Results

By type

          2022-11-13 02:57:17,807 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-11-13 02:57:19,324 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-11-13 02:57:20.305  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Nov 13, 2022 2:57:22 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Nov 13, 2022 2:57:22 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Nov 13, 2022 2:57:22 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Nov 13, 2022 2:57:22 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-11-13 02:57:23.334 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-11-13 02:57:23.688  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-11-13 02:57:23.864  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-11-13 02:57:24.685 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-11-13 02:57:24.688 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
2022-11-13 02:57:24.689 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-11-13 02:57:24.693 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-11-13 02:57:24.739 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2022-11-13 02:57:24.743 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
	{GET [/docs]}: redirectToUi(HttpServletRequest)
2022-11-13 02:57:24.883 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-11-13 02:57:25.434 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Nov 13, 2022 2:57:26 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-11-13 02:57:26.352  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 9.429 seconds (JVM running for 11.295)
Nov 13, 2022 2:57:54 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-11-13 02:58:15.724  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-13 02:58:15.736 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-13 02:58:15.787 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-11-13 02:58:15.792 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-13 02:58:15.827  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-11-13 02:58:15.830  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-13 02:58:15.832  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-13 02:58:15.833 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-13 02:58:15.834 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-13 02:58:15.838 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-13 02:58:15.845 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-13 02:58:15.848 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-13 02:58:15.889 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-13 02:58:15.894 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-13 02:58:15.894 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-13 02:58:15.898 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-13 02:58:16.534  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-13 02:58:16.537  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-13 02:58:16.537 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-13 02:58:16.539 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-13 02:58:16.549  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-13 02:58:16.550  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-13 02:58:16.551 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-13 02:58:16.551 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-13 02:58:16.552 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-13 02:58:16.563 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-13 02:58:16.564 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-13 02:58:16.564 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-13 02:58:16.572 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-13 02:58:16.573 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-13 02:58:16.573 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-13 02:58:16.575 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-13 02:58:16.608 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 659750224579042219621424266170668539361134684704
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Nov 13 02:54:49 UTC 2022
           Final Date: Fri Nov 12 02:54:48 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [4f:ec:71:e9:3b:38:b4:f2:b1:e7:f7:af:a8:20:ed:3f:e0:b7:41:b2]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1a155fa172f78d57f190997a80b52f32c4f67c4f
                       b5f9c0209b25abf3fdfaa863a89e7e3ab8572958
                       5d216effce3a91103446b3fb2bcfa9328a8fff2a
                       98ce10007ad72d5d1f7664e49c0e7fa371919889
                       54dc70000d7f9b7e40b9a2a231901c10bcfb1e4a
                       dd00327aaff70c07826bd14c42a6f8089e02f337
                       93abfba00f29e57bcf9ce7d21ef1ef7a1f29459b
                       7fbacf9148d0e7e8a8a7cf95255b56fc04b2c2e5
                       3bf9aff50df2ed442e3f234d3cb8ff79c8e0a69b
                       9426fa2d9a5273c926d4a1c238dcfcfaa2d32ce5
                       13c1ef94d174951eaf19204d4f4b450956a0ecdf
                       050efab7d209659caed5fd7bf892001dd0a93f8d
                       e14cd2015944e53e5e8233ce4bbf97c97e275358
