Results

By type

          2022-12-08 02:57:31,509 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-12-08 02:57:33,376 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-12-08 02:57:34.591  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Dec 08, 2022 2:57:37 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Dec 08, 2022 2:57:37 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Dec 08, 2022 2:57:37 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Dec 08, 2022 2:57:38 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-12-08 02:57:38.929 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-12-08 02:57:39.370  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-12-08 02:57:39.635  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-12-08 02:57:40.920 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-12-08 02:57:40.924 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
2022-12-08 02:57:40.927 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-12-08 02:57:40.934 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-12-08 02:57:41.001 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2022-12-08 02:57:41.008 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
	{GET [/docs]}: redirectToUi(HttpServletRequest)
2022-12-08 02:57:41.223 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-12-08 02:57:42.645 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Dec 08, 2022 2:57:44 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-12-08 02:57:44.396  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 14.765 seconds (JVM running for 17.844)
Dec 08, 2022 2:58:04 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-12-08 02:58:33.067  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-08 02:58:33.082 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-08 02:58:33.148 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-12-08 02:58:33.155 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-08 02:58:33.204  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-12-08 02:58:33.208  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-08 02:58:33.209  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-08 02:58:33.210 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-08 02:58:33.211 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-08 02:58:33.217 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-08 02:58:33.237 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-08 02:58:33.242 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-08 02:58:33.358 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-08 02:58:33.384 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-08 02:58:33.387 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-08 02:58:33.398 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-08 02:58:34.212  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-08 02:58:34.216  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-08 02:58:34.217 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-08 02:58:34.219 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-08 02:58:34.238  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-08 02:58:34.245  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-08 02:58:34.246 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-08 02:58:34.246 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-08 02:58:34.246 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-08 02:58:34.287 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-08 02:58:34.292 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-08 02:58:34.293 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-08 02:58:34.308 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-08 02:58:34.309 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-08 02:58:34.310 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-08 02:58:34.312 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-08 02:58:34.403 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 589208839865928687635669034821277214525682892339
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Dec 08 02:54:00 UTC 2022
           Final Date: Tue Dec 07 02:53:59 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [68:47:a9:bb:39:d0:1c:c4:71:35:54:82:45:42:b7:53:cf:c0:25:bf],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1cf7f8f8922b6dc4f59578ffe178be94b2796d9e
                       c767e1a1713b61860efe4021ead385add8e09c81
                       73f28cc5765601cca4ce29094dc8bf2f6104671e
                       25964d7132ff9c84290a4570b09509679980d7bb
                       3708d126ff4dd3bdc5d0c2ae84452d76282673bc
                       7a8cf4c963b477b1d1e57e162c84113186b428db
                       026597e939843b205a76364cd258dceba8f463bd
                       aa34339a1aada04d621fb1393bb2f5cfae1eed82
                       8137f00964a5a528dc7b86b5a2af2f89aeead98d
                       0359fb1994fb8bcfe4d2c7a6496879713d386878
                       f93bcafc38d3397af6d5acf9bc940889bae5e2fd
                       55d831ce3b0b27d4de7f6f721d5ab0bf5e168e84
                       031973117c2143c930d1dfa178ab2202802b7f54
                       7304c52ad29d19c8418f06ab5439ee2809419e75
                       9dab5bfd10c010bf09d9d3d24db39e686ecd9946
                       14a6959374eb01142850d3f9e5c5c6ed6dbd328c
                       472b21f8078bad8c4fb450770fd4357adb4bf42b
                       5512d58b0391a920eefda1f14070eac0e3174aed
                       4d8be4f68858239cffc5520f1ac43b8496cae27a
                       b22a56e2
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [01:9e:df:96:a4:d1:b7:d9:ad:ce:6b:78:a4:99:d0:86:c4:61:f9:27],[56:66:d1:a4]
        modulus: a683e5fcf35e65fce742d632cdfd2ca31723b0094c755270a61c4db68647fec33366426dba344911d8d22f12ca1e4e69e280f8809d79760df3f13a931b08eb7bfe6b86e8dbfac48b806b7d07305c522c23f4e60c201f16c76154ec6ca5d34b92ee37f33cc8dc6c99ba0ebea6bfe5939d9dc0abd5deaa32c1e0318ac40c58e4e49da8cefc959942191066cc04012ea43cfeecdbc08fb2e519a5751186229209a2c69ceb1b0e6ca87a34619e41dfad76589df1cd037f44d1d49c2d6130386957f6a0e7e04b0bc07011a061038c9e967a373c45eaf3171014c8279b9e5fa0eea487c2a504b30aa2c2c2987b29b37543ba191ef61cc44e3998b388dee92ce83942b9
public exponent: 10001

] 
