Results

By type

          2022-10-28 03:19:50,762 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-10-28 03:19:51,831 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-10-28 03:19:52.618  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Oct 28, 2022 3:19:54 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Oct 28, 2022 3:19:54 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Oct 28, 2022 3:19:54 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Oct 28, 2022 3:19:54 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-10-28 03:19:55.119 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-10-28 03:19:55.411  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-10-28 03:19:55.585  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-10-28 03:19:56.263 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-10-28 03:19:56.266 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
2022-10-28 03:19:56.267 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-10-28 03:19:56.271 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-10-28 03:19:56.311 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2022-10-28 03:19:56.314 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/docs]}: redirectToUi(HttpServletRequest)
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
2022-10-28 03:19:56.435 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-10-28 03:19:56.982 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Oct 28, 2022 3:19:57 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-10-28 03:19:57.914  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 8.064 seconds (JVM running for 9.973)
Oct 28, 2022 3:20:27 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-10-28 03:20:48.156  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-10-28 03:20:48.164 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-10-28 03:20:48.200 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-10-28 03:20:48.203 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-10-28 03:20:48.221  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-10-28 03:20:48.224  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-10-28 03:20:48.225  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-10-28 03:20:48.226 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-10-28 03:20:48.227 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-28 03:20:48.231 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-10-28 03:20:48.237 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-10-28 03:20:48.240 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-10-28 03:20:48.287 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-10-28 03:20:48.293 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-28 03:20:48.294 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-28 03:20:48.297 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-28 03:20:49.135  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-10-28 03:20:49.138  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-10-28 03:20:49.139 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-10-28 03:20:49.140 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-28 03:20:49.150  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-10-28 03:20:49.151  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-10-28 03:20:49.152 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-28 03:20:49.152 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-28 03:20:49.153 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-28 03:20:49.164 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-28 03:20:49.164 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-28 03:20:49.165 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-28 03:20:49.171 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-28 03:20:49.171 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-28 03:20:49.171 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-28 03:20:49.173 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-10-28 03:20:49.206 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 187519133851127411370914229538319965908590675748
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Oct 28 03:17:44 UTC 2022
           Final Date: Wed Oct 27 03:17:43 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [55:32:2e:28:24:b4:6f:e7:28:09:8b:78:a8:c9:fa:e4:80:6d:0f:8b]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 66efcef3390cb5473082d6c47adec793c4c1493a
                       47cae5b5d47e05b5626bf8f141e77957ac1fffbd
                       aa8dab42ded8369d4d1d553fff89b2fdfb0f4165
                       d6a484c29b039885a693ec246501555d60bf5cac
                       b56001bfbfd79f2514a690a146ed61c2fe38ede9
                       77a3821b19313235a1e3a300cee8bf0ca505c308
                       4707dbd9b5d03b60628cef5ffca106f78fcca8ef
                       e8053a4748831fa23905936083b19fd25f3f79d2
                       c5d5f2f16ab8244a467b4a74a586032a00380895
                       729273a745f7ae9fa553a5d0c4abeeab1c2dd7aa
                       d332361c68ca364b1181ee28295ca28aaa6408b7
                       e3cecfece58fa0f38b7348e5cfdffb46ba0a0137
