Results

By type

          2022-12-06 03:03:10,699 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-12-06 03:03:12,760 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-12-06 03:03:13.682  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Dec 06, 2022 3:03:15 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Dec 06, 2022 3:03:15 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Dec 06, 2022 3:03:15 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Dec 06, 2022 3:03:16 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-12-06 03:03:16.616 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-12-06 03:03:16.937  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-12-06 03:03:17.151  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-12-06 03:03:17.926 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-12-06 03:03:17.929 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
2022-12-06 03:03:17.931 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-12-06 03:03:17.935 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-12-06 03:03:17.976 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2022-12-06 03:03:17.980 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/docs]}: redirectToUi(HttpServletRequest)
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
2022-12-06 03:03:18.099 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-12-06 03:03:18.927 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Dec 06, 2022 3:03:19 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-12-06 03:03:20.013  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 10.593 seconds (JVM running for 13.058)
Dec 06, 2022 3:03:39 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-12-06 03:03:49.813  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-06 03:03:49.823 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-06 03:03:49.861 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-12-06 03:03:49.864 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-06 03:03:49.889  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-12-06 03:03:49.891  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-06 03:03:49.892  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-06 03:03:49.894 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-06 03:03:49.894 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-06 03:03:49.898 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-06 03:03:49.908 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-06 03:03:49.913 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-06 03:03:49.966 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-06 03:03:49.975 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-06 03:03:49.975 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-06 03:03:49.979 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-06 03:03:50.600  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-06 03:03:50.604  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-06 03:03:50.605 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-06 03:03:50.607 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-06 03:03:50.619  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-06 03:03:50.620  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-06 03:03:50.621 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-06 03:03:50.622 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-06 03:03:50.622 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-06 03:03:50.637 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-06 03:03:50.638 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-06 03:03:50.638 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-06 03:03:50.644 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-06 03:03:50.645 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-06 03:03:50.645 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-06 03:03:50.649 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-06 03:03:50.679 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 469773687849548213302389279468020294913554401031
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Dec 06 02:58:09 UTC 2022
           Final Date: Sun Dec 05 02:58:08 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [3f:f2:11:c5:39:8e:b4:04:e5:c1:31:e3:6b:d4:a8:d8:d9:00:b0:8d],[56:66:d1:a4]
        modulus: c77ddc6f52cd255d6aaffe97f74d8fe71df11a76075467171f4eae0c1bafebe904a853898ed0642ee2d66eb1a65eaf36f0e0d41df0fb520f8949c3cf828f7036a31b99beacee49e0a16e0868d289f8dc6db88f6dbaf57930b71939fc8c30ebc76b268858c570d37fb052444e791222fda9d61e4e0e19479acffbe800afa2e3621ab4b127ab060ba2b809e7f47fc1a1083cd8c860fdaf749869b87cd09388b51c3fe8c016817a95039f24310776e456cbba9d8fb2c9e6f8997fc011144656b3c8f46188380afea76a3857fb604c28604959d3ba262552f3d8c4ab75219191c72ea99b6329b52739d04d1665fdf0abda6655c774a02b3337a46b948c3590efff053f0e7546ec973528e19c5efefb78025f4d1db4dadf6e643ee60f2f867d49a611c7f0bfd915a2d87177ae34cf4d277edda9aa2ffc94c80d32f1c561b3dd7940c910aa42371e6bb41f76610bca5699dcf1e21846b0024a5039e95ac551d087e8cb2d72518e80d435e4ddf3fda09221ec339ac68549316dd83f8b37414fe3f8908d
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 14b9ae815418f5088e7ac987b53f20e9d5586d54
                       88394fbfd05d1a6aa203a4f899cd001b2c99ab7a
                       320c7f19760edd2832b79d5186ae1d2368c8b97b
                       d9d555024cd8444d8fadb4b9b50de115e6749b3a
                       574de3430dbb42c6dd9fcddf59a0f37e41b0ce90
                       0b56e1a0034d460be907a991f255f7a7adaded13
                       193b8d62cb17ef81dd601dba33a384fbfe20d007
                       e113cebbb32937363acc2633bc47c37b5f332e0b
                       09e653e5afeaea519c946585b0b899f8828c3b25
                       7e87f3dc82d3e4989bb750dc5f88254aadb6ca30
                       389e8be9be7b19da0383b11d13fe3eaeec5fbedf
                       cdad07d553ba9fb3e1f3e08cc47e581224ffbb13
                       0494aeb9b8a704728f0f63f50df6f298da7e0c67
                       f9630ff12505caa19a93bdf233d36730c2de803e
                       6dae63f48bc3e7782c20f26162e006740851c5e0
                       6f1de08797ff507eb27e5950169d60901dd9448b
                       4eb36ade8595ef6acd7baa5db389eed4fe83ad1f
                       67cc06d0bf8999fd3984ef89855bf861efdd6b83
                       770c66ea2729eb3fc0082cb668244a4285557746
                       5213a046
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [70:f7:ec:dd:d0:a3:97:33:56:ca:03:47:9f:68:59:23:9a:3d:27:96],[56:66:d1:a4]
        modulus: 9faf2933c8a7d567f2a8aada442b3e8974d1108f7c615330b4d7f1484c338072f90e1fd73d1a46f53ebaf6115e395ab88ade4a86e2002eb8723f165f15f04cf3a25afa3b3ee1c65deac1ce97f4306ad058c4a54c11910c1db5bf2f1c3d2296831f23c91b690d5328d2e681ffa22f0ecc7b0b165854fc4be432af42a15239300816a2c99f904e16d4986d77c1607e75ab4cee151f791f77e8753afd3a7fa9bf174a3f02cdb0c7e23f7b2906169196a41f7c903ada9b75d1b301faee66af842c2428d979703ebc64f873ba5524e2bb9cca59ca46fe664aa49deb00127076806b20b9b4c041620bbfdb77e964ff40252995352fe647a6c4edee81d89c5a75ded685
public exponent: 10001

] 