2022-12-08 04:29:24.850  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-08 04:29:24.857 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-08 04:29:24.864 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-12-08 04:29:24.865 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-08 04:29:24.866  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-12-08 04:29:24.868  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-08 04:29:24.870  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-08 04:29:24.871 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-08 04:29:24.872 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-08 04:29:24.873 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-08 04:29:24.884 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-08 04:29:24.886 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-08 04:29:24.887 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-08 04:29:24.888 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-08 04:29:25.097  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-08 04:29:25.099  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-08 04:29:25.100 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-08 04:29:25.101 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-08 04:29:25.103  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-08 04:29:25.104  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-08 04:29:25.105 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-08 04:29:25.105 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-08 04:29:25.106 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-08 04:29:25.108 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-08 04:29:25.108 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-08 04:29:25.109 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-08 04:29:25.110 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-08 04:29:25.111 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-08 04:29:25.111 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-08 04:29:25.113 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-08 04:29:25.118 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 589208839865928687635669034821277214525682892339
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Dec 08 02:54:00 UTC 2022
           Final Date: Tue Dec 07 02:53:59 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [68:47:a9:bb:39:d0:1c:c4:71:35:54:82:45:42:b7:53:cf:c0:25:bf],[56:66:d1:a4]
        modulus: 9070b0ddd3408bd1cbe40a2bfe897e3e183aa2220b00a62b68631b4e3ac6cf9d1b3fcac3f0c1b7a01827018214f3a070d20aa40f8bff04b01e38b2e9dd8c0d6f0bd85ca06d35ffe7417e655f55a99b6bc5e5247bd4ab9e3c867ca0973f1c5b719e741c6fee11234b22e601cf527ee1a73fce1d982c8ec111baeaa1e6cbc452c2d15a05a1e751d9c78ef7bab6203b4f26b3e51db2e37c576baab6ae65965f1323329a92e9970cbbe077066dce9fc4968b1bb4fab911c413c6158aee1207072226fb35e6b6d168e5be16ebba78acc7dcb52b6fe73a5ed335324e607d0353f72e0e08fd79efbce520a2fbd6f273bc3a0f1d8dccb56be578a1fdbc120b379253a8ee1cdd65289540726fb502248551f2c257775712ca163020136575f3787a7e2550c11ca49ed7f130fecc84f2af851c7bee7692119327efaa6aad004aca1594fa696a2cbf1071f0ac53cd9403046a29d93945cee7e2c2286b57fac8397e57c6770498ead74164ffbc3e85919c5c4be2fc59c02631884dc439a4709617c39b85b671
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1cf7f8f8922b6dc4f59578ffe178be94b2796d9e
                       c767e1a1713b61860efe4021ead385add8e09c81
                       73f28cc5765601cca4ce29094dc8bf2f6104671e
                       25964d7132ff9c84290a4570b09509679980d7bb
                       3708d126ff4dd3bdc5d0c2ae84452d76282673bc
                       7a8cf4c963b477b1d1e57e162c84113186b428db
                       026597e939843b205a76364cd258dceba8f463bd
                       aa34339a1aada04d621fb1393bb2f5cfae1eed82
                       8137f00964a5a528dc7b86b5a2af2f89aeead98d
                       0359fb1994fb8bcfe4d2c7a6496879713d386878
                       f93bcafc38d3397af6d5acf9bc940889bae5e2fd
                       55d831ce3b0b27d4de7f6f721d5ab0bf5e168e84
                       031973117c2143c930d1dfa178ab2202802b7f54
                       7304c52ad29d19c8418f06ab5439ee2809419e75
                       9dab5bfd10c010bf09d9d3d24db39e686ecd9946
                       14a6959374eb01142850d3f9e5c5c6ed6dbd328c
                       472b21f8078bad8c4fb450770fd4357adb4bf42b
                       5512d58b0391a920eefda1f14070eac0e3174aed
                       4d8be4f68858239cffc5520f1ac43b8496cae27a
                       b22a56e2
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [64:a6:f9:df:2b:f3:6d:57:99:45:f9:94:b5:1e:e4:58:8c:5d:5b:39],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-12-08 04:31:12.904  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-08 04:31:12.906 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-08 04:31:12.909 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-12-08 04:31:12.911 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-08 04:31:12.911  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-12-08 04:31:12.913  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-08 04:31:12.914  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-08 04:31:12.914 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-08 04:31:12.915 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-08 04:31:12.916 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-08 04:31:12.923 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-08 04:31:12.925 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-08 04:31:12.926 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-08 04:31:12.926 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-08 04:31:13.109  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-08 04:31:13.109  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-08 04:31:13.110 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-08 04:31:13.110 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-08 04:31:13.115  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-08 04:31:13.115  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-08 04:31:13.116 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-08 04:31:13.116 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-08 04:31:13.117 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-08 04:31:13.118 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-08 04:31:13.118 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-08 04:31:13.119 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-08 04:31:13.128 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-08 04:31:13.129 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-08 04:31:13.129 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-08 04:31:13.132 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-08 04:31:13.138 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 589208839865928687635669034821277214525682892339
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Dec 08 02:54:00 UTC 2022