                       cbda9b14c0b1bbba435e24c0ddefd678ac368122
                       dfd87b852dd217ddb0e60f18c112edd940888a71
                       4a2fc8b10841c8b28100d018cd107279da2136ba
                       3daf9c5d5ec51d9b64c3d8b5024f09c2104e4a6e
                       740168b0d1b0be9be5dbf26bfad758178737b4c5
                       f649f9dcfcec59576bcc0f67924e1c2bed641ffb
                       8831d69e793c12ad6c66390f1bad310fff435452
                       da5826f4
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [72:67:85:0f:52:61:b7:f2:25:24:28:95:52:db:0c:23:04:ef:78:e6]
            modulus: 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
    public exponent: 10001

] 
2022-10-28 04:32:23.118  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-10-28 04:32:23.122 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-10-28 04:32:23.125 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-10-28 04:32:23.127 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-10-28 04:32:23.127  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-10-28 04:32:23.128  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-10-28 04:32:23.129  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-10-28 04:32:23.129 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-10-28 04:32:23.130 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-10-28 04:32:23.130 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-10-28 04:32:23.137 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-10-28 04:32:23.138 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-28 04:32:23.138 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-28 04:32:23.139 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-28 04:32:23.330  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-10-28 04:32:23.332  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-10-28 04:32:23.332 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-10-28 04:32:23.333 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-28 04:32:23.336  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-10-28 04:32:23.337  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-10-28 04:32:23.338 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-28 04:32:23.338 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-28 04:32:23.339 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-28 04:32:23.340 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-28 04:32:23.341 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-28 04:32:23.341 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-28 04:32:23.343 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-28 04:32:23.343 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-28 04:32:23.344 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-28 04:32:23.345 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-10-28 04:32:23.351 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 187519133851127411370914229538319965908590675748
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Oct 28 03:17:44 UTC 2022
           Final Date: Wed Oct 27 03:17:43 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [55:32:2e:28:24:b4:6f:e7:28:09:8b:78:a8:c9:fa:e4:80:6d:0f:8b]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 66efcef3390cb5473082d6c47adec793c4c1493a
                       47cae5b5d47e05b5626bf8f141e77957ac1fffbd
                       aa8dab42ded8369d4d1d553fff89b2fdfb0f4165
                       d6a484c29b039885a693ec246501555d60bf5cac
                       b56001bfbfd79f2514a690a146ed61c2fe38ede9
                       77a3821b19313235a1e3a300cee8bf0ca505c308
                       4707dbd9b5d03b60628cef5ffca106f78fcca8ef
                       e8053a4748831fa23905936083b19fd25f3f79d2
                       c5d5f2f16ab8244a467b4a74a586032a00380895
                       729273a745f7ae9fa553a5d0c4abeeab1c2dd7aa
                       d332361c68ca364b1181ee28295ca28aaa6408b7
                       e3cecfece58fa0f38b7348e5cfdffb46ba0a0137
                       cbda9b14c0b1bbba435e24c0ddefd678ac368122
                       dfd87b852dd217ddb0e60f18c112edd940888a71
                       4a2fc8b10841c8b28100d018cd107279da2136ba
                       3daf9c5d5ec51d9b64c3d8b5024f09c2104e4a6e
                       740168b0d1b0be9be5dbf26bfad758178737b4c5
                       f649f9dcfcec59576bcc0f67924e1c2bed641ffb
                       8831d69e793c12ad6c66390f1bad310fff435452
                       da5826f4
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [bd:c9:5f:48:3e:12:40:ed:84:54:db:0b:ab:07:95:d1:61:eb:2c:98]
            modulus: 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
    public exponent: 10001

] 