2022-12-06 04:39:19.849  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-06 04:39:19.852 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-06 04:39:19.855 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-12-06 04:39:19.856 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-06 04:39:19.856  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-12-06 04:39:19.857  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-06 04:39:19.858  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-06 04:39:19.858 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-06 04:39:19.859 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-06 04:39:19.859 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-06 04:39:19.864 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-06 04:39:19.865 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-06 04:39:19.865 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-06 04:39:19.866 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-06 04:39:20.086  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-06 04:39:20.087  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-06 04:39:20.088 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-06 04:39:20.089 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-06 04:39:20.092  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-06 04:39:20.093  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-06 04:39:20.094 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-06 04:39:20.094 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-06 04:39:20.095 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-06 04:39:20.096 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-06 04:39:20.097 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-06 04:39:20.097 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-06 04:39:20.099 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-06 04:39:20.099 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-06 04:39:20.100 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-06 04:39:20.101 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-06 04:39:20.107 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 469773687849548213302389279468020294913554401031
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Dec 06 02:58:09 UTC 2022
           Final Date: Sun Dec 05 02:58:08 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [3f:f2:11:c5:39:8e:b4:04:e5:c1:31:e3:6b:d4:a8:d8:d9:00:b0:8d],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 14b9ae815418f5088e7ac987b53f20e9d5586d54
                       88394fbfd05d1a6aa203a4f899cd001b2c99ab7a
                       320c7f19760edd2832b79d5186ae1d2368c8b97b
                       d9d555024cd8444d8fadb4b9b50de115e6749b3a
                       574de3430dbb42c6dd9fcddf59a0f37e41b0ce90
                       0b56e1a0034d460be907a991f255f7a7adaded13
                       193b8d62cb17ef81dd601dba33a384fbfe20d007
                       e113cebbb32937363acc2633bc47c37b5f332e0b
                       09e653e5afeaea519c946585b0b899f8828c3b25
                       7e87f3dc82d3e4989bb750dc5f88254aadb6ca30
                       389e8be9be7b19da0383b11d13fe3eaeec5fbedf
                       cdad07d553ba9fb3e1f3e08cc47e581224ffbb13
                       0494aeb9b8a704728f0f63f50df6f298da7e0c67
                       f9630ff12505caa19a93bdf233d36730c2de803e
                       6dae63f48bc3e7782c20f26162e006740851c5e0
                       6f1de08797ff507eb27e5950169d60901dd9448b
                       4eb36ade8595ef6acd7baa5db389eed4fe83ad1f
                       67cc06d0bf8999fd3984ef89855bf861efdd6b83
                       770c66ea2729eb3fc0082cb668244a4285557746
                       5213a046
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [97:09:ba:ae:54:98:49:43:8a:22:59:94:13:a9:44:ce:3c:36:7f:f7],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-12-06 04:41:21.937  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-06 04:41:21.938 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-06 04:41:21.940 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-12-06 04:41:21.940 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-06 04:41:21.941  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-12-06 04:41:21.942  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-06 04:41:21.942  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-06 04:41:21.943 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-06 04:41:21.943 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-06 04:41:21.944 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-06 04:41:21.949 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-06 04:41:21.949 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-06 04:41:21.950 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-06 04:41:21.950 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-06 04:41:22.103  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-06 04:41:22.104  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-06 04:41:22.105 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-06 04:41:22.106 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-06 04:41:22.108  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-06 04:41:22.109  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-06 04:41:22.109 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-06 04:41:22.110 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-06 04:41:22.110 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-06 04:41:22.112 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-06 04:41:22.112 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-06 04:41:22.113 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-06 04:41:22.114 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-06 04:41:22.114 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-06 04:41:22.115 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-06 04:41:22.116 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-06 04:41:22.121 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 469773687849548213302389279468020294913554401031
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Dec 06 02:58:09 UTC 2022
           Final Date: Sun Dec 05 02:58:08 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [3f:f2:11:c5:39:8e:b4:04:e5:c1:31:e3:6b:d4:a8:d8:d9:00:b0:8d],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 14b9ae815418f5088e7ac987b53f20e9d5586d54
                       88394fbfd05d1a6aa203a4f899cd001b2c99ab7a
                       320c7f19760edd2832b79d5186ae1d2368c8b97b
                       d9d555024cd8444d8fadb4b9b50de115e6749b3a
                       574de3430dbb42c6dd9fcddf59a0f37e41b0ce90
                       0b56e1a0034d460be907a991f255f7a7adaded13
                       193b8d62cb17ef81dd601dba33a384fbfe20d007
                       e113cebbb32937363acc2633bc47c37b5f332e0b
                       09e653e5afeaea519c946585b0b899f8828c3b25
                       7e87f3dc82d3e4989bb750dc5f88254aadb6ca30
                       389e8be9be7b19da0383b11d13fe3eaeec5fbedf
                       cdad07d553ba9fb3e1f3e08cc47e581224ffbb13
                       0494aeb9b8a704728f0f63f50df6f298da7e0c67
                       f9630ff12505caa19a93bdf233d36730c2de803e
                       6dae63f48bc3e7782c20f26162e006740851c5e0
                       6f1de08797ff507eb27e5950169d60901dd9448b
                       4eb36ade8595ef6acd7baa5db389eed4fe83ad1f
                       67cc06d0bf8999fd3984ef89855bf861efdd6b83
                       770c66ea2729eb3fc0082cb668244a4285557746
                       5213a046
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [48:32:5e:c7:b5:d7:87:f8:72:fd:54:54:ae:b3:7b:27:b7:15:a6:f3],[56:66:d1:a4]