           Final Date: Tue Dec 07 02:53:59 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [68:47:a9:bb:39:d0:1c:c4:71:35:54:82:45:42:b7:53:cf:c0:25:bf],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1cf7f8f8922b6dc4f59578ffe178be94b2796d9e
                       c767e1a1713b61860efe4021ead385add8e09c81
                       73f28cc5765601cca4ce29094dc8bf2f6104671e
                       25964d7132ff9c84290a4570b09509679980d7bb
                       3708d126ff4dd3bdc5d0c2ae84452d76282673bc
                       7a8cf4c963b477b1d1e57e162c84113186b428db
                       026597e939843b205a76364cd258dceba8f463bd
                       aa34339a1aada04d621fb1393bb2f5cfae1eed82
                       8137f00964a5a528dc7b86b5a2af2f89aeead98d
                       0359fb1994fb8bcfe4d2c7a6496879713d386878
                       f93bcafc38d3397af6d5acf9bc940889bae5e2fd
                       55d831ce3b0b27d4de7f6f721d5ab0bf5e168e84
                       031973117c2143c930d1dfa178ab2202802b7f54
                       7304c52ad29d19c8418f06ab5439ee2809419e75
                       9dab5bfd10c010bf09d9d3d24db39e686ecd9946
                       14a6959374eb01142850d3f9e5c5c6ed6dbd328c
                       472b21f8078bad8c4fb450770fd4357adb4bf42b
                       5512d58b0391a920eefda1f14070eac0e3174aed
                       4d8be4f68858239cffc5520f1ac43b8496cae27a
                       b22a56e2
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [63:3c:41:a4:aa:45:bd:ec:b2:6d:4a:20:37:96:1a:25:bd:c1:af:e8],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-12-08 04:33:22.512  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-08 04:33:22.519 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-08 04:33:22.525 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-12-08 04:33:22.531 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-08 04:33:22.532  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-12-08 04:33:22.534  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-08 04:33:22.534  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-08 04:33:22.535 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-08 04:33:22.538 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-08 04:33:22.539 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-08 04:33:22.548 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-08 04:33:22.552 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-08 04:33:22.553 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-08 04:33:22.554 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-08 04:33:22.744  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-08 04:33:22.745  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-08 04:33:22.745 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-08 04:33:22.746 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-08 04:33:22.750  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-08 04:33:22.751  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-08 04:33:22.757 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-08 04:33:22.759 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-08 04:33:22.762 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-08 04:33:22.769 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-08 04:33:22.770 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-08 04:33:22.770 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-08 04:33:22.775 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-08 04:33:22.777 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-08 04:33:22.778 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-08 04:33:22.781 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-08 04:33:22.789 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 589208839865928687635669034821277214525682892339
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Dec 08 02:54:00 UTC 2022
           Final Date: Tue Dec 07 02:53:59 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [68:47:a9:bb:39:d0:1c:c4:71:35:54:82:45:42:b7:53:cf:c0:25:bf],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1cf7f8f8922b6dc4f59578ffe178be94b2796d9e
                       c767e1a1713b61860efe4021ead385add8e09c81
                       73f28cc5765601cca4ce29094dc8bf2f6104671e
                       25964d7132ff9c84290a4570b09509679980d7bb
                       3708d126ff4dd3bdc5d0c2ae84452d76282673bc
                       7a8cf4c963b477b1d1e57e162c84113186b428db
                       026597e939843b205a76364cd258dceba8f463bd
                       aa34339a1aada04d621fb1393bb2f5cfae1eed82
                       8137f00964a5a528dc7b86b5a2af2f89aeead98d
                       0359fb1994fb8bcfe4d2c7a6496879713d386878
                       f93bcafc38d3397af6d5acf9bc940889bae5e2fd
                       55d831ce3b0b27d4de7f6f721d5ab0bf5e168e84
                       031973117c2143c930d1dfa178ab2202802b7f54
                       7304c52ad29d19c8418f06ab5439ee2809419e75
                       9dab5bfd10c010bf09d9d3d24db39e686ecd9946
                       14a6959374eb01142850d3f9e5c5c6ed6dbd328c
                       472b21f8078bad8c4fb450770fd4357adb4bf42b
                       5512d58b0391a920eefda1f14070eac0e3174aed
                       4d8be4f68858239cffc5520f1ac43b8496cae27a
                       b22a56e2
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [38:e5:03:d0:80:a5:e6:7f:cd:d6:b3:dd:b1:db:8a:60:0b:b5:f2:fe],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-12-08 04:36:21.939  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-08 04:36:21.943 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-08 04:36:21.946 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-12-08 04:36:21.947 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-08 04:36:21.948  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-12-08 04:36:21.949  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-08 04:36:21.949  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-08 04:36:21.950 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-08 04:36:21.950 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-08 04:36:21.951 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-08 04:36:21.955 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-08 04:36:21.958 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-08 04:36:21.959 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-08 04:36:21.964 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-08 04:36:22.141  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-08 04:36:22.142  