Results

By type

          2022-10-01 03:13:06,368 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-10-01 03:13:07,462 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-10-01 03:13:08.329  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Oct 01, 2022 3:13:10 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Oct 01, 2022 3:13:10 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Oct 01, 2022 3:13:10 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Oct 01, 2022 3:13:10 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-10-01 03:13:11.296 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-10-01 03:13:11.604  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-10-01 03:13:11.782  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-10-01 03:13:12.649 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-10-01 03:13:12.654 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
2022-10-01 03:13:12.656 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-10-01 03:13:12.663 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-10-01 03:13:12.706 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2022-10-01 03:13:12.710 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/docs]}: redirectToUi(HttpServletRequest)
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
2022-10-01 03:13:12.846 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-10-01 03:13:13.587 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Oct 01, 2022 3:13:14 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-10-01 03:13:14.577  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 9.164 seconds (JVM running for 11.198)
Oct 01, 2022 3:13:34 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-10-01 03:13:46.581  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-10-01 03:13:46.600 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-10-01 03:13:46.649 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-10-01 03:13:46.656 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-10-01 03:13:46.678  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-10-01 03:13:46.681  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-10-01 03:13:46.682  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-10-01 03:13:46.683 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-10-01 03:13:46.684 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-01 03:13:46.688 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-10-01 03:13:46.695 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-10-01 03:13:46.698 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-10-01 03:13:46.750 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-10-01 03:13:46.761 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-01 03:13:46.761 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-01 03:13:46.766 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-01 03:13:47.898  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-10-01 03:13:47.903  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-10-01 03:13:47.904 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-10-01 03:13:47.906 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-01 03:13:47.922  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-10-01 03:13:47.925  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-10-01 03:13:47.926 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-01 03:13:47.927 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-01 03:13:47.928 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-01 03:13:47.950 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-01 03:13:47.952 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-01 03:13:47.952 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-01 03:13:47.966 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-01 03:13:47.966 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-01 03:13:47.967 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-01 03:13:47.968 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-10-01 03:13:48.001 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 509261373272911816219633336970917197051442135296
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Oct 01 03:10:40 UTC 2022
           Final Date: Thu Sep 30 03:10:39 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [fc:36:05:e1:7b:70:96:58:37:ab:ef:66:a7:73:94:c1:1a:2c:55:dd]
            modulus: a28103bed223b4a64fdb6e140e51088bdb5888d2543e918050172bf1ca1f11abccacabdb458951708e29ce9545f584bf716e5a7fda6df402ee730a1b16a3430f2ad5551e59a108814560a9405dac53740d0519db0282890aabf271aee736dec8f7d37e1420ebec1bee73035751d086c3eac93f1384f0a4f088e42db4e1763eb71da141a8532ed128ba4cea6b1473027201da2d3be1858eed0bf813e7daaa7f6a3dd35d5174cce645f624a5a71bb586f40168229206e11af3ec332b21749194043b801aa29da64e9cb60f6fae71ac7ddc16b6559f9ae6469e1cac2deb469fec5f19716dd7ebd62a1d2c45ed38b29c46a910438e544ccd573cef48905b5fd34254c80e6068f5245bdeacbdc30e01c74a56c14d345bf8d2c79bd4e4be07cb3c44c7d06058db46b00f101ca1c7a4ff9d105f442fc6d9f999e457d57b164efe3e0a3247f4bb125757d89a6b15cad344eb64e93f4333803c4967af834eb5bad3ac9425ee2a00223763046fea1b70946c5f421200c0449edb4b94dc2f7f2f32cfe19a6f