2022-10-28 04:34:11.373  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-10-28 04:34:11.376 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-10-28 04:34:11.378 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-10-28 04:34:11.379 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-10-28 04:34:11.380  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-10-28 04:34:11.381  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-10-28 04:34:11.382  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-10-28 04:34:11.382 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-10-28 04:34:11.383 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-10-28 04:34:11.383 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-10-28 04:34:11.391 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-10-28 04:34:11.392 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-28 04:34:11.393 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-28 04:34:11.393 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-28 04:34:11.571  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-10-28 04:34:11.572  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-10-28 04:34:11.572 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-10-28 04:34:11.573 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-28 04:34:11.576  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-10-28 04:34:11.577  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-10-28 04:34:11.577 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-28 04:34:11.578 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-28 04:34:11.578 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-28 04:34:11.579 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-28 04:34:11.580 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-28 04:34:11.580 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-28 04:34:11.581 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-28 04:34:11.582 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-28 04:34:11.582 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-28 04:34:11.584 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-10-28 04:34:11.589 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 187519133851127411370914229538319965908590675748
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Oct 28 03:17:44 UTC 2022
           Final Date: Wed Oct 27 03:17:43 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [55:32:2e:28:24:b4:6f:e7:28:09:8b:78:a8:c9:fa:e4:80:6d:0f:8b]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 66efcef3390cb5473082d6c47adec793c4c1493a
                       47cae5b5d47e05b5626bf8f141e77957ac1fffbd
                       aa8dab42ded8369d4d1d553fff89b2fdfb0f4165
                       d6a484c29b039885a693ec246501555d60bf5cac
                       b56001bfbfd79f2514a690a146ed61c2fe38ede9
                       77a3821b19313235a1e3a300cee8bf0ca505c308
                       4707dbd9b5d03b60628cef5ffca106f78fcca8ef
                       e8053a4748831fa23905936083b19fd25f3f79d2
                       c5d5f2f16ab8244a467b4a74a586032a00380895
                       729273a745f7ae9fa553a5d0c4abeeab1c2dd7aa
                       d332361c68ca364b1181ee28295ca28aaa6408b7
                       e3cecfece58fa0f38b7348e5cfdffb46ba0a0137
                       cbda9b14c0b1bbba435e24c0ddefd678ac368122
                       dfd87b852dd217ddb0e60f18c112edd940888a71
                       4a2fc8b10841c8b28100d018cd107279da2136ba
                       3daf9c5d5ec51d9b64c3d8b5024f09c2104e4a6e
                       740168b0d1b0be9be5dbf26bfad758178737b4c5
                       f649f9dcfcec59576bcc0f67924e1c2bed641ffb
                       8831d69e793c12ad6c66390f1bad310fff435452
                       da5826f4
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [a8:fc:30:74:a8:70:68:4c:70:35:78:0d:4d:86:7e:4f:d9:80:46:c9]
            modulus: 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
    public exponent: 10001

] 
2022-10-28 04:35:05.749  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-10-28 04:35:05.750 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-10-28 04:35:05.754 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-10-28 04:35:05.755 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-10-28 04:35:05.756  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-10-28 04:35:05.757  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-10-28 04:35:05.757  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-10-28 04:35:05.758 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-10-28 04:35:05.758 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-10-28 04:35:05.759 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-10-28 04:35:05.764 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-10-28 04:35:05.765 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-28 04:35:05.765 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-28 04:35:05.765 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-28 04:35:05.892  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-10-28 04:35:05.893  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-10-28 04:35:05.893 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-10-28 04:35:05.893 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-28 04:35:05.896  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-10-28 04:35:05.897  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-10-28 04:35:05.899 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-28 04:35:05.899 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-28 04:35:05.900 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-28 04:35:05.900 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-28 04:35:05.901 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-28 04:35:05.901 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-28 04:35:05.902 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-28 04:35:05.903 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-28 04:35:05.903 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-28 04:35:05.904 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-10-28 04:35:05.910 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 187519133851127411370914229538319965908590675748