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-08 04:36:22.142 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-08 04:36:22.143 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-08 04:36:22.145  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-08 04:36:22.146  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-08 04:36:22.147 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-08 04:36:22.147 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-08 04:36:22.148 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-08 04:36:22.149 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-08 04:36:22.149 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-08 04:36:22.149 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-08 04:36:22.150 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-08 04:36:22.150 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-08 04:36:22.151 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-08 04:36:22.152 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-08 04:36:22.155 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 589208839865928687635669034821277214525682892339
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Dec 08 02:54:00 UTC 2022
           Final Date: Tue Dec 07 02:53:59 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [68:47:a9:bb:39:d0:1c:c4:71:35:54:82:45:42:b7:53:cf:c0:25:bf],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1cf7f8f8922b6dc4f59578ffe178be94b2796d9e
                       c767e1a1713b61860efe4021ead385add8e09c81
                       73f28cc5765601cca4ce29094dc8bf2f6104671e
                       25964d7132ff9c84290a4570b09509679980d7bb
                       3708d126ff4dd3bdc5d0c2ae84452d76282673bc
                       7a8cf4c963b477b1d1e57e162c84113186b428db
                       026597e939843b205a76364cd258dceba8f463bd
                       aa34339a1aada04d621fb1393bb2f5cfae1eed82
                       8137f00964a5a528dc7b86b5a2af2f89aeead98d
                       0359fb1994fb8bcfe4d2c7a6496879713d386878
                       f93bcafc38d3397af6d5acf9bc940889bae5e2fd
                       55d831ce3b0b27d4de7f6f721d5ab0bf5e168e84
                       031973117c2143c930d1dfa178ab2202802b7f54
                       7304c52ad29d19c8418f06ab5439ee2809419e75
                       9dab5bfd10c010bf09d9d3d24db39e686ecd9946
                       14a6959374eb01142850d3f9e5c5c6ed6dbd328c
                       472b21f8078bad8c4fb450770fd4357adb4bf42b
                       5512d58b0391a920eefda1f14070eac0e3174aed
                       4d8be4f68858239cffc5520f1ac43b8496cae27a
                       b22a56e2
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [62:7e:ce:ef:51:bb:2d:a0:3d:f9:73:e7:18:47:d7:6c:b5:87:5f:58],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-12-08 04:43:17.998  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-08 04:43:18.000 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-08 04:43:18.002 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-12-08 04:43:18.003 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-08 04:43:18.004  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-12-08 04:43:18.004  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-08 04:43:18.005  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-08 04:43:18.005 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-08 04:43:18.006 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-08 04:43:18.006 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-08 04:43:18.012 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-08 04:43:18.013 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-08 04:43:18.014 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-08 04:43:18.014 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-08 04:43:18.198  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-08 04:43:18.199  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-08 04:43:18.200 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-08 04:43:18.200 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-08 04:43:18.201  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-08 04:43:18.202  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-08 04:43:18.202 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-08 04:43:18.202 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-08 04:43:18.203 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-08 04:43:18.204 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-08 04:43:18.205 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-08 04:43:18.206 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-08 04:43:18.207 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-08 04:43:18.208 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-08 04:43:18.208 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-08 04:43:18.209 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-08 04:43:18.212 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 589208839865928687635669034821277214525682892339
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Dec 08 02:54:00 UTC 2022
           Final Date: Tue Dec 07 02:53:59 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [68:47:a9:bb:39:d0:1c:c4:71:35:54:82:45:42:b7:53:cf:c0:25:bf],[56:66:d1:a4]
        modulus: 9070b0ddd3408bd1cbe40a2bfe897e3e183aa2220b00a62b68631b4e3ac6cf9d1b3fcac3f0c1b7a01827018214f3a070d20aa40f8bff04b01e38b2e9dd8c0d6f0bd85ca06d35ffe7417e655f55a99b6bc5e5247bd4ab9e3c867ca0973f1c5b719e741c6fee11234b22e601cf527ee1a73fce1d982c8ec111baeaa1e6cbc452c2d15a05a1e751d9c78ef7bab6203b4f26b3e51db2e37c576baab6ae65965f1323329a92e9970cbbe077066dce9fc4968b1bb4fab911c413c6158aee1207072226fb35e6b6d168e5be16ebba78acc7dcb52b6fe73a5ed335324e607d0353f72e0e08fd79efbce520a2fbd6f273bc3a0f1d8dccb56be578a1fdbc120b379253a8ee1cdd65289540726fb502248551f2c257775712ca163020136575f3787a7e2550c11ca49ed7f130fecc84f2af851c7bee7692119327efaa6aad004aca1594fa696a2cbf1071f0ac53cd9403046a29d93945cee7e2c2286b57fac8397e57c6770498ead74164ffbc3e85919c5c4be2fc59c02631884dc439a4709617c39b85b671
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1cf7f8f8922b6dc4f59578ffe178be94b2796d9e
                       c767e1a1713b61860efe4021ead385add8e09c81
                       73f28cc5765601cca4ce29094dc8bf2f6104671e
                       25964d7132ff9c84290a4570b09509679980d7bb
                       3708d126ff4dd3bdc5d0c2ae84452d76282673bc
                       7a8cf4c963b477b1d1e57e162c84113186b428db
                       026597e939843b205a76364cd258dceba8f463bd
                       aa34339a1aada04d621fb1393bb2f5cfae1eed82