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 6e082937a8bdefd540312e96827284cf6bdbc4b4
                       e7f4c76cd9ab2b33a90d22e5789e363e5c3f728e
                       fec35b86d3810ead31b5a4ba56e5fee13e27cd01
                       b62dc676713a4eef94ad9d8c12a5724c6c071a0f
                       adc263ac9b6322be0d5a9066019920a49503aabf
                       a4b5c070143d849b5d99e9bc84a57450fc6ae2ec
                       8d3e8973c79d2e24f3d2f967d664109633692fc0
                       177f6f656eeb182bf2c60407808a922de6354e93
                       eeb008c7b71e273ada4362c4ccff956733e53b0f
                       adc415ff786004b696c4b54282ac04c779a1a58f
                       11e7e3a8651e07aef489855316b1dc28a18b8c90
                       4b8ee83814de92fbcb5aa6e594b55fc73e1109ab
                       8678a47359c9cce97f120579e97d06a16542516b
                       5fdfa17286c617fa32f4ea226ffd18e60394362d
                       59c9402f9f641f74bcaba99198faf446ec7a0755
                       4f32fb6b7cdf9c10e219a7bb191b6739ddd34aec
                       f07722e9bf9d0ffa309730c341fa63c0e7747e28
                       b898a4674e0f83dbeeb33e65fb3f6d89b70872c2
                       2bf0de6622d8933bd3f6c38a54a96cd02af326aa
                       e1cd92d3
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [94:45:a8:5b:0c:8f:b7:98:f2:92:09:11:d9:c2:1f:63:81:6c:21:45]
            modulus: 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
    public exponent: 10001

] 
2022-10-01 04:26:25.766  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-10-01 04:26:25.769 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-10-01 04:26:25.773 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-10-01 04:26:25.786 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-10-01 04:26:25.788  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-10-01 04:26:25.790  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-10-01 04:26:25.791  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-10-01 04:26:25.792 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-10-01 04:26:25.794 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-10-01 04:26:25.796 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-10-01 04:26:25.829 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-10-01 04:26:25.833 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-01 04:26:25.836 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-01 04:26:25.837 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-01 04:26:26.077  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-10-01 04:26:26.081  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-10-01 04:26:26.081 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-10-01 04:26:26.083 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-01 04:26:26.091  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-10-01 04:26:26.093  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-10-01 04:26:26.094 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-01 04:26:26.095 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-01 04:26:26.096 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-01 04:26:26.098 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-01 04:26:26.098 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-01 04:26:26.099 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-01 04:26:26.101 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-01 04:26:26.102 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-01 04:26:26.103 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-01 04:26:26.106 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-10-01 04:26:26.117 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 509261373272911816219633336970917197051442135296
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Oct 01 03:10:40 UTC 2022
           Final Date: Thu Sep 30 03:10:39 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [fc:36:05:e1:7b:70:96:58:37:ab:ef:66:a7:73:94:c1:1a:2c:55:dd]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 6e082937a8bdefd540312e96827284cf6bdbc4b4
                       e7f4c76cd9ab2b33a90d22e5789e363e5c3f728e
                       fec35b86d3810ead31b5a4ba56e5fee13e27cd01
                       b62dc676713a4eef94ad9d8c12a5724c6c071a0f
                       adc263ac9b6322be0d5a9066019920a49503aabf
                       a4b5c070143d849b5d99e9bc84a57450fc6ae2ec
                       8d3e8973c79d2e24f3d2f967d664109633692fc0
                       177f6f656eeb182bf2c60407808a922de6354e93
                       eeb008c7b71e273ada4362c4ccff956733e53b0f
                       adc415ff786004b696c4b54282ac04c779a1a58f
                       11e7e3a8651e07aef489855316b1dc28a18b8c90
                       4b8ee83814de92fbcb5aa6e594b55fc73e1109ab
                       8678a47359c9cce97f120579e97d06a16542516b
                       5fdfa17286c617fa32f4ea226ffd18e60394362d
                       59c9402f9f641f74bcaba99198faf446ec7a0755
                       4f32fb6b7cdf9c10e219a7bb191b6739ddd34aec
                       f07722e9bf9d0ffa309730c341fa63c0e7747e28
                       b898a4674e0f83dbeeb33e65fb3f6d89b70872c2