                       917cfad68610e4800d540b70a604ebf1d1ffb65c
                       dfcf8654311e8e31d63a7d281fa8cbd6c651d15c
                       bfddfbea6f787ce7a02fbd6601086df00784a481
                       6b48ac450814873f11af203f1771362049a2dea2
                       9b437436afe8b808e5bb6be42b5635b4e3952421
                       fb8fcbfed92e8d6ef0e9ab4630d3dfaf2304b89f
                       465a6b7c
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [5b:6f:69:05:7f:24:bc:5b:a8:3c:f3:97:cc:53:39:53:c4:02:b7:71]
            modulus: c00d4396715cc1f973eebc2ffd13723d87c3d7d5a41af5af0713ed6a79d21926cf638419abd26616d74f100adbb208e7bfe804433d956d769561a4f743555f6179cbe840258497d57adf0ce320f5da2c944de9304fed24ad7519c59ce59a8023167c06cf745826c3bcafde1a8ed68f8b4bcabd5d89f53f7e1e1eb72c60667b2f2582ed69398bfc736394c849caa78b4c8544e52741f32cbbc343dc7ebb9d81464df75a68d8a7d3b4ea051573e39674d41881b954c676030e650e9dcba10c424edd3775684d34696c3d6403092faf01cd491bb83edb8c1eb64ea4a54cb977a862322876ebe15efe42c9b830e34d6ec87033b3a176ae822c31ce6510e9730756a5
    public exponent: 10001

] 
2022-11-13 04:18:16.887  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-13 04:18:16.891 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-13 04:18:16.895 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-13 04:18:16.896 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-13 04:18:16.897  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-13 04:18:16.897  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-13 04:18:16.898  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-13 04:18:16.898 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-13 04:18:16.899 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-13 04:18:16.899 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-13 04:18:16.905 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-13 04:18:16.907 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-13 04:18:16.907 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-13 04:18:16.907 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-13 04:18:17.119  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-13 04:18:17.120  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-13 04:18:17.120 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-13 04:18:17.120 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-13 04:18:17.123  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-13 04:18:17.124  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-13 04:18:17.124 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-13 04:18:17.125 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-13 04:18:17.125 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-13 04:18:17.126 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-13 04:18:17.127 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-13 04:18:17.127 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-13 04:18:17.128 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-13 04:18:17.128 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-13 04:18:17.129 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-13 04:18:17.130 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-13 04:18:17.135 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 659750224579042219621424266170668539361134684704
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Nov 13 02:54:49 UTC 2022
           Final Date: Fri Nov 12 02:54:48 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [4f:ec:71:e9:3b:38:b4:f2:b1:e7:f7:af:a8:20:ed:3f:e0:b7:41:b2]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1a155fa172f78d57f190997a80b52f32c4f67c4f
                       b5f9c0209b25abf3fdfaa863a89e7e3ab8572958
                       5d216effce3a91103446b3fb2bcfa9328a8fff2a
                       98ce10007ad72d5d1f7664e49c0e7fa371919889
                       54dc70000d7f9b7e40b9a2a231901c10bcfb1e4a
                       dd00327aaff70c07826bd14c42a6f8089e02f337
                       93abfba00f29e57bcf9ce7d21ef1ef7a1f29459b
                       7fbacf9148d0e7e8a8a7cf95255b56fc04b2c2e5
                       3bf9aff50df2ed442e3f234d3cb8ff79c8e0a69b
                       9426fa2d9a5273c926d4a1c238dcfcfaa2d32ce5
                       13c1ef94d174951eaf19204d4f4b450956a0ecdf
                       050efab7d209659caed5fd7bf892001dd0a93f8d
                       e14cd2015944e53e5e8233ce4bbf97c97e275358
                       917cfad68610e4800d540b70a604ebf1d1ffb65c
                       dfcf8654311e8e31d63a7d281fa8cbd6c651d15c
                       bfddfbea6f787ce7a02fbd6601086df00784a481
                       6b48ac450814873f11af203f1771362049a2dea2
                       9b437436afe8b808e5bb6be42b5635b4e3952421
                       fb8fcbfed92e8d6ef0e9ab4630d3dfaf2304b89f
                       465a6b7c
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [92:00:e9:5e:26:bf:61:81:5c:a9:00:e3:78:e4:1f:4b:63:01:d1:0d]
            modulus: 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
    public exponent: 10001

] 