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Oct 28 03:17:44 UTC 2022
           Final Date: Wed Oct 27 03:17:43 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [55:32:2e:28:24:b4:6f:e7:28:09:8b:78:a8:c9:fa:e4:80:6d:0f:8b]
            modulus: c0212807a1300642d0d9a19c26206eb2f825b5b3c56c7d8ec888a7b635a248038260b755d643ebc34d43d978be4cbc0058a6214a643cb0c597a42d0b9233e185c20ce32d43f039acd505428261843445caad2ac6689493027f32c9cdcb8d21f411120f4fe44b0d57ef759bb72ce446436af836a8242088a716152b2a67f880b273145c5fb8317e23e647588b6a11bc7e31b5becf00bf74d6b354a7f89dc26ae77050175e4ea2cfec7f2470d3153fd15093a4e508d37a677b697ec3b8df3173e77c3c6f890c8aba005563820f1e419db9d702a9b15fb2d68d88b5cb0b7d6a5211b0a8f3844ad9344642b7bc700669a376c1b770c565dd4456f152a508229f2695b8db9a0e63e57d7be672339796a81881b4b349740aa647cabc355d7ad3ba1b40144e7423b482c8819d9e3ad9bf0ffd1f014f6d8552a6fd4738a4b76f8dbaf12379b9cf3bb980e039aa469e0d40b4c7130719e43a808f73adb6faaf3d4cbcb340b04a881b36b03a3818ad534ba3c88cfe3a59a87c589fbd9c7b92ef36fa3a4ff7
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 66efcef3390cb5473082d6c47adec793c4c1493a
                       47cae5b5d47e05b5626bf8f141e77957ac1fffbd
                       aa8dab42ded8369d4d1d553fff89b2fdfb0f4165
                       d6a484c29b039885a693ec246501555d60bf5cac
                       b56001bfbfd79f2514a690a146ed61c2fe38ede9
                       77a3821b19313235a1e3a300cee8bf0ca505c308
                       4707dbd9b5d03b60628cef5ffca106f78fcca8ef
                       e8053a4748831fa23905936083b19fd25f3f79d2
                       c5d5f2f16ab8244a467b4a74a586032a00380895
                       729273a745f7ae9fa553a5d0c4abeeab1c2dd7aa
                       d332361c68ca364b1181ee28295ca28aaa6408b7
                       e3cecfece58fa0f38b7348e5cfdffb46ba0a0137
                       cbda9b14c0b1bbba435e24c0ddefd678ac368122
                       dfd87b852dd217ddb0e60f18c112edd940888a71
                       4a2fc8b10841c8b28100d018cd107279da2136ba
                       3daf9c5d5ec51d9b64c3d8b5024f09c2104e4a6e
                       740168b0d1b0be9be5dbf26bfad758178737b4c5
                       f649f9dcfcec59576bcc0f67924e1c2bed641ffb
                       8831d69e793c12ad6c66390f1bad310fff435452
                       da5826f4
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [08:7d:89:68:1c:54:7a:89:02:75:be:30:b6:98:90:00:7d:0d:db:c9]
            modulus: e13cbfd67114360fffb35e1beb655d60378472cfbc5e5a0b61b571f705ae46b3ac49db59f104492555570136ffffbd8455c25af2c7e5f459a17952e5c7e345cf89f1f093b0a5f3acc2951c63ab52c9eaddc123e5f2320cf0b9ab588afd3ebe23c149c0067aacb9721583bfdb60320cb8c9273d9b4abbfc0ab0159d6790b1ee3e6effadcecfe198316be0bcd220b1e7104e841d381c6f919ab8fe930662d02941ce20b855e7517bec82c2bcc26ecdc34903784937cae5962f24cebc5f426997e32b59cf259ab64c8661e4f20162b914770583f30a407b420087765b24c72a9d8ca24f8723e4ff5757ec56b3554e6a9d677a0ad58807fa99ca08f1a25efe526fc1
    public exponent: 10001

] 
2022-10-28 04:37:13.265  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-10-28 04:37:13.267 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-10-28 04:37:13.269 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-10-28 04:37:13.269 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-10-28 04:37:13.270  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-10-28 04:37:13.271  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-10-28 04:37:13.271  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-10-28 04:37:13.272 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-10-28 04:37:13.273 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-10-28 04:37:13.273 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-10-28 04:37:13.278 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-10-28 04:37:13.279 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-28 04:37:13.279 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-28 04:37:13.280 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-28 04:37:13.411  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-10-28 04:37:13.412  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-10-28 04:37:13.413 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-10-28 04:37:13.413 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-28 04:37:13.415  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-10-28 04:37:13.415  