        modulus: b4ad497dc21688e448c3509c75b6f797fe27e129ad0078ce701dd3c3539137cc287bb689848892bfac39e03465eb6c19feaad83a5b74985b32e1c66a52fc47747ec4991beab8bb2d6b6af91dbe02e99244074590bdf20c40c56e739214e917d7c540d192c5413b1b42119e473d06f8b029495eec760bb2e9d5a6e645bb9643c78cf6754f23c24479ffef6ef22090689a4f4b42da277044d64990067071735fb1e2b53164d1fe614effa9177244e7bdd17c9cd69d3f914cd48fdca32a30f8e712c1599aec4ff0e81988bb32fcda147f8efcc6bc0d536de026023592119c10e8c2ed8445220b8346205b2b20eaeef6c0bcbc25b47ca02df71a0f37227767e90dc1
public exponent: 10001

] 
2022-12-06 04:43:36.004  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-06 04:43:36.005 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-06 04:43:36.007 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-12-06 04:43:36.007 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-06 04:43:36.008  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-12-06 04:43:36.009  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-06 04:43:36.009  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-06 04:43:36.010 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-06 04:43:36.010 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-06 04:43:36.010 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-06 04:43:36.014 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-06 04:43:36.015 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-06 04:43:36.015 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-06 04:43:36.016 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-06 04:43:36.147  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-06 04:43:36.148  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-06 04:43:36.148 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-06 04:43:36.149 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-06 04:43:36.151  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-06 04:43:36.151  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-06 04:43:36.152 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-06 04:43:36.152 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-06 04:43:36.152 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-06 04:43:36.153 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-06 04:43:36.153 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-06 04:43:36.154 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-06 04:43:36.155 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-06 04:43:36.155 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-06 04:43:36.155 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-06 04:43:36.156 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-06 04:43:36.160 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 469773687849548213302389279468020294913554401031
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Dec 06 02:58:09 UTC 2022
           Final Date: Sun Dec 05 02:58:08 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [3f:f2:11:c5:39:8e:b4:04:e5:c1:31:e3:6b:d4:a8:d8:d9:00:b0:8d],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 14b9ae815418f5088e7ac987b53f20e9d5586d54
                       88394fbfd05d1a6aa203a4f899cd001b2c99ab7a
                       320c7f19760edd2832b79d5186ae1d2368c8b97b
                       d9d555024cd8444d8fadb4b9b50de115e6749b3a
                       574de3430dbb42c6dd9fcddf59a0f37e41b0ce90
                       0b56e1a0034d460be907a991f255f7a7adaded13
                       193b8d62cb17ef81dd601dba33a384fbfe20d007
                       e113cebbb32937363acc2633bc47c37b5f332e0b
                       09e653e5afeaea519c946585b0b899f8828c3b25
                       7e87f3dc82d3e4989bb750dc5f88254aadb6ca30
                       389e8be9be7b19da0383b11d13fe3eaeec5fbedf
                       cdad07d553ba9fb3e1f3e08cc47e581224ffbb13
                       0494aeb9b8a704728f0f63f50df6f298da7e0c67
                       f9630ff12505caa19a93bdf233d36730c2de803e
                       6dae63f48bc3e7782c20f26162e006740851c5e0
                       6f1de08797ff507eb27e5950169d60901dd9448b
                       4eb36ade8595ef6acd7baa5db389eed4fe83ad1f
                       67cc06d0bf8999fd3984ef89855bf861efdd6b83
                       770c66ea2729eb3fc0082cb668244a4285557746
                       5213a046
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [e4:fc:d2:3a:3b:1c:7d:60:1e:8d:95:59:8e:2c:a2:26:ac:cb:c2:c1],[56:66:d1:a4]
        modulus: dd25f68b0496161d2615115cab7e3e8b35bcbf6a7664e7213524e39f41e8c7ad87c8b2d7d4b17d15e95a3f0e720311377e9f5431084fbcbd097e6143699086c9eb4b7e60c21f8bb6d439540c0e8ce9916b10697b4d24ec7eadbbe164c6af1331426a9cb93115c7c94545d25b917e1a86c47c1ea9dcc1d59061da78fafb25300c02c0c462f1c4d7d1a1b2b1a090a89ea2114c73607f2f4df44769ad5e6a5c8a63cc44705ee7b385820d0dd47dd43a946bf23a6ecc66d440321aa0b605ee176d4277d016f4da6cf478e3518968e93fdb1f5ff39115f62f275aa1ec2301627029f2d898b5091980053a85e87087fe8e02ec3ba5f146ca7834eeed275a9348e452b3
public exponent: 10001

] 
2022-12-06 04:46:05.584  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-06 04:46:05.586 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-06 04:46:05.587 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-12-06 04:46:05.588 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-06 04:46:05.588  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-12-06 04:46:05.589  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-06 04:46:05.589  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-06 04:46:05.590 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-06 04:46:05.590 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-06 04:46:05.591 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-06 04:46:05.595 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-06 04:46:05.596 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-06 04:46:05.596 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-06 04:46:05.596 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-06 04:46:05.724  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-06 04:46:05.725  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-06 04:46:05.725 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-06 04:46:05.725 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-06 04:46:05.726  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-06 04:46:05.727  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-06 04:46:05.727 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-06 04:46:05.728 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-06 04:46:05.728 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-06 04:46:05.729 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-06 04:46:05.729 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-06 04:46:05.729 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-06 04:46:05.730 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-06 04:46:05.730 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-06 04:46:05.730 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-06 04:46:05.731 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-06 04:46:05.735 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 469773687849548213302389279468020294913554401031
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Dec 06 02:58:09 UTC 2022
           Final Date: Sun Dec 05 02:58:08 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [3f:f2:11:c5:39:8e:b4:04:e5:c1:31:e3:6b:d4:a8:d8:d9:00:b0:8d],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 14b9ae815418f5088e7ac987b53f20e9d5586d54