                       2bf0de6622d8933bd3f6c38a54a96cd02af326aa
                       e1cd92d3
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [e9:67:9b:db:a4:f0:70:f3:12:d4:92:37:bf:0a:c0:c7:d6:cf:ad:ad]
            modulus: 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
    public exponent: 10001

] 
2022-10-01 04:28:14.126  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-10-01 04:28:14.127 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-10-01 04:28:14.129 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-10-01 04:28:14.130 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-10-01 04:28:14.131  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-10-01 04:28:14.131  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-10-01 04:28:14.132  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-10-01 04:28:14.132 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-10-01 04:28:14.132 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-10-01 04:28:14.134 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-10-01 04:28:14.156 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-10-01 04:28:14.157 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-01 04:28:14.157 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-01 04:28:14.157 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-01 04:28:14.296  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-10-01 04:28:14.296  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-10-01 04:28:14.297 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-10-01 04:28:14.297 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-01 04:28:14.300  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-10-01 04:28:14.301  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-10-01 04:28:14.301 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-01 04:28:14.301 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-01 04:28:14.302 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-01 04:28:14.303 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-01 04:28:14.303 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-01 04:28:14.304 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-01 04:28:14.304 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-01 04:28:14.305 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-01 04:28:14.305 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-01 04:28:14.306 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-10-01 04:28:14.310 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 509261373272911816219633336970917197051442135296
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Oct 01 03:10:40 UTC 2022
           Final Date: Thu Sep 30 03:10:39 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [fc:36:05:e1:7b:70:96:58:37:ab:ef:66:a7:73:94:c1:1a:2c:55:dd]
            modulus: a28103bed223b4a64fdb6e140e51088bdb5888d2543e918050172bf1ca1f11abccacabdb458951708e29ce9545f584bf716e5a7fda6df402ee730a1b16a3430f2ad5551e59a108814560a9405dac53740d0519db0282890aabf271aee736dec8f7d37e1420ebec1bee73035751d086c3eac93f1384f0a4f088e42db4e1763eb71da141a8532ed128ba4cea6b1473027201da2d3be1858eed0bf813e7daaa7f6a3dd35d5174cce645f624a5a71bb586f40168229206e11af3ec332b21749194043b801aa29da64e9cb60f6fae71ac7ddc16b6559f9ae6469e1cac2deb469fec5f19716dd7ebd62a1d2c45ed38b29c46a910438e544ccd573cef48905b5fd34254c80e6068f5245bdeacbdc30e01c74a56c14d345bf8d2c79bd4e4be07cb3c44c7d06058db46b00f101ca1c7a4ff9d105f442fc6d9f999e457d57b164efe3e0a3247f4bb125757d89a6b15cad344eb64e93f4333803c4967af834eb5bad3ac9425ee2a00223763046fea1b70946c5f421200c0449edb4b94dc2f7f2f32cfe19a6f
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 6e082937a8bdefd540312e96827284cf6bdbc4b4
                       e7f4c76cd9ab2b33a90d22e5789e363e5c3f728e
                       fec35b86d3810ead31b5a4ba56e5fee13e27cd01
                       b62dc676713a4eef94ad9d8c12a5724c6c071a0f
                       adc263ac9b6322be0d5a9066019920a49503aabf
                       a4b5c070143d849b5d99e9bc84a57450fc6ae2ec
                       8d3e8973c79d2e24f3d2f967d664109633692fc0
                       177f6f656eeb182bf2c60407808a922de6354e93
                       eeb008c7b71e273ada4362c4ccff956733e53b0f
                       adc415ff786004b696c4b54282ac04c779a1a58f
                       11e7e3a8651e07aef489855316b1dc28a18b8c90
                       4b8ee83814de92fbcb5aa6e594b55fc73e1109ab
                       8678a47359c9cce97f120579e97d06a16542516b
                       5fdfa17286c617fa32f4ea226ffd18e60394362d
                       59c9402f9f641f74bcaba99198faf446ec7a0755
                       4f32fb6b7cdf9c10e219a7bb191b6739ddd34aec
                       f07722e9bf9d0ffa309730c341fa63c0e7747e28
                       b898a4674e0f83dbeeb33e65fb3f6d89b70872c2
                       2bf0de6622d8933bd3f6c38a54a96cd02af326aa
                       e1cd92d3
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [fe:d1:17:92:04:78:10:d6:cd:24:fa:c9:a8:e6:0f:ac:cb:5d:dd:fc]
            modulus: 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
    public exponent: 10001

] 