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-10-28 04:37:13.416 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-28 04:37:13.417 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-28 04:37:13.417 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-28 04:37:13.418 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-28 04:37:13.418 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-28 04:37:13.418 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-28 04:37:13.419 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-28 04:37:13.419 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-28 04:37:13.420 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-28 04:37:13.421 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-10-28 04:37:13.425 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 187519133851127411370914229538319965908590675748
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Oct 28 03:17:44 UTC 2022
           Final Date: Wed Oct 27 03:17:43 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [55:32:2e:28:24:b4:6f:e7:28:09:8b:78:a8:c9:fa:e4:80:6d:0f:8b]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 66efcef3390cb5473082d6c47adec793c4c1493a
                       47cae5b5d47e05b5626bf8f141e77957ac1fffbd
                       aa8dab42ded8369d4d1d553fff89b2fdfb0f4165
                       d6a484c29b039885a693ec246501555d60bf5cac
                       b56001bfbfd79f2514a690a146ed61c2fe38ede9
                       77a3821b19313235a1e3a300cee8bf0ca505c308
                       4707dbd9b5d03b60628cef5ffca106f78fcca8ef
                       e8053a4748831fa23905936083b19fd25f3f79d2
                       c5d5f2f16ab8244a467b4a74a586032a00380895
                       729273a745f7ae9fa553a5d0c4abeeab1c2dd7aa
                       d332361c68ca364b1181ee28295ca28aaa6408b7
                       e3cecfece58fa0f38b7348e5cfdffb46ba0a0137
                       cbda9b14c0b1bbba435e24c0ddefd678ac368122
                       dfd87b852dd217ddb0e60f18c112edd940888a71
                       4a2fc8b10841c8b28100d018cd107279da2136ba
                       3daf9c5d5ec51d9b64c3d8b5024f09c2104e4a6e
                       740168b0d1b0be9be5dbf26bfad758178737b4c5
                       f649f9dcfcec59576bcc0f67924e1c2bed641ffb
                       8831d69e793c12ad6c66390f1bad310fff435452
                       da5826f4
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [4e:92:d2:f5:48:76:47:b5:ec:90:dc:2d:88:c5:8e:00:2c:d5:b2:f4]
            modulus: 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
    public exponent: 10001

] 
2022-10-28 04:52:02.738  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-10-28 04:52:02.744 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-10-28 04:52:02.748 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-10-28 04:52:02.749 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-10-28 04:52:02.750  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-10-28 04:52:02.751  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-10-28 04:52:02.752  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-10-28 04:52:02.752 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-10-28 04:52:02.753 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-10-28 04:52:02.754 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-10-28 04:52:02.765 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-10-28 04:52:02.767 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-28 04:52:02.767 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-28 04:52:02.768 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-28 04:52:02.945  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-10-28 04:52:02.946  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-10-28 04:52:02.946 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-10-28 04:52:02.946 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-28 04:52:02.948  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-10-28 04:52:02.949  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-10-28 04:52:02.949 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-28 04:52:02.950 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-28 04:52:02.950 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-28 04:52:02.951 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-28 04:52:02.951 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-28 04:52:02.952 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-28 04:52:02.952 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-28 04:52:02.953 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-28 04:52:02.953 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-28 04:52:02.954 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-10-28 04:52:02.959 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 187519133851127411370914229538319965908590675748
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Oct 28 03:17:44 UTC 2022
           Final Date: Wed Oct 27 03:17:43 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [55:32:2e:28:24:b4:6f:e7:28:09:8b:78:a8:c9:fa:e4:80:6d:0f:8b]