2022-11-13 04:19:49.252  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-13 04:19:49.255 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-13 04:19:49.259 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-11-13 04:19:49.260 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-13 04:19:49.261  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-11-13 04:19:49.262  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-13 04:19:49.263  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-13 04:19:49.263 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-13 04:19:49.264 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-13 04:19:49.265 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-13 04:19:49.275 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-13 04:19:49.276 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-13 04:19:49.276 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-13 04:19:49.277 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-13 04:19:49.418  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-13 04:19:49.419  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-13 04:19:49.419 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-13 04:19:49.420 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-13 04:19:49.423  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-13 04:19:49.423  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-13 04:19:49.424 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-13 04:19:49.424 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-13 04:19:49.425 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-13 04:19:49.427 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-13 04:19:49.427 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-13 04:19:49.428 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-13 04:19:49.430 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-13 04:19:49.430 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-13 04:19:49.431 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-13 04:19:49.433 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-13 04:19:49.441 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 659750224579042219621424266170668539361134684704
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Nov 13 02:54:49 UTC 2022
           Final Date: Fri Nov 12 02:54:48 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [4f:ec:71:e9:3b:38:b4:f2:b1:e7:f7:af:a8:20:ed:3f:e0:b7:41:b2]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1a155fa172f78d57f190997a80b52f32c4f67c4f
                       b5f9c0209b25abf3fdfaa863a89e7e3ab8572958
                       5d216effce3a91103446b3fb2bcfa9328a8fff2a
                       98ce10007ad72d5d1f7664e49c0e7fa371919889
                       54dc70000d7f9b7e40b9a2a231901c10bcfb1e4a
                       dd00327aaff70c07826bd14c42a6f8089e02f337
                       93abfba00f29e57bcf9ce7d21ef1ef7a1f29459b
                       7fbacf9148d0e7e8a8a7cf95255b56fc04b2c2e5
                       3bf9aff50df2ed442e3f234d3cb8ff79c8e0a69b
                       9426fa2d9a5273c926d4a1c238dcfcfaa2d32ce5
                       13c1ef94d174951eaf19204d4f4b450956a0ecdf
                       050efab7d209659caed5fd7bf892001dd0a93f8d
                       e14cd2015944e53e5e8233ce4bbf97c97e275358
                       917cfad68610e4800d540b70a604ebf1d1ffb65c
                       dfcf8654311e8e31d63a7d281fa8cbd6c651d15c
                       bfddfbea6f787ce7a02fbd6601086df00784a481
                       6b48ac450814873f11af203f1771362049a2dea2
                       9b437436afe8b808e5bb6be42b5635b4e3952421
                       fb8fcbfed92e8d6ef0e9ab4630d3dfaf2304b89f
                       465a6b7c
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [5d:ec:12:81:a7:fd:89:c9:fc:65:5c:0d:17:10:fa:e2:69:fa:1f:13]
            modulus: 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
    public exponent: 10001

] 
2022-11-13 04:20:59.023  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-13 04:20:59.027 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-13 04:20:59.032 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-11-13 04:20:59.036 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-13 04:20:59.037  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-11-13 04:20:59.040  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-13 04:20:59.042  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-13 04:20:59.053 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-13 04:20:59.053 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-13 04:20:59.054 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-13 04:20:59.066 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-13 04:20:59.067 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-13 04:20:59.067 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-13 04:20:59.068 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-13 04:20:59.186  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-13 04:20:59.187  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-13 04:20:59.188 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-13 04:20:59.188 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-13 04:20:59.191  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-13 