2022-10-01 04:29:30.318  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-10-01 04:29:30.319 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-10-01 04:29:30.321 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-10-01 04:29:30.322 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-10-01 04:29:30.327  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-10-01 04:29:30.328  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-10-01 04:29:30.328  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-10-01 04:29:30.329 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-10-01 04:29:30.329 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-10-01 04:29:30.330 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-10-01 04:29:30.341 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-10-01 04:29:30.342 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-01 04:29:30.343 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-01 04:29:30.343 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-01 04:29:30.463  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-10-01 04:29:30.464  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-10-01 04:29:30.464 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-10-01 04:29:30.465 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-01 04:29:30.467  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-10-01 04:29:30.467  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-10-01 04:29:30.468 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-01 04:29:30.468 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-01 04:29:30.469 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-01 04:29:30.470 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-01 04:29:30.470 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-01 04:29:30.471 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-01 04:29:30.472 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-01 04:29:30.472 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-01 04:29:30.472 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-01 04:29:30.473 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-10-01 04:29:30.477 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 509261373272911816219633336970917197051442135296
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Oct 01 03:10:40 UTC 2022
           Final Date: Thu Sep 30 03:10:39 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [fc:36:05:e1:7b:70:96:58:37:ab:ef:66:a7:73:94:c1:1a:2c:55:dd]
            modulus: a28103bed223b4a64fdb6e140e51088bdb5888d2543e918050172bf1ca1f11abccacabdb458951708e29ce9545f584bf716e5a7fda6df402ee730a1b16a3430f2ad5551e59a108814560a9405dac53740d0519db0282890aabf271aee736dec8f7d37e1420ebec1bee73035751d086c3eac93f1384f0a4f088e42db4e1763eb71da141a8532ed128ba4cea6b1473027201da2d3be1858eed0bf813e7daaa7f6a3dd35d5174cce645f624a5a71bb586f40168229206e11af3ec332b21749194043b801aa29da64e9cb60f6fae71ac7ddc16b6559f9ae6469e1cac2deb469fec5f19716dd7ebd62a1d2c45ed38b29c46a910438e544ccd573cef48905b5fd34254c80e6068f5245bdeacbdc30e01c74a56c14d345bf8d2c79bd4e4be07cb3c44c7d06058db46b00f101ca1c7a4ff9d105f442fc6d9f999e457d57b164efe3e0a3247f4bb125757d89a6b15cad344eb64e93f4333803c4967af834eb5bad3ac9425ee2a00223763046fea1b70946c5f421200c0449edb4b94dc2f7f2f32cfe19a6f
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 6e082937a8bdefd540312e96827284cf6bdbc4b4
                       e7f4c76cd9ab2b33a90d22e5789e363e5c3f728e
                       fec35b86d3810ead31b5a4ba56e5fee13e27cd01
                       b62dc676713a4eef94ad9d8c12a5724c6c071a0f
                       adc263ac9b6322be0d5a9066019920a49503aabf
                       a4b5c070143d849b5d99e9bc84a57450fc6ae2ec
                       8d3e8973c79d2e24f3d2f967d664109633692fc0
                       177f6f656eeb182bf2c60407808a922de6354e93
                       eeb008c7b71e273ada4362c4ccff956733e53b0f
                       adc415ff786004b696c4b54282ac04c779a1a58f
                       11e7e3a8651e07aef489855316b1dc28a18b8c90
                       4b8ee83814de92fbcb5aa6e594b55fc73e1109ab
                       8678a47359c9cce97f120579e97d06a16542516b
                       5fdfa17286c617fa32f4ea226ffd18e60394362d
                       59c9402f9f641f74bcaba99198faf446ec7a0755
                       4f32fb6b7cdf9c10e219a7bb191b6739ddd34aec
                       f07722e9bf9d0ffa309730c341fa63c0e7747e28
                       b898a4674e0f83dbeeb33e65fb3f6d89b70872c2
                       2bf0de6622d8933bd3f6c38a54a96cd02af326aa
                       e1cd92d3
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [a4:6e:f7:d6:e6:38:5b:fb:4a:ca:81:83:5e:18:77:53:26:26:b3:5d]
            modulus: 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
    public exponent: 10001

] 