                       8137f00964a5a528dc7b86b5a2af2f89aeead98d
                       0359fb1994fb8bcfe4d2c7a6496879713d386878
                       f93bcafc38d3397af6d5acf9bc940889bae5e2fd
                       55d831ce3b0b27d4de7f6f721d5ab0bf5e168e84
                       031973117c2143c930d1dfa178ab2202802b7f54
                       7304c52ad29d19c8418f06ab5439ee2809419e75
                       9dab5bfd10c010bf09d9d3d24db39e686ecd9946
                       14a6959374eb01142850d3f9e5c5c6ed6dbd328c
                       472b21f8078bad8c4fb450770fd4357adb4bf42b
                       5512d58b0391a920eefda1f14070eac0e3174aed
                       4d8be4f68858239cffc5520f1ac43b8496cae27a
                       b22a56e2
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [df:ea:db:34:0a:59:bb:3b:c1:f4:93:b0:01:18:0b:b2:12:b2:97:1d],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-12-08 04:48:55.385  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-08 04:48:55.387 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-08 04:48:55.391 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-12-08 04:48:55.393 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-08 04:48:55.393  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-12-08 04:48:55.394  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-08 04:48:55.395  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-08 04:48:55.395 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-08 04:48:55.396 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-08 04:48:55.397 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-08 04:48:55.404 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-08 04:48:55.406 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-08 04:48:55.406 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-08 04:48:55.407 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-08 04:48:55.590  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-08 04:48:55.591  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-08 04:48:55.592 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-08 04:48:55.592 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-08 04:48:55.594  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-08 04:48:55.594  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-08 04:48:55.595 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-08 04:48:55.595 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-08 04:48:55.595 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-08 04:48:55.596 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-08 04:48:55.597 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-08 04:48:55.597 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-08 04:48:55.598 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-08 04:48:55.598 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-08 04:48:55.599 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-08 04:48:55.599 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-08 04:48:55.604 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 589208839865928687635669034821277214525682892339
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Dec 08 02:54:00 UTC 2022
           Final Date: Tue Dec 07 02:53:59 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [68:47:a9:bb:39:d0:1c:c4:71:35:54:82:45:42:b7:53:cf:c0:25:bf],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1cf7f8f8922b6dc4f59578ffe178be94b2796d9e
                       c767e1a1713b61860efe4021ead385add8e09c81
                       73f28cc5765601cca4ce29094dc8bf2f6104671e
                       25964d7132ff9c84290a4570b09509679980d7bb
                       3708d126ff4dd3bdc5d0c2ae84452d76282673bc
                       7a8cf4c963b477b1d1e57e162c84113186b428db
                       026597e939843b205a76364cd258dceba8f463bd
                       aa34339a1aada04d621fb1393bb2f5cfae1eed82
                       8137f00964a5a528dc7b86b5a2af2f89aeead98d
                       0359fb1994fb8bcfe4d2c7a6496879713d386878
                       f93bcafc38d3397af6d5acf9bc940889bae5e2fd
                       55d831ce3b0b27d4de7f6f721d5ab0bf5e168e84
                       031973117c2143c930d1dfa178ab2202802b7f54
                       7304c52ad29d19c8418f06ab5439ee2809419e75
                       9dab5bfd10c010bf09d9d3d24db39e686ecd9946
                       14a6959374eb01142850d3f9e5c5c6ed6dbd328c
                       472b21f8078bad8c4fb450770fd4357adb4bf42b
                       5512d58b0391a920eefda1f14070eac0e3174aed
                       4d8be4f68858239cffc5520f1ac43b8496cae27a
                       b22a56e2
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [c3:17:d5:aa:78:96:94:46:8b:64:3c:c2:c6:b6:e4:9b:08:d1:b6:57],[56:66:d1:a4]
        modulus: ccca227de6b707d7e7bc205b1f314dd447006b908caa19b880a1165c7af0269236e6e19b8838861dd83a7a9854504546d6797039f418966734496b638a3d5e9dc3d614baf208a7a9a6fb4dde6d03f39747c4dfa15d07bf27363a7754c10d47973447b12395459d74195258f744775b5e12f41da72447fb58c357940b188860855170fbf5118e8bf05e05d2a41382767d4e7f4a21ab96d33995c4b79b55fe68bc2074cb94e99e6faf8561117230d0ed81faecd83036d71e8424817ba5aa02a9abe2aeac47b7ba3f7e96729f6cd5e1164efa458d95350e8afcf1e6c8bf507616f58a9ff5e6ac5737f1fe003f48c65a2583072748f8c50b79dba14838a18e2bd4e3
public exponent: 10001

] 
2022-12-08 04:55:57.882  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-08 04:55:57.886 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-08 04:55:57.889 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-12-08 04:55:57.890 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-08 04:55:57.891  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-12-08 04:55:57.892  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-08 04:55:57.892  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-08 04:55:57.893 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-08 04:55:57.893 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-08 04:55:57.894 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-08 04:55:57.901 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-08 04:55:57.902 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-08 04:55:57.903 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-08 04:55:57.903 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-08 04:55:58.066  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-08 04:55:58.067  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-08 04:55:58.067 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-08 04:55:58.067 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-08 04:55:58.069  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-08 04:55:58.070  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-08 04:55:58.071 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-08 04:55:58.072 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-08 04:55:58.072 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-08 04:55:58.074 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-08 04:55:58.074 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-08 04:55:58.074 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-08 04:55:58.075 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-08 04:55:58.075 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-08 04:55:58.076 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-08 04:55:58.076 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-08 04:55:58.080 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 589208839865928687635669034821277214525682892339