                       88394fbfd05d1a6aa203a4f899cd001b2c99ab7a
                       320c7f19760edd2832b79d5186ae1d2368c8b97b
                       d9d555024cd8444d8fadb4b9b50de115e6749b3a
                       574de3430dbb42c6dd9fcddf59a0f37e41b0ce90
                       0b56e1a0034d460be907a991f255f7a7adaded13
                       193b8d62cb17ef81dd601dba33a384fbfe20d007
                       e113cebbb32937363acc2633bc47c37b5f332e0b
                       09e653e5afeaea519c946585b0b899f8828c3b25
                       7e87f3dc82d3e4989bb750dc5f88254aadb6ca30
                       389e8be9be7b19da0383b11d13fe3eaeec5fbedf
                       cdad07d553ba9fb3e1f3e08cc47e581224ffbb13
                       0494aeb9b8a704728f0f63f50df6f298da7e0c67
                       f9630ff12505caa19a93bdf233d36730c2de803e
                       6dae63f48bc3e7782c20f26162e006740851c5e0
                       6f1de08797ff507eb27e5950169d60901dd9448b
                       4eb36ade8595ef6acd7baa5db389eed4fe83ad1f
                       67cc06d0bf8999fd3984ef89855bf861efdd6b83
                       770c66ea2729eb3fc0082cb668244a4285557746
                       5213a046
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [80:72:47:9c:b7:68:f2:7e:28:fb:78:c2:8f:6b:fa:5d:07:b4:e4:40],[56:66:d1:a4]
        modulus: a5013b536a8c1af0c10abcffe2c3da45dc9ea3f1a87d88adb7689516df59452632b82bf915c7ad5b3307cc77b90b01dcaa58d352a6448e8d8ee56b16cb83be99ee7a56705d42afa7058b0d3505a3f324de5ae336e46a5047ca2d26fadf8bf9cd8697555b67a682bd60cffae5c421d299585ff4153ae74d3a95dec777f1860f3e339aff217392a69fc0ef46b7b7865cfeeea1442d9594234a01232fc59dde4c116eba25cd32871e7a9a2cd722338eb0a38d531ecbabedccecf5463e1c3a62f71faf450514f73bc02e7116b24e142cdb4f58a12431ece86ae4fba007c455a0421872712a9e468791437c3c3cf370afcfef1a471da8f5acf095d32de5e63701b137
public exponent: 10001

] 
2022-12-06 04:53:45.194  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-06 04:53:45.197 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-06 04:53:45.199 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-12-06 04:53:45.200 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-06 04:53:45.201  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-12-06 04:53:45.201  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-06 04:53:45.202  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-06 04:53:45.203 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-06 04:53:45.204 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-06 04:53:45.204 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-06 04:53:45.210 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-06 04:53:45.210 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-06 04:53:45.211 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-06 04:53:45.211 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-06 04:53:45.359  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-06 04:53:45.360  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-06 04:53:45.360 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-06 04:53:45.361 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-06 04:53:45.362  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-06 04:53:45.362  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-06 04:53:45.363 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-06 04:53:45.363 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-06 04:53:45.363 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-06 04:53:45.364 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-06 04:53:45.365 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-06 04:53:45.365 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-06 04:53:45.366 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-06 04:53:45.366 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-06 04:53:45.366 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-06 04:53:45.367 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-06 04:53:45.371 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 469773687849548213302389279468020294913554401031
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Dec 06 02:58:09 UTC 2022
           Final Date: Sun Dec 05 02:58:08 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [3f:f2:11:c5:39:8e:b4:04:e5:c1:31:e3:6b:d4:a8:d8:d9:00:b0:8d],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 14b9ae815418f5088e7ac987b53f20e9d5586d54
                       88394fbfd05d1a6aa203a4f899cd001b2c99ab7a
                       320c7f19760edd2832b79d5186ae1d2368c8b97b
                       d9d555024cd8444d8fadb4b9b50de115e6749b3a
                       574de3430dbb42c6dd9fcddf59a0f37e41b0ce90
                       0b56e1a0034d460be907a991f255f7a7adaded13
                       193b8d62cb17ef81dd601dba33a384fbfe20d007
                       e113cebbb32937363acc2633bc47c37b5f332e0b
                       09e653e5afeaea519c946585b0b899f8828c3b25
                       7e87f3dc82d3e4989bb750dc5f88254aadb6ca30
                       389e8be9be7b19da0383b11d13fe3eaeec5fbedf
                       cdad07d553ba9fb3e1f3e08cc47e581224ffbb13
                       0494aeb9b8a704728f0f63f50df6f298da7e0c67
                       f9630ff12505caa19a93bdf233d36730c2de803e
                       6dae63f48bc3e7782c20f26162e006740851c5e0
                       6f1de08797ff507eb27e5950169d60901dd9448b
                       4eb36ade8595ef6acd7baa5db389eed4fe83ad1f
                       67cc06d0bf8999fd3984ef89855bf861efdd6b83
                       770c66ea2729eb3fc0082cb668244a4285557746
                       5213a046
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [b5:2a:35:24:7b:ee:59:a8:0d:2d:63:82:0d:4b:e8:63:e4:f2:51:f5],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-12-06 04:59:09.835  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-06 04:59:09.837 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-06 04:59:09.840 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-12-06 04:59:09.841 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-06 04:59:09.842  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-12-06 04:59:09.843  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-06 04:59:09.843  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-06 04:59:09.844 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-06 04:59:09.844 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-06 04:59:09.845 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-06 04:59:09.849 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-06 04:59:09.850 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-06 04:59:09.850 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-06 04:59:09.851 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-06 04:59:09.981  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-06 04:59:09.981  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-06 04:59:09.982 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-06 04:59:09.982 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-06 04:59:09.983  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-06 04:59:09.984  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-06 04:59:09.984 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-06 04:59:09.984 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-06 04:59:09.985 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-06 04:59:09.985 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-06 04:59:09.986 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-06 04:59:09.986 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-06 04:59:09.987 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-06 04:59:09.987 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-06 04:59:09.987 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-06 04:59:09.988 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-06 04:59:09.991 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 469773687849548213302389279468020294913554401031