2022-10-01 04:31:20.878  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-10-01 04:31:20.880 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-10-01 04:31:20.882 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-10-01 04:31:20.884 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-10-01 04:31:20.885  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-10-01 04:31:20.887  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-10-01 04:31:20.887  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-10-01 04:31:20.888 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-10-01 04:31:20.888 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-10-01 04:31:20.889 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-10-01 04:31:20.894 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-10-01 04:31:20.895 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-01 04:31:20.896 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-01 04:31:20.896 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-01 04:31:21.067  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-10-01 04:31:21.067  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-10-01 04:31:21.069 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-10-01 04:31:21.069 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-01 04:31:21.073  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-10-01 04:31:21.075  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-10-01 04:31:21.077 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-01 04:31:21.077 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-01 04:31:21.078 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-01 04:31:21.079 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-01 04:31:21.079 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-01 04:31:21.083 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-01 04:31:21.084 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-01 04:31:21.085 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-01 04:31:21.085 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-01 04:31:21.086 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-10-01 04:31:21.091 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 509261373272911816219633336970917197051442135296
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Oct 01 03:10:40 UTC 2022
           Final Date: Thu Sep 30 03:10:39 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [fc:36:05:e1:7b:70:96:58:37:ab:ef:66:a7:73:94:c1:1a:2c:55:dd]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 6e082937a8bdefd540312e96827284cf6bdbc4b4
                       e7f4c76cd9ab2b33a90d22e5789e363e5c3f728e
                       fec35b86d3810ead31b5a4ba56e5fee13e27cd01
                       b62dc676713a4eef94ad9d8c12a5724c6c071a0f
                       adc263ac9b6322be0d5a9066019920a49503aabf
                       a4b5c070143d849b5d99e9bc84a57450fc6ae2ec
                       8d3e8973c79d2e24f3d2f967d664109633692fc0
                       177f6f656eeb182bf2c60407808a922de6354e93
                       eeb008c7b71e273ada4362c4ccff956733e53b0f
                       adc415ff786004b696c4b54282ac04c779a1a58f
                       11e7e3a8651e07aef489855316b1dc28a18b8c90
                       4b8ee83814de92fbcb5aa6e594b55fc73e1109ab
                       8678a47359c9cce97f120579e97d06a16542516b
                       5fdfa17286c617fa32f4ea226ffd18e60394362d
                       59c9402f9f641f74bcaba99198faf446ec7a0755
                       4f32fb6b7cdf9c10e219a7bb191b6739ddd34aec
                       f07722e9bf9d0ffa309730c341fa63c0e7747e28
                       b898a4674e0f83dbeeb33e65fb3f6d89b70872c2
                       2bf0de6622d8933bd3f6c38a54a96cd02af326aa
                       e1cd92d3
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [9b:73:09:48:14:84:1d:f5:e2:73:50:26:5e:8a:e5:dd:fc:56:da:2c]
            modulus: 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
    public exponent: 10001

] 
2022-10-01 04:40:20.128  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-10-01 04:40:20.130 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-10-01 04:40:20.131 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-10-01 04:40:20.132 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-10-01 04:40:20.133  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-10-01 04:40:20.133  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-10-01 04:40:20.133  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-10-01 04:40:20.134 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-10-01 04:40:20.134 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-10-01 04:40:20.134 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-10-01 04:40:20.143 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-10-01 04:40:20.144 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-01 04:40:20.145 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-01 04:40:20.145 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-01 04:40:20.314  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-10-01 04:40:20.315  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-10-01 04:40:20.316 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-10-01 04:40:20.316 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-01 04:40:20.318  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-10-01 04:40:20.319  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-10-01 04:40:20.319 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-01 04:40:20.319 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-01 04:40:20.320 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-01 04:40:20.320 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-01 04:40:20.321 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-01 04:40:20.321 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-01 04:40:20.321 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-01 04:40:20.322 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-01 04:40:20.322 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-01 04:40:20.323 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-10-01 04:40:20.327 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 509261373272911816219633336970917197051442135296