04:20:59.191  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-13 04:20:59.192 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-13 04:20:59.193 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-13 04:20:59.193 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-13 04:20:59.194 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-13 04:20:59.195 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-13 04:20:59.195 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-13 04:20:59.196 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-13 04:20:59.197 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-13 04:20:59.197 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-13 04:20:59.199 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-13 04:20:59.204 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 659750224579042219621424266170668539361134684704
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Nov 13 02:54:49 UTC 2022
           Final Date: Fri Nov 12 02:54:48 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [4f:ec:71:e9:3b:38:b4:f2:b1:e7:f7:af:a8:20:ed:3f:e0:b7:41:b2]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1a155fa172f78d57f190997a80b52f32c4f67c4f
                       b5f9c0209b25abf3fdfaa863a89e7e3ab8572958
                       5d216effce3a91103446b3fb2bcfa9328a8fff2a
                       98ce10007ad72d5d1f7664e49c0e7fa371919889
                       54dc70000d7f9b7e40b9a2a231901c10bcfb1e4a
                       dd00327aaff70c07826bd14c42a6f8089e02f337
                       93abfba00f29e57bcf9ce7d21ef1ef7a1f29459b
                       7fbacf9148d0e7e8a8a7cf95255b56fc04b2c2e5
                       3bf9aff50df2ed442e3f234d3cb8ff79c8e0a69b
                       9426fa2d9a5273c926d4a1c238dcfcfaa2d32ce5
                       13c1ef94d174951eaf19204d4f4b450956a0ecdf
                       050efab7d209659caed5fd7bf892001dd0a93f8d
                       e14cd2015944e53e5e8233ce4bbf97c97e275358
                       917cfad68610e4800d540b70a604ebf1d1ffb65c
                       dfcf8654311e8e31d63a7d281fa8cbd6c651d15c
                       bfddfbea6f787ce7a02fbd6601086df00784a481
                       6b48ac450814873f11af203f1771362049a2dea2
                       9b437436afe8b808e5bb6be42b5635b4e3952421
                       fb8fcbfed92e8d6ef0e9ab4630d3dfaf2304b89f
                       465a6b7c
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [7c:ec:25:92:46:dd:e4:f6:3a:b3:e6:a1:d8:e9:d7:5d:4a:fe:28:7c]
            modulus: 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
    public exponent: 10001

] 
2022-11-13 04:23:08.297  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-13 04:23:08.300 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-13 04:23:08.303 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-13 04:23:08.304 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-13 04:23:08.305  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-13 04:23:08.306  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-13 04:23:08.307  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-13 04:23:08.308 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-13 04:23:08.308 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-13 04:23:08.309 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-13 04:23:08.318 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-13 04:23:08.319 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-13 04:23:08.320 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-13 04:23:08.321 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-13 04:23:08.500  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-13 04:23:08.501  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-13 04:23:08.501 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-13 04:23:08.502 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-13 04:23:08.504  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-13 04:23:08.505  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-13 04:23:08.505 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-13 04:23:08.506 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-13 04:23:08.506 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-13 04:23:08.507 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-13 04:23:08.508 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-13 04:23:08.508 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-13 04:23:08.509 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-13 04:23:08.510 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-13 04:23:08.510 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-13 04:23:08.512 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-13 04:23:08.517 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 659750224579042219621424266170668539361134684704
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Nov 13 02:54:49 UTC 2022
           Final Date: Fri Nov 12 02:54:48 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [4f:ec:71:e9:3b:38:b4:f2:b1:e7:f7:af:a8:20:ed:3f:e0:b7:41:b2]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1a155fa172f78d57f190997a80b52f32c4f67c4f
