b1d9ddfcb26f7c0ea69ce3bf402895d2c12112e958333ff9ce526e83fa1d7d7220201f36d460e5a2a7f7f5c3758c6b7f198180f4f5326cb2f49f
    public exponent: 10001

] 
2022-08-24 04:33:50.056  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-08-24 04:33:50.058 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-08-24 04:33:50.060 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-08-24 04:33:50.060 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-08-24 04:33:50.061  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-08-24 04:33:50.061  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-08-24 04:33:50.062  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-08-24 04:33:50.062 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-08-24 04:33:50.062 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-08-24 04:33:50.063 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-08-24 04:33:50.068 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-08-24 04:33:50.068 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-24 04:33:50.069 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-24 04:33:50.069 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-24 04:33:51.055  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-08-24 04:33:51.056  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-08-24 04:33:51.056 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-08-24 04:33:51.056 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-24 04:33:51.058  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-08-24 04:33:51.058  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-08-24 04:33:51.059 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-24 04:33:51.059 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-24 04:33:51.059 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-24 04:33:51.060 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-24 04:33:51.061 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-24 04:33:51.061 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-24 04:33:51.061 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-24 04:33:51.062 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-24 04:33:51.062 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-24 04:33:51.063 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-08-24 04:33:51.067 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 603730491443846387820755039906205363827037642795
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Aug 24 03:08:59 UTC 2022
           Final Date: Mon Aug 23 03:08:58 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [fc:9d:21:f3:ec:c4:5c:ea:68:96:03:0c:a7:ef:a8:38:92:2d:e8:49]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: dcd9902a583f99c2e9170fd1110f6323b91771ab
                       647490af28f4e701c331c0c75afc7670404cfc5d
                       331eb6abb7dc1f52877f54e30c390ecb1fb55f7c
                       2c29f2247ac505e4f46dceca746039b975ccd0aa
                       2a2546eb20eefba04ec5b3c48852376de677cc33
                       fd4cb198dc525b75a305801ee7aee7cf8bb3be34
                       85b796ee0a8fd5f8ad5a901cf123cf97652c76a4
                       8a83ee714bd22f86e6b81f90dd06c722ffa44674
                       44a07325142154552a04fa461fad89b58b28c5cb
                       bff66e7fa33dc3117b64e2813b0ae93c02197d19
                       1be619d42d2f4c7c04dad4a194aead8a19fbd51b
                       f7dadf41c3680444773cc90f203fbf7e34a38543
                       e25937c965cd2bbf13c3b4f24d7c28f1b5677ed0
                       091b69292611e5a58a7ed6c907c867fed7575138
                       949abf7f1747f4d0005a59c9d0b1b53ad442c6af
                       439a81866abc6f1ce45d47a851637a8ee8bb1d98
                       6ec09d86da9da62355c61dd84e396c478e28465e
                       e27fdcc055428d3f1ed3d2a56fc3324c2f1a50d1
                       68a20cb1616d01d259d3b37c83e0aaf26064fd3c
                       d850ca12
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [fb:93:38:db:eb:ac:f7:20:72:f9:7a:ec:e5:17:e9:61:15:4b:40:0a]
            modulus: c623850738b718b9954f6370c09bde6b40f8fe9f7035b8322759fe183bc9707ddc466b581e8f14e8d39170b565a5a91e648d405acefd92368055aafdf8677a6235ab51220cbae479df8121f1e6cfcfc5d4ac2a35cf80a8befbd064a1e850451073c186c3ac93d60c14ff856d5091c39eeaaf18ef05dbedabd9dac9664b657e0c3e165e9d1f128d43fcff0e38c4698d09e899e26976098f27216ea57475b98cdeb4402ebebb15838df730ff94927ef552a3aa10d2c619380a31cbc845c0d51b9b9083ca3f2911242cf50d43f2c0dd628b76e6fc6f6e8f8bd00c58f50f356b20d043837fd14ded40ea50251b6ada2e13246be81e696b44da0f1eeb02c294d112eb
    public exponent: 10001