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Dec 06 02:58:09 UTC 2022
           Final Date: Sun Dec 05 02:58:08 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [3f:f2:11:c5:39:8e:b4:04:e5:c1:31:e3:6b:d4:a8:d8:d9:00:b0:8d],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 14b9ae815418f5088e7ac987b53f20e9d5586d54
                       88394fbfd05d1a6aa203a4f899cd001b2c99ab7a
                       320c7f19760edd2832b79d5186ae1d2368c8b97b
                       d9d555024cd8444d8fadb4b9b50de115e6749b3a
                       574de3430dbb42c6dd9fcddf59a0f37e41b0ce90
                       0b56e1a0034d460be907a991f255f7a7adaded13
                       193b8d62cb17ef81dd601dba33a384fbfe20d007
                       e113cebbb32937363acc2633bc47c37b5f332e0b
                       09e653e5afeaea519c946585b0b899f8828c3b25
                       7e87f3dc82d3e4989bb750dc5f88254aadb6ca30
                       389e8be9be7b19da0383b11d13fe3eaeec5fbedf
                       cdad07d553ba9fb3e1f3e08cc47e581224ffbb13
                       0494aeb9b8a704728f0f63f50df6f298da7e0c67
                       f9630ff12505caa19a93bdf233d36730c2de803e
                       6dae63f48bc3e7782c20f26162e006740851c5e0
                       6f1de08797ff507eb27e5950169d60901dd9448b
                       4eb36ade8595ef6acd7baa5db389eed4fe83ad1f
                       67cc06d0bf8999fd3984ef89855bf861efdd6b83
                       770c66ea2729eb3fc0082cb668244a4285557746
                       5213a046
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [97:f6:f3:73:1e:96:75:6c:9c:b9:e1:ab:64:6f:78:2c:63:8b:96:f0],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-12-06 05:05:37.895  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-06 05:05:37.899 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-06 05:05:37.903 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-12-06 05:05:37.905 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-06 05:05:37.906  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-12-06 05:05:37.907  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-06 05:05:37.907  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-06 05:05:37.908 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-06 05:05:37.908 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-06 05:05:37.909 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-06 05:05:37.913 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-06 05:05:37.914 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-06 05:05:37.915 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-06 05:05:37.915 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-06 05:05:38.095  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-06 05:05:38.096  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-06 05:05:38.096 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-06 05:05:38.096 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-06 05:05:38.098  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-06 05:05:38.099  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-06 05:05:38.099 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-06 05:05:38.100 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-06 05:05:38.100 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-06 05:05:38.101 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-06 05:05:38.101 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-06 05:05:38.102 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-06 05:05:38.103 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-06 05:05:38.103 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-06 05:05:38.103 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-06 05:05:38.104 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-06 05:05:38.108 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 469773687849548213302389279468020294913554401031
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Dec 06 02:58:09 UTC 2022
           Final Date: Sun Dec 05 02:58:08 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [3f:f2:11:c5:39:8e:b4:04:e5:c1:31:e3:6b:d4:a8:d8:d9:00:b0:8d],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 14b9ae815418f5088e7ac987b53f20e9d5586d54
                       88394fbfd05d1a6aa203a4f899cd001b2c99ab7a
                       320c7f19760edd2832b79d5186ae1d2368c8b97b
                       d9d555024cd8444d8fadb4b9b50de115e6749b3a
                       574de3430dbb42c6dd9fcddf59a0f37e41b0ce90
                       0b56e1a0034d460be907a991f255f7a7adaded13
                       193b8d62cb17ef81dd601dba33a384fbfe20d007
                       e113cebbb32937363acc2633bc47c37b5f332e0b
                       09e653e5afeaea519c946585b0b899f8828c3b25
                       7e87f3dc82d3e4989bb750dc5f88254aadb6ca30
                       389e8be9be7b19da0383b11d13fe3eaeec5fbedf
                       cdad07d553ba9fb3e1f3e08cc47e581224ffbb13
                       0494aeb9b8a704728f0f63f50df6f298da7e0c67
                       f9630ff12505caa19a93bdf233d36730c2de803e
                       6dae63f48bc3e7782c20f26162e006740851c5e0
                       6f1de08797ff507eb27e5950169d60901dd9448b
                       4eb36ade8595ef6acd7baa5db389eed4fe83ad1f
                       67cc06d0bf8999fd3984ef89855bf861efdd6b83
                       770c66ea2729eb3fc0082cb668244a4285557746
                       5213a046
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [73:1a:2b:4a:43:dc:d1:bb:e0:e2:29:ac:2a:e0:d4:68:02:38:9e:c2],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-12-06 05:11:07.012  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-06 05:11:07.014 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-06 05:11:07.017 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-12-06 05:11:07.017 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-06 05:11:07.018  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-12-06 05:11:07.018  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-06 05:11:07.018  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-06 05:11:07.019 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-06 05:11:07.019 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-06 05:11:07.019 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-06 05:11:07.023 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-06 05:11:07.023 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-06 05:11:07.024 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-06 05:11:07.024 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-06 05:11:07.193  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-06 05:11:07.194  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-06 05:11:07.194 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-06 05:11:07.195 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-06 05:11:07.196  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-06 05:11:07.197  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-06 05:11:07.197 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-06 05:11:07.197 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-06 05:11:07.198 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-06 05:11:07.198 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-06 05:11:07.199 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-06 05:11:07.199 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-06 05:11:07.200 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-06 05:11:07.200 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-06 05:11:07.201 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-06 05:11:07.201 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-06 05:11:07.204 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 469773687849548213302389279468020294913554401031