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Oct 01 03:10:40 UTC 2022
           Final Date: Thu Sep 30 03:10:39 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [fc:36:05:e1:7b:70:96:58:37:ab:ef:66:a7:73:94:c1:1a:2c:55:dd]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 6e082937a8bdefd540312e96827284cf6bdbc4b4
                       e7f4c76cd9ab2b33a90d22e5789e363e5c3f728e
                       fec35b86d3810ead31b5a4ba56e5fee13e27cd01
                       b62dc676713a4eef94ad9d8c12a5724c6c071a0f
                       adc263ac9b6322be0d5a9066019920a49503aabf
                       a4b5c070143d849b5d99e9bc84a57450fc6ae2ec
                       8d3e8973c79d2e24f3d2f967d664109633692fc0
                       177f6f656eeb182bf2c60407808a922de6354e93
                       eeb008c7b71e273ada4362c4ccff956733e53b0f
                       adc415ff786004b696c4b54282ac04c779a1a58f
                       11e7e3a8651e07aef489855316b1dc28a18b8c90
                       4b8ee83814de92fbcb5aa6e594b55fc73e1109ab
                       8678a47359c9cce97f120579e97d06a16542516b
                       5fdfa17286c617fa32f4ea226ffd18e60394362d
                       59c9402f9f641f74bcaba99198faf446ec7a0755
                       4f32fb6b7cdf9c10e219a7bb191b6739ddd34aec
                       f07722e9bf9d0ffa309730c341fa63c0e7747e28
                       b898a4674e0f83dbeeb33e65fb3f6d89b70872c2
                       2bf0de6622d8933bd3f6c38a54a96cd02af326aa
                       e1cd92d3
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [49:60:dc:cd:e1:ad:36:4e:d4:72:5e:21:7d:a0:e1:70:08:f7:78:e8]
            modulus: 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
    public exponent: 10001

] 
2022-10-01 04:45:37.299  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-10-01 04:45:37.301 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-10-01 04:45:37.303 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-10-01 04:45:37.304 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-10-01 04:45:37.305  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-10-01 04:45:37.305  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-10-01 04:45:37.306  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-10-01 04:45:37.306 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-10-01 04:45:37.307 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-10-01 04:45:37.307 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-10-01 04:45:37.312 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-10-01 04:45:37.313 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-01 04:45:37.314 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-01 04:45:37.314 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-01 04:45:37.470  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-10-01 04:45:37.471  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-10-01 04:45:37.471 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-10-01 04:45:37.472 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-01 04:45:37.474  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-10-01 04:45:37.474  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-10-01 04:45:37.475 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-01 04:45:37.475 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-01 04:45:37.476 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-01 04:45:37.477 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-01 04:45:37.477 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-01 04:45:37.478 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-01 04:45:37.479 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-01 04:45:37.479 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-01 04:45:37.480 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-01 04:45:37.481 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-10-01 04:45:37.486 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 509261373272911816219633336970917197051442135296
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Oct 01 03:10:40 UTC 2022
           Final Date: Thu Sep 30 03:10:39 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [fc:36:05:e1:7b:70:96:58:37:ab:ef:66:a7:73:94:c1:1a:2c:55:dd]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 6e082937a8bdefd540312e96827284cf6bdbc4b4
                       e7f4c76cd9ab2b33a90d22e5789e363e5c3f728e
                       fec35b86d3810ead31b5a4ba56e5fee13e27cd01
                       b62dc676713a4eef94ad9d8c12a5724c6c071a0f