            modulus: c0212807a1300642d0d9a19c26206eb2f825b5b3c56c7d8ec888a7b635a248038260b755d643ebc34d43d978be4cbc0058a6214a643cb0c597a42d0b9233e185c20ce32d43f039acd505428261843445caad2ac6689493027f32c9cdcb8d21f411120f4fe44b0d57ef759bb72ce446436af836a8242088a716152b2a67f880b273145c5fb8317e23e647588b6a11bc7e31b5becf00bf74d6b354a7f89dc26ae77050175e4ea2cfec7f2470d3153fd15093a4e508d37a677b697ec3b8df3173e77c3c6f890c8aba005563820f1e419db9d702a9b15fb2d68d88b5cb0b7d6a5211b0a8f3844ad9344642b7bc700669a376c1b770c565dd4456f152a508229f2695b8db9a0e63e57d7be672339796a81881b4b349740aa647cabc355d7ad3ba1b40144e7423b482c8819d9e3ad9bf0ffd1f014f6d8552a6fd4738a4b76f8dbaf12379b9cf3bb980e039aa469e0d40b4c7130719e43a808f73adb6faaf3d4cbcb340b04a881b36b03a3818ad534ba3c88cfe3a59a87c589fbd9c7b92ef36fa3a4ff7
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 66efcef3390cb5473082d6c47adec793c4c1493a
                       47cae5b5d47e05b5626bf8f141e77957ac1fffbd
                       aa8dab42ded8369d4d1d553fff89b2fdfb0f4165
                       d6a484c29b039885a693ec246501555d60bf5cac
                       b56001bfbfd79f2514a690a146ed61c2fe38ede9
                       77a3821b19313235a1e3a300cee8bf0ca505c308
                       4707dbd9b5d03b60628cef5ffca106f78fcca8ef
                       e8053a4748831fa23905936083b19fd25f3f79d2
                       c5d5f2f16ab8244a467b4a74a586032a00380895
                       729273a745f7ae9fa553a5d0c4abeeab1c2dd7aa
                       d332361c68ca364b1181ee28295ca28aaa6408b7
                       e3cecfece58fa0f38b7348e5cfdffb46ba0a0137
                       cbda9b14c0b1bbba435e24c0ddefd678ac368122
                       dfd87b852dd217ddb0e60f18c112edd940888a71
                       4a2fc8b10841c8b28100d018cd107279da2136ba
                       3daf9c5d5ec51d9b64c3d8b5024f09c2104e4a6e
                       740168b0d1b0be9be5dbf26bfad758178737b4c5
                       f649f9dcfcec59576bcc0f67924e1c2bed641ffb
                       8831d69e793c12ad6c66390f1bad310fff435452
                       da5826f4
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [6b:39:b3:34:9c:b3:e4:68:cf:e5:79:8d:1d:e4:41:fe:a1:f5:aa:f4]
            modulus: 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
    public exponent: 10001

] 
2022-10-28 04:57:01.708  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-10-28 04:57:01.713 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-10-28 04:57:01.716 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-10-28 04:57:01.717 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-10-28 04:57:01.725  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-10-28 04:57:01.726  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-10-28 04:57:01.726  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-10-28 04:57:01.727 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-10-28 04:57:01.727 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-10-28 04:57:01.728 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-10-28 04:57:01.734 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-10-28 04:57:01.735 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-28 04:57:01.735 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-28 04:57:01.736 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-28 04:57:01.945  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-10-28 04:57:01.946  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-10-28 04:57:01.947 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-10-28 04:57:01.947 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-28 04:57:01.949  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-10-28 04:57:01.949  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-10-28 04:57:01.950 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-28 04:57:01.950 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-28 04:57:01.951 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-28 04:57:01.952 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-28 04:57:01.952 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-28 04:57:01.952 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-28 04:57:01.954 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-28 04:57:01.954 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-28 04:57:01.954 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-28 04:57:01.955 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-10-28 04:57:01.960 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 187519133851127411370914229538319965908590675748
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Oct 28 03:17:44 UTC 2022
           Final Date: Wed Oct 27 03:17:43 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [55:32:2e:28:24:b4:6f:e7:28:09:8b:78:a8:c9:fa:e4:80:6d:0f:8b]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 66efcef3390cb5473082d6c47adec793c4c1493a
                       47cae5b5d47e05b5626bf8f141e77957ac1fffbd
                       aa8dab42ded8369d4d1d553fff89b2fdfb0f4165
                       d6a484c29b039885a693ec246501555d60bf5cac
                       b56001bfbfd79f2514a690a146ed61c2fe38ede9