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Dec 06 02:58:09 UTC 2022
           Final Date: Sun Dec 05 02:58:08 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [3f:f2:11:c5:39:8e:b4:04:e5:c1:31:e3:6b:d4:a8:d8:d9:00:b0:8d],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 14b9ae815418f5088e7ac987b53f20e9d5586d54
                       88394fbfd05d1a6aa203a4f899cd001b2c99ab7a
                       320c7f19760edd2832b79d5186ae1d2368c8b97b
                       d9d555024cd8444d8fadb4b9b50de115e6749b3a
                       574de3430dbb42c6dd9fcddf59a0f37e41b0ce90
                       0b56e1a0034d460be907a991f255f7a7adaded13
                       193b8d62cb17ef81dd601dba33a384fbfe20d007
                       e113cebbb32937363acc2633bc47c37b5f332e0b
                       09e653e5afeaea519c946585b0b899f8828c3b25
                       7e87f3dc82d3e4989bb750dc5f88254aadb6ca30
                       389e8be9be7b19da0383b11d13fe3eaeec5fbedf
                       cdad07d553ba9fb3e1f3e08cc47e581224ffbb13
                       0494aeb9b8a704728f0f63f50df6f298da7e0c67
                       f9630ff12505caa19a93bdf233d36730c2de803e
                       6dae63f48bc3e7782c20f26162e006740851c5e0
                       6f1de08797ff507eb27e5950169d60901dd9448b
                       4eb36ade8595ef6acd7baa5db389eed4fe83ad1f
                       67cc06d0bf8999fd3984ef89855bf861efdd6b83
                       770c66ea2729eb3fc0082cb668244a4285557746
                       5213a046
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [1a:80:d8:cc:5e:81:8d:66:4d:47:81:f2:e0:c9:7d:08:9d:9b:89:73],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-12-06 05:17:57.004  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-06 05:17:57.008 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-06 05:17:57.011 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-12-06 05:17:57.013 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-06 05:17:57.013  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-12-06 05:17:57.014  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-06 05:17:57.014  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-06 05:17:57.015 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-06 05:17:57.016 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-06 05:17:57.017 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-06 05:17:57.023 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-06 05:17:57.024 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-06 05:17:57.024 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-06 05:17:57.025 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-06 05:17:57.195  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-06 05:17:57.196  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-06 05:17:57.196 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-06 05:17:57.197 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-06 05:17:57.198  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-06 05:17:57.199  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-06 05:17:57.199 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-06 05:17:57.200 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-06 05:17:57.200 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-06 05:17:57.201 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-06 05:17:57.201 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-06 05:17:57.202 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-06 05:17:57.202 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-06 05:17:57.202 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-06 05:17:57.203 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-06 05:17:57.203 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-06 05:17:57.207 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 469773687849548213302389279468020294913554401031
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Dec 06 02:58:09 UTC 2022
           Final Date: Sun Dec 05 02:58:08 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [3f:f2:11:c5:39:8e:b4:04:e5:c1:31:e3:6b:d4:a8:d8:d9:00:b0:8d],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 14b9ae815418f5088e7ac987b53f20e9d5586d54
                       88394fbfd05d1a6aa203a4f899cd001b2c99ab7a
                       320c7f19760edd2832b79d5186ae1d2368c8b97b
                       d9d555024cd8444d8fadb4b9b50de115e6749b3a
                       574de3430dbb42c6dd9fcddf59a0f37e41b0ce90
                       0b56e1a0034d460be907a991f255f7a7adaded13
                       193b8d62cb17ef81dd601dba33a384fbfe20d007
                       e113cebbb32937363acc2633bc47c37b5f332e0b
                       09e653e5afeaea519c946585b0b899f8828c3b25
                       7e87f3dc82d3e4989bb750dc5f88254aadb6ca30
                       389e8be9be7b19da0383b11d13fe3eaeec5fbedf
                       cdad07d553ba9fb3e1f3e08cc47e581224ffbb13
                       0494aeb9b8a704728f0f63f50df6f298da7e0c67
                       f9630ff12505caa19a93bdf233d36730c2de803e
                       6dae63f48bc3e7782c20f26162e006740851c5e0
                       6f1de08797ff507eb27e5950169d60901dd9448b
                       4eb36ade8595ef6acd7baa5db389eed4fe83ad1f
                       67cc06d0bf8999fd3984ef89855bf861efdd6b83
                       770c66ea2729eb3fc0082cb668244a4285557746
                       5213a046