                       adc263ac9b6322be0d5a9066019920a49503aabf
                       a4b5c070143d849b5d99e9bc84a57450fc6ae2ec
                       8d3e8973c79d2e24f3d2f967d664109633692fc0
                       177f6f656eeb182bf2c60407808a922de6354e93
                       eeb008c7b71e273ada4362c4ccff956733e53b0f
                       adc415ff786004b696c4b54282ac04c779a1a58f
                       11e7e3a8651e07aef489855316b1dc28a18b8c90
                       4b8ee83814de92fbcb5aa6e594b55fc73e1109ab
                       8678a47359c9cce97f120579e97d06a16542516b
                       5fdfa17286c617fa32f4ea226ffd18e60394362d
                       59c9402f9f641f74bcaba99198faf446ec7a0755
                       4f32fb6b7cdf9c10e219a7bb191b6739ddd34aec
                       f07722e9bf9d0ffa309730c341fa63c0e7747e28
                       b898a4674e0f83dbeeb33e65fb3f6d89b70872c2
                       2bf0de6622d8933bd3f6c38a54a96cd02af326aa
                       e1cd92d3
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [af:11:32:b7:8d:54:79:66:14:2e:e7:e2:72:79:57:b9:86:c7:8e:65]
            modulus: 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
    public exponent: 10001

] 
2022-10-01 04:45:55.335  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-10-01 04:45:55.336 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-10-01 04:45:55.337 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-10-01 04:45:55.338 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-10-01 04:45:55.339  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-10-01 04:45:55.339  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-10-01 04:45:55.340  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-10-01 04:45:55.340 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-10-01 04:45:55.340 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-10-01 04:45:55.341 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-10-01 04:45:55.345 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-10-01 04:45:55.346 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-01 04:45:55.346 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-01 04:45:55.347 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-01 04:45:55.482  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-10-01 04:45:55.483  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-10-01 04:45:55.484 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-10-01 04:45:55.484 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-01 04:45:55.486  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-10-01 04:45:55.487  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-10-01 04:45:55.488 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-01 04:45:55.488 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-01 04:45:55.489 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-01 04:45:55.491 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-01 04:45:55.491 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-01 04:45:55.492 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-01 04:45:55.492 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-01 04:45:55.493 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-01 04:45:55.493 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-01 04:45:55.494 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-10-01 04:45:55.499 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 509261373272911816219633336970917197051442135296
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Oct 01 03:10:40 UTC 2022
           Final Date: Thu Sep 30 03:10:39 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [fc:36:05:e1:7b:70:96:58:37:ab:ef:66:a7:73:94:c1:1a:2c:55:dd]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 6e082937a8bdefd540312e96827284cf6bdbc4b4
                       e7f4c76cd9ab2b33a90d22e5789e363e5c3f728e
                       fec35b86d3810ead31b5a4ba56e5fee13e27cd01
                       b62dc676713a4eef94ad9d8c12a5724c6c071a0f
                       adc263ac9b6322be0d5a9066019920a49503aabf
                       a4b5c070143d849b5d99e9bc84a57450fc6ae2ec
                       8d3e8973c79d2e24f3d2f967d664109633692fc0
                       177f6f656eeb182bf2c60407808a922de6354e93
                       eeb008c7b71e273ada4362c4ccff956733e53b0f
                       adc415ff786004b696c4b54282ac04c779a1a58f
                       11e7e3a8651e07aef489855316b1dc28a18b8c90
                       4b8ee83814de92fbcb5aa6e594b55fc73e1109ab
                       8678a47359c9cce97f120579e97d06a16542516b
                       5fdfa17286c617fa32f4ea226ffd18e60394362d
                       59c9402f9f641f74bcaba99198faf446ec7a0755
                       4f32fb6b7cdf9c10e219a7bb191b6739ddd34aec
                       f07722e9bf9d0ffa309730c341fa63c0e7747e28
                       b898a4674e0f83dbeeb33e65fb3f6d89b70872c2
                       2bf0de6622d8933bd3f6c38a54a96cd02af326aa
                       e1cd92d3
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [a6:e8:f7:ec:51:ed:31:a9:74:49:a0:c9:2d:fe:92:9d:08:c1:d3:c4]
            modulus: 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
    public exponent: 10001

]