] 
2022-08-24 04:34:07.077  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-08-24 04:34:07.077 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-08-24 04:34:07.079 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-08-24 04:34:07.079 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-08-24 04:34:07.079  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-08-24 04:34:07.080  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-08-24 04:34:07.081  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-08-24 04:34:07.081 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-08-24 04:34:07.081 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-08-24 04:34:07.082 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-08-24 04:34:07.087 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-08-24 04:34:07.087 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-24 04:34:07.088 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-24 04:34:07.088 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-24 04:34:07.274  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-08-24 04:34:07.275  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-08-24 04:34:07.275 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-08-24 04:34:07.275 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-24 04:34:07.276  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-08-24 04:34:07.277  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-08-24 04:34:07.277 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-24 04:34:07.277 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-24 04:34:07.277 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-24 04:34:07.278 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-24 04:34:07.278 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-24 04:34:07.278 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-24 04:34:07.279 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-24 04:34:07.279 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-24 04:34:07.279 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-24 04:34:07.280 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-08-24 04:34:07.283 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 603730491443846387820755039906205363827037642795
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Aug 24 03:08:59 UTC 2022
           Final Date: Mon Aug 23 03:08:58 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [fc:9d:21:f3:ec:c4:5c:ea:68:96:03:0c:a7:ef:a8:38:92:2d:e8:49]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: dcd9902a583f99c2e9170fd1110f6323b91771ab
                       647490af28f4e701c331c0c75afc7670404cfc5d
                       331eb6abb7dc1f52877f54e30c390ecb1fb55f7c
                       2c29f2247ac505e4f46dceca746039b975ccd0aa
                       2a2546eb20eefba04ec5b3c48852376de677cc33
                       fd4cb198dc525b75a305801ee7aee7cf8bb3be34
                       85b796ee0a8fd5f8ad5a901cf123cf97652c76a4
                       8a83ee714bd22f86e6b81f90dd06c722ffa44674
                       44a07325142154552a04fa461fad89b58b28c5cb
                       bff66e7fa33dc3117b64e2813b0ae93c02197d19
                       1be619d42d2f4c7c04dad4a194aead8a19fbd51b
                       f7dadf41c3680444773cc90f203fbf7e34a38543
                       e25937c965cd2bbf13c3b4f24d7c28f1b5677ed0
                       091b69292611e5a58a7ed6c907c867fed7575138
                       949abf7f1747f4d0005a59c9d0b1b53ad442c6af
                       439a81866abc6f1ce45d47a851637a8ee8bb1d98
                       6ec09d86da9da62355c61dd84e396c478e28465e
                       e27fdcc055428d3f1ed3d2a56fc3324c2f1a50d1
                       68a20cb1616d01d259d3b37c83e0aaf26064fd3c
                       d850ca12
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [23:bb:c0:7c:57:93:ec:8d:b2:d3:99:fd:9c:26:b3:b1:45:41:2c:39]
            modulus: 9ca1ce6505605adb0ba7d065037991449eaf9e688a097a7ae0460c8404cc46f38cebd212c2df640a07e0e37b7e08d585db5c1a0c7151627ee7ca1fadacbdceea8b31bf62d77cfd6c0b53eafde2e8f7ee165cbae952f7c43f10d755bcf5caf16563aed00cadb4883cb2102bf6decb8d98ca21e31208c35866f278ebc75c7f39672cf90587fc39e45e431eacdc7434746de330f27d629f99cca7efb012aab5c6b151a78505db55ee66d764479634416d450a56f4a87ee7f5d8856ca1478f5da925701568a853bbfec911550d9b815663fa0d6ba3376733c7de551530000d79a3ddbcd0d30fc4a677b5800b724241a5813d0410cd4deedc76cd5d9b9605a2c8224d
    public exponent: 10001

]