                       b5f9c0209b25abf3fdfaa863a89e7e3ab8572958
                       5d216effce3a91103446b3fb2bcfa9328a8fff2a
                       98ce10007ad72d5d1f7664e49c0e7fa371919889
                       54dc70000d7f9b7e40b9a2a231901c10bcfb1e4a
                       dd00327aaff70c07826bd14c42a6f8089e02f337
                       93abfba00f29e57bcf9ce7d21ef1ef7a1f29459b
                       7fbacf9148d0e7e8a8a7cf95255b56fc04b2c2e5
                       3bf9aff50df2ed442e3f234d3cb8ff79c8e0a69b
                       9426fa2d9a5273c926d4a1c238dcfcfaa2d32ce5
                       13c1ef94d174951eaf19204d4f4b450956a0ecdf
                       050efab7d209659caed5fd7bf892001dd0a93f8d
                       e14cd2015944e53e5e8233ce4bbf97c97e275358
                       917cfad68610e4800d540b70a604ebf1d1ffb65c
                       dfcf8654311e8e31d63a7d281fa8cbd6c651d15c
                       bfddfbea6f787ce7a02fbd6601086df00784a481
                       6b48ac450814873f11af203f1771362049a2dea2
                       9b437436afe8b808e5bb6be42b5635b4e3952421
                       fb8fcbfed92e8d6ef0e9ab4630d3dfaf2304b89f
                       465a6b7c
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [e2:01:8d:71:ca:6a:30:f9:62:c8:22:9d:1c:54:11:1e:43:b4:f8:63]
            modulus: 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
    public exponent: 10001

] 
2022-11-13 04:31:34.691  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-13 04:31:34.695 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-13 04:31:34.698 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-11-13 04:31:34.699 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-13 04:31:34.700  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-11-13 04:31:34.701  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-13 04:31:34.702  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-13 04:31:34.702 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-13 04:31:34.703 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-13 04:31:34.704 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-13 04:31:34.711 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-13 04:31:34.713 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-13 04:31:34.713 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-13 04:31:34.713 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-13 04:31:34.888  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-13 04:31:34.890  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-13 04:31:34.891 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-13 04:31:34.891 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-13 04:31:34.893  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-13 04:31:34.894  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-13 04:31:34.895 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-13 04:31:34.896 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-13 04:31:34.897 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-13 04:31:34.899 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-13 04:31:34.900 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-13 04:31:34.900 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-13 04:31:34.901 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-13 04:31:34.902 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-13 04:31:34.902 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-13 04:31:34.903 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-13 04:31:34.908 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 659750224579042219621424266170668539361134684704
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Nov 13 02:54:49 UTC 2022
           Final Date: Fri Nov 12 02:54:48 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [4f:ec:71:e9:3b:38:b4:f2:b1:e7:f7:af:a8:20:ed:3f:e0:b7:41:b2]
            modulus: cc2afeea014dda424bca595d433ce9f911ee8a1a256931de28fb420e5d3111fb1d3c6e6751e35eb0a9ac7e7a22df0090d721e89ada5041470f9aad1084eb79c8fd2981d9287b9df2881004c7c168880f119de426f5e000ba0be3e4253fb51b009c75e9e6001784b5b2b3c78cecf0554dac42774d91b95f4de5dbf3ef00afa3a4ab58a329a2e082265d3eb0e8accdc18c8b0b93e45a82748aea136b2667878a09ccdf263adb39dd2e1795821ffe6bf2bcef597e1735654ae9faa856c171583490675d972cdf9e4dda22cc0d49e0adb77ae97df3a2fa86d63aa32fabccf9d3b34614bbff653350219d7095c449e2060c5674d88eaa44f764d850f2f2ef67586194439ad09f38f57d5bd4cce10324eafa7365503f74135060023362868566038ef3e30127d7b27546306f74370880fccd3335125baa1540382964504a1f034cdd17455768dd1b3b323a913a2ba84ccb7cd13da2cb79cd3f4f4daef3e91b1f47df4f68a498c81a4d0cdd11049e3e05688986675df2787d172dc719bc251f3c08b17d
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1a155fa172f78d57f190997a80b52f32c4f67c4f
                       b5f9c0209b25abf3fdfaa863a89e7e3ab8572958
                       5d216effce3a91103446b3fb2bcfa9328a8fff2a
                       98ce10007ad72d5d1f7664e49c0e7fa371919889
                       54dc70000d7f9b7e40b9a2a231901c10bcfb1e4a
                       dd00327aaff70c07826bd14c42a6f8089e02f337
                       93abfba00f29e57bcf9ce7d21ef1ef7a1f29459b