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [44:9e:42:a9:36:6d:0f:4b:0a:9f:cc:52:7d:b9:42:31:5c:8d:4f:c2],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-12-06 05:24:29.631  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-06 05:24:29.635 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-06 05:24:29.639 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-12-06 05:24:29.640 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-06 05:24:29.641  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-12-06 05:24:29.641  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-06 05:24:29.642  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-06 05:24:29.642 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-06 05:24:29.643 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-06 05:24:29.643 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-06 05:24:29.647 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-06 05:24:29.648 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-06 05:24:29.649 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-06 05:24:29.650 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-06 05:24:29.820  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-06 05:24:29.820  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-06 05:24:29.821 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-06 05:24:29.821 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-06 05:24:29.822  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-06 05:24:29.823  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-06 05:24:29.823 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-06 05:24:29.823 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-06 05:24:29.823 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-06 05:24:29.824 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-06 05:24:29.825 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-06 05:24:29.825 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-06 05:24:29.825 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-06 05:24:29.826 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-06 05:24:29.826 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-06 05:24:29.827 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-06 05:24:29.831 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 469773687849548213302389279468020294913554401031
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Dec 06 02:58:09 UTC 2022
           Final Date: Sun Dec 05 02:58:08 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [3f:f2:11:c5:39:8e:b4:04:e5:c1:31:e3:6b:d4:a8:d8:d9:00:b0:8d],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 14b9ae815418f5088e7ac987b53f20e9d5586d54
                       88394fbfd05d1a6aa203a4f899cd001b2c99ab7a
                       320c7f19760edd2832b79d5186ae1d2368c8b97b
                       d9d555024cd8444d8fadb4b9b50de115e6749b3a
                       574de3430dbb42c6dd9fcddf59a0f37e41b0ce90
                       0b56e1a0034d460be907a991f255f7a7adaded13
                       193b8d62cb17ef81dd601dba33a384fbfe20d007
                       e113cebbb32937363acc2633bc47c37b5f332e0b
                       09e653e5afeaea519c946585b0b899f8828c3b25
                       7e87f3dc82d3e4989bb750dc5f88254aadb6ca30
                       389e8be9be7b19da0383b11d13fe3eaeec5fbedf
                       cdad07d553ba9fb3e1f3e08cc47e581224ffbb13
                       0494aeb9b8a704728f0f63f50df6f298da7e0c67
                       f9630ff12505caa19a93bdf233d36730c2de803e
                       6dae63f48bc3e7782c20f26162e006740851c5e0
                       6f1de08797ff507eb27e5950169d60901dd9448b
                       4eb36ade8595ef6acd7baa5db389eed4fe83ad1f
                       67cc06d0bf8999fd3984ef89855bf861efdd6b83
                       770c66ea2729eb3fc0082cb668244a4285557746
                       5213a046
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [29:44:bb:07:92:d7:46:04:3c:d0:fc:44:ba:ff:a3:49:af:3b:49:ce],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-12-06 05:24:46.668  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-06 05:24:46.669 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-06 05:24:46.670 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-12-06 05:24:46.671 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-06 05:24:46.671  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-12-06 05:24:46.672  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-06 05:24:46.672  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-06 05:24:46.673 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-06 05:24:46.673 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-06 05:24:46.673 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-06 05:24:46.677 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-06 05:24:46.677 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-06 05:24:46.678 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-06 05:24:46.678 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-06 05:24:46.785  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-06 05:24:46.786  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-06 05:24:46.786 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-06 05:24:46.786 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-06 05:24:46.788  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-06 05:24:46.788  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-06 05:24:46.788 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-06 05:24:46.789 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-06 05:24:46.789 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-06 05:24:46.790 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-06 05:24:46.790 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-06 05:24:46.791 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-06 05:24:46.792 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-06 05:24:46.792 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-06 05:24:46.792 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-06 05:24:46.793 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-06 05:24:46.795 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 469773687849548213302389279468020294913554401031
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Dec 06 02:58:09 UTC 2022
           Final Date: Sun Dec 05 02:58:08 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [3f:f2:11:c5:39:8e:b4:04:e5:c1:31:e3:6b:d4:a8:d8:d9:00:b0:8d],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 14b9ae815418f5088e7ac987b53f20e9d5586d54
                       88394fbfd05d1a6aa203a4f899cd001b2c99ab7a
                       320c7f19760edd2832b79d5186ae1d2368c8b97b
                       d9d555024cd8444d8fadb4b9b50de115e6749b3a
                       574de3430dbb42c6dd9fcddf59a0f37e41b0ce90
                       0b56e1a0034d460be907a991f255f7a7adaded13
                       193b8d62cb17ef81dd601dba33a384fbfe20d007
                       e113cebbb32937363acc2633bc47c37b5f332e0b
                       09e653e5afeaea519c946585b0b899f8828c3b25
                       7e87f3dc82d3e4989bb750dc5f88254aadb6ca30
                       389e8be9be7b19da0383b11d13fe3eaeec5fbedf
                       cdad07d553ba9fb3e1f3e08cc47e581224ffbb13
                       0494aeb9b8a704728f0f63f50df6f298da7e0c67
                       f9630ff12505caa19a93bdf233d36730c2de803e
                       6dae63f48bc3e7782c20f26162e006740851c5e0
                       6f1de08797ff507eb27e5950169d60901dd9448b
                       4eb36ade8595ef6acd7baa5db389eed4fe83ad1f
                       67cc06d0bf8999fd3984ef89855bf861efdd6b83
                       770c66ea2729eb3fc0082cb668244a4285557746
                       5213a046