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Dec 08 02:54:00 UTC 2022
           Final Date: Tue Dec 07 02:53:59 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [68:47:a9:bb:39:d0:1c:c4:71:35:54:82:45:42:b7:53:cf:c0:25:bf],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1cf7f8f8922b6dc4f59578ffe178be94b2796d9e
                       c767e1a1713b61860efe4021ead385add8e09c81
                       73f28cc5765601cca4ce29094dc8bf2f6104671e
                       25964d7132ff9c84290a4570b09509679980d7bb
                       3708d126ff4dd3bdc5d0c2ae84452d76282673bc
                       7a8cf4c963b477b1d1e57e162c84113186b428db
                       026597e939843b205a76364cd258dceba8f463bd
                       aa34339a1aada04d621fb1393bb2f5cfae1eed82
                       8137f00964a5a528dc7b86b5a2af2f89aeead98d
                       0359fb1994fb8bcfe4d2c7a6496879713d386878
                       f93bcafc38d3397af6d5acf9bc940889bae5e2fd
                       55d831ce3b0b27d4de7f6f721d5ab0bf5e168e84
                       031973117c2143c930d1dfa178ab2202802b7f54
                       7304c52ad29d19c8418f06ab5439ee2809419e75
                       9dab5bfd10c010bf09d9d3d24db39e686ecd9946
                       14a6959374eb01142850d3f9e5c5c6ed6dbd328c
                       472b21f8078bad8c4fb450770fd4357adb4bf42b
                       5512d58b0391a920eefda1f14070eac0e3174aed
                       4d8be4f68858239cffc5520f1ac43b8496cae27a
                       b22a56e2
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ab:91:2c:54:8e:36:e4:46:ed:08:72:cb:91:cf:4a:d0:ab:56:30:75],[56:66:d1:a4]
        modulus: edccb6332717e3663b397ab13ab5520611d47f8810f402195653cc17722448449d3e2be9db336a46a0f09649ccdd6250b075b9ea365a9f572935673f41714470dbba912577111fab256ec6ff6086528a6b761e9afaf5554f83eb81ca3bf427784ffe902f4785aa9600db1fc0a54c1f2740c4ad7c9478aa14932414e36a24b97ec3ea6946a17773c9fec070fd5934dc3ee3424d75e6b6298c3ba1b66d1c5c5e948fdea418ecd360f1e660be4e8461fadfcc0ffba22534e94c3c9f1ffbd49e8ec7212787b4c49273172a92b108754af546580aea2175ebf11ca2500d295fb0e50dfb3fb36266b9d730d5bb708c372a5de2942b89815bec647f40e2c50767b17043
public exponent: 10001

] 
2022-12-08 05:01:56.192  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-08 05:01:56.196 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-08 05:01:56.199 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-12-08 05:01:56.200 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-08 05:01:56.201  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-12-08 05:01:56.202  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-08 05:01:56.202  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-08 05:01:56.203 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-08 05:01:56.203 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-08 05:01:56.204 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-08 05:01:56.209 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-08 05:01:56.210 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-08 05:01:56.211 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-08 05:01:56.212 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-08 05:01:56.421  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-08 05:01:56.421  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-08 05:01:56.422 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-08 05:01:56.423 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-08 05:01:56.424  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-08 05:01:56.425  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-08 05:01:56.426 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-08 05:01:56.426 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-08 05:01:56.426 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-08 05:01:56.427 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-08 05:01:56.427 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-08 05:01:56.428 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-08 05:01:56.428 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-08 05:01:56.428 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-08 05:01:56.429 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-08 05:01:56.429 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-08 05:01:56.433 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 589208839865928687635669034821277214525682892339
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Dec 08 02:54:00 UTC 2022
           Final Date: Tue Dec 07 02:53:59 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [68:47:a9:bb:39:d0:1c:c4:71:35:54:82:45:42:b7:53:cf:c0:25:bf],[56:66:d1:a4]
        modulus: 9070b0ddd3408bd1cbe40a2bfe897e3e183aa2220b00a62b68631b4e3ac6cf9d1b3fcac3f0c1b7a01827018214f3a070d20aa40f8bff04b01e38b2e9dd8c0d6f0bd85ca06d35ffe7417e655f55a99b6bc5e5247bd4ab9e3c867ca0973f1c5b719e741c6fee11234b22e601cf527ee1a73fce1d982c8ec111baeaa1e6cbc452c2d15a05a1e751d9c78ef7bab6203b4f26b3e51db2e37c576baab6ae65965f1323329a92e9970cbbe077066dce9fc4968b1bb4fab911c413c6158aee1207072226fb35e6b6d168e5be16ebba78acc7dcb52b6fe73a5ed335324e607d0353f72e0e08fd79efbce520a2fbd6f273bc3a0f1d8dccb56be578a1fdbc120b379253a8ee1cdd65289540726fb502248551f2c257775712ca163020136575f3787a7e2550c11ca49ed7f130fecc84f2af851c7bee7692119327efaa6aad004aca1594fa696a2cbf1071f0ac53cd9403046a29d93945cee7e2c2286b57fac8397e57c6770498ead74164ffbc3e85919c5c4be2fc59c02631884dc439a4709617c39b85b671
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1cf7f8f8922b6dc4f59578ffe178be94b2796d9e
                       c767e1a1713b61860efe4021ead385add8e09c81