                       7fbacf9148d0e7e8a8a7cf95255b56fc04b2c2e5
                       3bf9aff50df2ed442e3f234d3cb8ff79c8e0a69b
                       9426fa2d9a5273c926d4a1c238dcfcfaa2d32ce5
                       13c1ef94d174951eaf19204d4f4b450956a0ecdf
                       050efab7d209659caed5fd7bf892001dd0a93f8d
                       e14cd2015944e53e5e8233ce4bbf97c97e275358
                       917cfad68610e4800d540b70a604ebf1d1ffb65c
                       dfcf8654311e8e31d63a7d281fa8cbd6c651d15c
                       bfddfbea6f787ce7a02fbd6601086df00784a481
                       6b48ac450814873f11af203f1771362049a2dea2
                       9b437436afe8b808e5bb6be42b5635b4e3952421
                       fb8fcbfed92e8d6ef0e9ab4630d3dfaf2304b89f
                       465a6b7c
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [bc:1f:67:0f:f1:ff:57:a2:03:20:35:3f:7c:b3:0e:82:bd:b2:4f:86]
            modulus: b3077021d8283850794ae244280313c86d1d066d38230303ecddb42c6c0d4f4d14a967ffb7b8abefaebdf0f4fe807d25ff3ee5667933ab3718a2a728e44fa597fc05414b04852d22db44744c184af7ce4a7350a03d6b062e01e6c0c24fcc511877a0e713ec224fe95bbd75012388faeacc38bc23aa91672a683680e68dce4374bc4f8dd805bd90128e1ea6c611e0a62c486d166f933652fcda45940e5935dd6c5a887990627d0bc11809d2a4c8c5a79896c85bb3cf43de85127e983622650b40cb9b1ea030db7dced77e67250ddcf3fd75595e06c6d23def50ba465ed1a8e34264c46797a8fc3936f4fae5acdc8bb440a251606bd3ebb29584d997487ad86487
    public exponent: 10001

] 
2022-11-13 04:36:50.123  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-13 04:36:50.124 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-13 04:36:50.125 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-11-13 04:36:50.126 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-13 04:36:50.127  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-11-13 04:36:50.128  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-13 04:36:50.128  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-13 04:36:50.128 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-13 04:36:50.129 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-13 04:36:50.129 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-13 04:36:50.134 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-13 04:36:50.134 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-13 04:36:50.135 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-13 04:36:50.135 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-13 04:36:50.324  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-13 04:36:50.324  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-13 04:36:50.325 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-13 04:36:50.325 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-13 04:36:50.326  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-13 04:36:50.327  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-13 04:36:50.327 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-13 04:36:50.327 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-13 04:36:50.328 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-13 04:36:50.328 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-13 04:36:50.329 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-13 04:36:50.329 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-13 04:36:50.330 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-13 04:36:50.330 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-13 04:36:50.330 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-13 04:36:50.331 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-13 04:36:50.334 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 659750224579042219621424266170668539361134684704
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Nov 13 02:54:49 UTC 2022
           Final Date: Fri Nov 12 02:54:48 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [4f:ec:71:e9:3b:38:b4:f2:b1:e7:f7:af:a8:20:ed:3f:e0:b7:41:b2]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1a155fa172f78d57f190997a80b52f32c4f67c4f
                       b5f9c0209b25abf3fdfaa863a89e7e3ab8572958
                       5d216effce3a91103446b3fb2bcfa9328a8fff2a
                       98ce10007ad72d5d1f7664e49c0e7fa371919889
                       54dc70000d7f9b7e40b9a2a231901c10bcfb1e4a
                       dd00327aaff70c07826bd14c42a6f8089e02f337
                       93abfba00f29e57bcf9ce7d21ef1ef7a1f29459b
                       7fbacf9148d0e7e8a8a7cf95255b56fc04b2c2e5
                       3bf9aff50df2ed442e3f234d3cb8ff79c8e0a69b
                       9426fa2d9a5273c926d4a1c238dcfcfaa2d32ce5
                       13c1ef94d174951eaf19204d4f4b450956a0ecdf
                       050efab7d209659caed5fd7bf892001dd0a93f8d
                       e14cd2015944e53e5e8233ce4bbf97c97e275358
                       917cfad68610e4800d540b70a604ebf1d1ffb65c
                       dfcf8654311e8e31d63a7d281fa8cbd6c651d15c
                       bfddfbea6f787ce7a02fbd6601086df00784a481
                       6b48ac450814873f11af203f1771362049a2dea2
                       9b437436afe8b808e5bb6be42b5635b4e3952421
                       fb8fcbfed92e8d6ef0e9ab4630d3dfaf2304b89f