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [6a:57:1a:8b:22:26:f7:90:65:70:0b:57:6a:9d:78:f3:83:c6:59:99],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-12-06 05:48:28.528  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-06 05:48:28.531 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-06 05:48:28.534 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-12-06 05:48:28.535 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-06 05:48:28.536  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-12-06 05:48:28.536  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-06 05:48:28.537  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-06 05:48:28.538 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-06 05:48:28.538 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-06 05:48:28.539 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-06 05:48:28.543 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-06 05:48:28.545 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-06 05:48:28.545 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-06 05:48:28.545 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-06 05:48:28.688  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-06 05:48:28.689  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-06 05:48:28.689 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-06 05:48:28.689 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-06 05:48:28.691  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-06 05:48:28.691  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-06 05:48:28.691 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-06 05:48:28.692 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-06 05:48:28.692 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-06 05:48:28.693 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-06 05:48:28.693 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-06 05:48:28.693 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-06 05:48:28.694 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-06 05:48:28.694 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-06 05:48:28.694 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-06 05:48:28.695 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-06 05:48:28.698 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 469773687849548213302389279468020294913554401031
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Dec 06 02:58:09 UTC 2022
           Final Date: Sun Dec 05 02:58:08 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [3f:f2:11:c5:39:8e:b4:04:e5:c1:31:e3:6b:d4:a8:d8:d9:00:b0:8d],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 14b9ae815418f5088e7ac987b53f20e9d5586d54
                       88394fbfd05d1a6aa203a4f899cd001b2c99ab7a
                       320c7f19760edd2832b79d5186ae1d2368c8b97b
                       d9d555024cd8444d8fadb4b9b50de115e6749b3a
                       574de3430dbb42c6dd9fcddf59a0f37e41b0ce90
                       0b56e1a0034d460be907a991f255f7a7adaded13
                       193b8d62cb17ef81dd601dba33a384fbfe20d007
                       e113cebbb32937363acc2633bc47c37b5f332e0b
                       09e653e5afeaea519c946585b0b899f8828c3b25
                       7e87f3dc82d3e4989bb750dc5f88254aadb6ca30
                       389e8be9be7b19da0383b11d13fe3eaeec5fbedf
                       cdad07d553ba9fb3e1f3e08cc47e581224ffbb13
                       0494aeb9b8a704728f0f63f50df6f298da7e0c67
                       f9630ff12505caa19a93bdf233d36730c2de803e
                       6dae63f48bc3e7782c20f26162e006740851c5e0
                       6f1de08797ff507eb27e5950169d60901dd9448b
                       4eb36ade8595ef6acd7baa5db389eed4fe83ad1f
                       67cc06d0bf8999fd3984ef89855bf861efdd6b83
                       770c66ea2729eb3fc0082cb668244a4285557746
                       5213a046
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [d7:0c:4f:a2:f7:81:4e:b5:47:f6:16:27:9c:25:43:a6:95:51:db:c8],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-12-06 05:48:35.496  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-06 05:48:35.498 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-06 05:48:35.499 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-12-06 05:48:35.500 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-06 05:48:35.500  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-12-06 05:48:35.501  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-06 05:48:35.502  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-06 05:48:35.502 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-06 05:48:35.502 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-06 05:48:35.503 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-06 05:48:35.506 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-06 05:48:35.506 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-06 05:48:35.506 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-06 05:48:35.507 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-06 05:48:35.621  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-06 05:48:35.622  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-06 05:48:35.622 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-06 05:48:35.623 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-06 05:48:35.625  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-06 05:48:35.625  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-06 05:48:35.626 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-06 05:48:35.627 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-06 05:48:35.627 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-06 05:48:35.628 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-06 05:48:35.628 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-06 05:48:35.629 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-06 05:48:35.629 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-06 05:48:35.630 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-06 05:48:35.630 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-06 05:48:35.631 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-06 05:48:35.633 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 469773687849548213302389279468020294913554401031
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Dec 06 02:58:09 UTC 2022
           Final Date: Sun Dec 05 02:58:08 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [3f:f2:11:c5:39:8e:b4:04:e5:c1:31:e3:6b:d4:a8:d8:d9:00:b0:8d],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 14b9ae815418f5088e7ac987b53f20e9d5586d54
                       88394fbfd05d1a6aa203a4f899cd001b2c99ab7a
                       320c7f19760edd2832b79d5186ae1d2368c8b97b
                       d9d555024cd8444d8fadb4b9b50de115e6749b3a
                       574de3430dbb42c6dd9fcddf59a0f37e41b0ce90
                       0b56e1a0034d460be907a991f255f7a7adaded13
                       193b8d62cb17ef81dd601dba33a384fbfe20d007
                       e113cebbb32937363acc2633bc47c37b5f332e0b
                       09e653e5afeaea519c946585b0b899f8828c3b25
                       7e87f3dc82d3e4989bb750dc5f88254aadb6ca30
                       389e8be9be7b19da0383b11d13fe3eaeec5fbedf
                       cdad07d553ba9fb3e1f3e08cc47e581224ffbb13
                       0494aeb9b8a704728f0f63f50df6f298da7e0c67
                       f9630ff12505caa19a93bdf233d36730c2de803e
                       6dae63f48bc3e7782c20f26162e006740851c5e0
                       6f1de08797ff507eb27e5950169d60901dd9448b
                       4eb36ade8595ef6acd7baa5db389eed4fe83ad1f
                       67cc06d0bf8999fd3984ef89855bf861efdd6b83
                       770c66ea2729eb3fc0082cb668244a4285557746
                       5213a046
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [93:b8:8d:b6:67:87:bc:10:99:29:40:dc:ff:da:e5:c7:69:34:33:da],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

]