                       77a3821b19313235a1e3a300cee8bf0ca505c308
                       4707dbd9b5d03b60628cef5ffca106f78fcca8ef
                       e8053a4748831fa23905936083b19fd25f3f79d2
                       c5d5f2f16ab8244a467b4a74a586032a00380895
                       729273a745f7ae9fa553a5d0c4abeeab1c2dd7aa
                       d332361c68ca364b1181ee28295ca28aaa6408b7
                       e3cecfece58fa0f38b7348e5cfdffb46ba0a0137
                       cbda9b14c0b1bbba435e24c0ddefd678ac368122
                       dfd87b852dd217ddb0e60f18c112edd940888a71
                       4a2fc8b10841c8b28100d018cd107279da2136ba
                       3daf9c5d5ec51d9b64c3d8b5024f09c2104e4a6e
                       740168b0d1b0be9be5dbf26bfad758178737b4c5
                       f649f9dcfcec59576bcc0f67924e1c2bed641ffb
                       8831d69e793c12ad6c66390f1bad310fff435452
                       da5826f4
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [e4:1d:90:02:3e:9e:ee:80:5d:87:56:02:77:3f:d8:7e:bc:63:64:31]
            modulus: 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
    public exponent: 10001

] 
2022-10-28 04:57:20.803  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-10-28 04:57:20.805 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-10-28 04:57:20.806 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-10-28 04:57:20.809 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-10-28 04:57:20.810  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-10-28 04:57:20.813  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-10-28 04:57:20.813  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-10-28 04:57:20.814 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-10-28 04:57:20.814 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-10-28 04:57:20.815 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-10-28 04:57:20.820 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-10-28 04:57:20.821 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-28 04:57:20.821 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-28 04:57:20.821 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-28 04:57:20.957  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-10-28 04:57:20.958  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-10-28 04:57:20.959 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-10-28 04:57:20.959 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-28 04:57:20.961  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-10-28 04:57:20.961  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-10-28 04:57:20.962 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-28 04:57:20.962 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-28 04:57:20.962 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-28 04:57:20.963 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-28 04:57:20.964 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-28 04:57:20.964 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-28 04:57:20.965 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-28 04:57:20.965 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-28 04:57:20.966 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-28 04:57:20.967 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-10-28 04:57:20.971 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 187519133851127411370914229538319965908590675748
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Oct 28 03:17:44 UTC 2022
           Final Date: Wed Oct 27 03:17:43 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [55:32:2e:28:24:b4:6f:e7:28:09:8b:78:a8:c9:fa:e4:80:6d:0f:8b]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 66efcef3390cb5473082d6c47adec793c4c1493a
                       47cae5b5d47e05b5626bf8f141e77957ac1fffbd
                       aa8dab42ded8369d4d1d553fff89b2fdfb0f4165
                       d6a484c29b039885a693ec246501555d60bf5cac
                       b56001bfbfd79f2514a690a146ed61c2fe38ede9
                       77a3821b19313235a1e3a300cee8bf0ca505c308
                       4707dbd9b5d03b60628cef5ffca106f78fcca8ef
                       e8053a4748831fa23905936083b19fd25f3f79d2
                       c5d5f2f16ab8244a467b4a74a586032a00380895
                       729273a745f7ae9fa553a5d0c4abeeab1c2dd7aa
                       d332361c68ca364b1181ee28295ca28aaa6408b7
                       e3cecfece58fa0f38b7348e5cfdffb46ba0a0137
                       cbda9b14c0b1bbba435e24c0ddefd678ac368122
                       dfd87b852dd217ddb0e60f18c112edd940888a71
                       4a2fc8b10841c8b28100d018cd107279da2136ba
                       3daf9c5d5ec51d9b64c3d8b5024f09c2104e4a6e
                       740168b0d1b0be9be5dbf26bfad758178737b4c5
                       f649f9dcfcec59576bcc0f67924e1c2bed641ffb
                       8831d69e793c12ad6c66390f1bad310fff435452
                       da5826f4
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [89:1e:25:69:91:96:ee:26:85:00:0a:9a:25:f3:8c:21:1b:09:de:99]
            modulus: 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
    public exponent: 10001

]