                       465a6b7c
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [f0:84:5d:f4:5a:45:75:16:f2:2a:75:11:9f:62:cf:83:89:48:aa:eb]
            modulus: bfd67cf550eeb28389c28509463f245f592e0fc37d4718d4ec80bd60f14b3fe5369ad674f14ef84281342c5908b9a7dda7bce9809b43f3205fcbadba79d8e117f9a40a2befe5ebbc8e3c5759a05d4fca03e4f910efcc9767eb7fbc76c3f1ead3ddddcd764eaf01aba231eeab75e8cda2e5bb5d4344613a4d06c110ea925646d8924cd8b051410c9747a60e387d9a02e1cf23be4b7aef2d544d0b7d979ee04b3e194b4b05f220f6ae84a8bfac65a99cc130e4b9470b027fd4988b67d0fa54733b9c9793ab2d2493fb9246fc87594306be1fea28e2dee6852bf84aefcdbb6134ea482550f4b967c45c1b76fce98a92b682269e9951de12d5e60bc148c68a5bce89
    public exponent: 10001

] 
2022-11-13 04:37:02.661  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-13 04:37:02.663 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-13 04:37:02.665 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-11-13 04:37:02.666 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-13 04:37:02.666  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-11-13 04:37:02.667  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-13 04:37:02.668  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-13 04:37:02.668 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-13 04:37:02.669 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-13 04:37:02.669 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-13 04:37:02.675 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-13 04:37:02.675 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-13 04:37:02.676 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-13 04:37:02.676 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-13 04:37:02.803  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-13 04:37:02.804  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-13 04:37:02.804 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-13 04:37:02.805 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-13 04:37:02.806  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-13 04:37:02.807  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-13 04:37:02.807 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-13 04:37:02.808 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-13 04:37:02.808 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-13 04:37:02.809 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-13 04:37:02.809 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-13 04:37:02.809 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-13 04:37:02.810 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-13 04:37:02.810 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-13 04:37:02.811 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-13 04:37:02.812 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-13 04:37:02.815 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 659750224579042219621424266170668539361134684704
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Nov 13 02:54:49 UTC 2022
           Final Date: Fri Nov 12 02:54:48 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [4f:ec:71:e9:3b:38:b4:f2:b1:e7:f7:af:a8:20:ed:3f:e0:b7:41:b2]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1a155fa172f78d57f190997a80b52f32c4f67c4f
                       b5f9c0209b25abf3fdfaa863a89e7e3ab8572958
                       5d216effce3a91103446b3fb2bcfa9328a8fff2a
                       98ce10007ad72d5d1f7664e49c0e7fa371919889
                       54dc70000d7f9b7e40b9a2a231901c10bcfb1e4a
                       dd00327aaff70c07826bd14c42a6f8089e02f337
                       93abfba00f29e57bcf9ce7d21ef1ef7a1f29459b
                       7fbacf9148d0e7e8a8a7cf95255b56fc04b2c2e5
                       3bf9aff50df2ed442e3f234d3cb8ff79c8e0a69b
                       9426fa2d9a5273c926d4a1c238dcfcfaa2d32ce5
                       13c1ef94d174951eaf19204d4f4b450956a0ecdf
                       050efab7d209659caed5fd7bf892001dd0a93f8d
                       e14cd2015944e53e5e8233ce4bbf97c97e275358
                       917cfad68610e4800d540b70a604ebf1d1ffb65c
                       dfcf8654311e8e31d63a7d281fa8cbd6c651d15c
                       bfddfbea6f787ce7a02fbd6601086df00784a481
                       6b48ac450814873f11af203f1771362049a2dea2
                       9b437436afe8b808e5bb6be42b5635b4e3952421
                       fb8fcbfed92e8d6ef0e9ab4630d3dfaf2304b89f
                       465a6b7c
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [a9:19:d5:e6:bf:71:bc:65:ed:d0:3a:34:96:3f:c5:08:bd:cd:a6:fb]
            modulus: b7515820b6b250aca12846305f0eb7950bdd596c4e5a2bfc0a8e9e5f48276c3afcedce96739137bf0b92c86d9c8b3b4089bd47a236a9b33a4adce415444e1dd1ab2891264f41f68bb6e1dbb7563c2e90d569c5f8561f45a7bad36042e38bdf09ba86c50625c1505de133c521bc707852593707101e9b821de2fad5e6ba7cdd744e2a2348bd7341fade63e002b27d8f41a60b1a43c76b3399474e7e1efb14cc6dde448b2521704b32fa721bb33e6ed6f4ac764d7cbff29a54b92d21254f52b1795b9ebf077f612e161cb5882c6211f5ab8c9055bd6449556583278c5bf70b77f3b5e6a8439bf554324ed5451200cb353d7260e10d7d1041200dbc5650a62601c9
    public exponent: 10001

]