                       73f28cc5765601cca4ce29094dc8bf2f6104671e
                       25964d7132ff9c84290a4570b09509679980d7bb
                       3708d126ff4dd3bdc5d0c2ae84452d76282673bc
                       7a8cf4c963b477b1d1e57e162c84113186b428db
                       026597e939843b205a76364cd258dceba8f463bd
                       aa34339a1aada04d621fb1393bb2f5cfae1eed82
                       8137f00964a5a528dc7b86b5a2af2f89aeead98d
                       0359fb1994fb8bcfe4d2c7a6496879713d386878
                       f93bcafc38d3397af6d5acf9bc940889bae5e2fd
                       55d831ce3b0b27d4de7f6f721d5ab0bf5e168e84
                       031973117c2143c930d1dfa178ab2202802b7f54
                       7304c52ad29d19c8418f06ab5439ee2809419e75
                       9dab5bfd10c010bf09d9d3d24db39e686ecd9946
                       14a6959374eb01142850d3f9e5c5c6ed6dbd328c
                       472b21f8078bad8c4fb450770fd4357adb4bf42b
                       5512d58b0391a920eefda1f14070eac0e3174aed
                       4d8be4f68858239cffc5520f1ac43b8496cae27a
                       b22a56e2
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [03:5a:32:8b:7f:0f:74:12:3f:f9:82:05:4d:33:4b:7d:ee:dd:e8:58],[56:66:d1:a4]
        modulus: d1fd256ed94423a44c9cbaa5196c69aac5664fa2d42b7f6c51b1203f62f58f47fc3e723ae74a9db5294cc1016d99e6c51eabc08ad5a8b6c31caa97b9e145da17a9ade9ab81fe751d9c3799eca19bffa2ac4d75405d2c144b41557925c7ab44cf99e31238a4914b35348157c28022f6cf6b09e80147463fc8b5993007d7fae5049f6fb2c468ec75a9de10455918625937d0a8c2168d6b567675b5a4d5a8fc325d4522915e4f0e1b6d3cfd3d17300fcbeede9569dd0c1b7b1a781b3e34195b2b7fa085830d08defc24f63bf16e720e898320c9fed35089e62fc3719ef3945c09f1b7797d27fd1035f2a01d2aadea7ee43c8cab5e4a1f0f7ddfe9e5c78faae22cc1
public exponent: 10001

] 
2022-12-08 05:09:17.417  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-08 05:09:17.421 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-08 05:09:17.425 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-12-08 05:09:17.426 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-08 05:09:17.427  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-12-08 05:09:17.427  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-08 05:09:17.428  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-08 05:09:17.430 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-08 05:09:17.431 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-08 05:09:17.431 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-08 05:09:17.444 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-08 05:09:17.445 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-08 05:09:17.445 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-08 05:09:17.446 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-08 05:09:17.625  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-08 05:09:17.626  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-08 05:09:17.626 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-08 05:09:17.626 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-08 05:09:17.628  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-08 05:09:17.628  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-08 05:09:17.629 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-08 05:09:17.629 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-08 05:09:17.629 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-08 05:09:17.630 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-08 05:09:17.631 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-08 05:09:17.636 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-08 05:09:17.637 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-08 05:09:17.638 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-08 05:09:17.638 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-08 05:09:17.639 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-08 05:09:17.646 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 589208839865928687635669034821277214525682892339
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Dec 08 02:54:00 UTC 2022
           Final Date: Tue Dec 07 02:53:59 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [68:47:a9:bb:39:d0:1c:c4:71:35:54:82:45:42:b7:53:cf:c0:25:bf],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1cf7f8f8922b6dc4f59578ffe178be94b2796d9e
                       c767e1a1713b61860efe4021ead385add8e09c81
                       73f28cc5765601cca4ce29094dc8bf2f6104671e
                       25964d7132ff9c84290a4570b09509679980d7bb
                       3708d126ff4dd3bdc5d0c2ae84452d76282673bc
                       7a8cf4c963b477b1d1e57e162c84113186b428db
                       026597e939843b205a76364cd258dceba8f463bd
                       aa34339a1aada04d621fb1393bb2f5cfae1eed82
                       8137f00964a5a528dc7b86b5a2af2f89aeead98d
                       0359fb1994fb8bcfe4d2c7a6496879713d386878
                       f93bcafc38d3397af6d5acf9bc940889bae5e2fd
                       55d831ce3b0b27d4de7f6f721d5ab0bf5e168e84
                       031973117c2143c930d1dfa178ab2202802b7f54
                       7304c52ad29d19c8418f06ab5439ee2809419e75
                       9dab5bfd10c010bf09d9d3d24db39e686ecd9946
                       14a6959374eb01142850d3f9e5c5c6ed6dbd328c
                       472b21f8078bad8c4fb450770fd4357adb4bf42b
                       5512d58b0391a920eefda1f14070eac0e3174aed
                       4d8be4f68858239cffc5520f1ac43b8496cae27a
                       b22a56e2
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [60:2e:82:27:44:6e:83:f2:d8:91:fe:d0:6b:5c:25:13:57:24:b7:fe],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-12-08 05:15:46.210  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-08 05:15:46.213 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-08 05:15:46.216 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-12-08 05:15:46.216 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-08 05:15:46.217  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-12-08 05:15:46.218  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-08 05:15:46.218  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-08 05:15:46.218 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-08 05:15:46.219 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-08 05:15:46.219 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-08 05:15:46.223 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-08 05:15:46.224 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-08 05:15:46.224 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-08 05:15:46.225 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-08 05:15:46.398  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-08 05:15:46.399  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-08 05:15:46.399 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-08 05:15:46.399 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-08 05:15:46.401  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-08 05:15:46.402  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-08 05:15:46.402 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-08 05:15:46.403 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-08 05:15:46.403 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-08 05:15:46.404 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-08 05:15:46.404 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-08 05:15:46.405 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-08 05:15:46.405 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-08 05:15:46.406 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-08 05:15:46.406 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-08 05:15:46.407 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-08 05:15:46.411 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 589208839865928687635669034821277214525682892339
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Dec 08 02:54:00 UTC 2022
           Final Date: Tue Dec 07 02:53:59 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [68:47:a9:bb:39:d0:1c:c4:71:35:54:82:45:42:b7:53:cf:c0:25:bf],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1cf7f8f8922b6dc4f59578ffe178be94b2796d9e
                       c767e1a1713b61860efe4021ead385add8e09c81
                       73f28cc5765601cca4ce29094dc8bf2f6104671e
                       25964d7132ff9c84290a4570b09509679980d7bb
                       3708d126ff4dd3bdc5d0c2ae84452d76282673bc
                       7a8cf4c963b477b1d1e57e162c84113186b428db
                       026597e939843b205a76364cd258dceba8f463bd
                       aa34339a1aada04d621fb1393bb2f5cfae1eed82
                       8137f00964a5a528dc7b86b5a2af2f89aeead98d
                       0359fb1994fb8bcfe4d2c7a6496879713d386878
                       f93bcafc38d3397af6d5acf9bc940889bae5e2fd
                       55d831ce3b0b27d4de7f6f721d5ab0bf5e168e84
                       031973117c2143c930d1dfa178ab2202802b7f54
                       7304c52ad29d19c8418f06ab5439ee2809419e75
                       9dab5bfd10c010bf09d9d3d24db39e686ecd9946
                       14a6959374eb01142850d3f9e5c5c6ed6dbd328c
                       472b21f8078bad8c4fb450770fd4357adb4bf42b
                       5512d58b0391a920eefda1f14070eac0e3174aed
                       4d8be4f68858239cffc5520f1ac43b8496cae27a
                       b22a56e2
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [3b:5f:01:eb:29:a5:f6:9c:25:85:0c:bc:3c:35:ac:44:9e:76:fa:bd],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-12-08 05:16:05.231  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-08 05:16:05.237 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-08 05:16:05.240 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-12-08 05:16:05.241 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-08 05:16:05.241  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-12-08 05:16:05.242  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-08 05:16:05.243  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-08 05:16:05.243 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-08 05:16:05.244 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-08 05:16:05.244 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-08 05:16:05.249 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-08 05:16:05.252 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-08 05:16:05.252 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-08 05:16:05.252 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-08 05:16:05.359  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-08 05:16:05.360  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-08 05:16:05.360 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-08 05:16:05.361 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-08 05:16:05.363  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-08 05:16:05.364  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-08 05:16:05.365 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-08 05:16:05.365 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-08 05:16:05.365 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-08 05:16:05.367 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-08 05:16:05.368 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-08 05:16:05.368 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-08 05:16:05.372 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-08 05:16:05.372 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-08 05:16:05.372 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-08 05:16:05.373 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-08 05:16:05.383 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 589208839865928687635669034821277214525682892339
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Dec 08 02:54:00 UTC 2022
           Final Date: Tue Dec 07 02:53:59 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [68:47:a9:bb:39:d0:1c:c4:71:35:54:82:45:42:b7:53:cf:c0:25:bf],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1cf7f8f8922b6dc4f59578ffe178be94b2796d9e
                       c767e1a1713b61860efe4021ead385add8e09c81
                       73f28cc5765601cca4ce29094dc8bf2f6104671e
                       25964d7132ff9c84290a4570b09509679980d7bb
                       3708d126ff4dd3bdc5d0c2ae84452d76282673bc
                       7a8cf4c963b477b1d1e57e162c84113186b428db
                       026597e939843b205a76364cd258dceba8f463bd
                       aa34339a1aada04d621fb1393bb2f5cfae1eed82
                       8137f00964a5a528dc7b86b5a2af2f89aeead98d
                       0359fb1994fb8bcfe4d2c7a6496879713d386878
                       f93bcafc38d3397af6d5acf9bc940889bae5e2fd
                       55d831ce3b0b27d4de7f6f721d5ab0bf5e168e84
                       031973117c2143c930d1dfa178ab2202802b7f54
                       7304c52ad29d19c8418f06ab5439ee2809419e75
                       9dab5bfd10c010bf09d9d3d24db39e686ecd9946
                       14a6959374eb01142850d3f9e5c5c6ed6dbd328c
                       472b21f8078bad8c4fb450770fd4357adb4bf42b
                       5512d58b0391a920eefda1f14070eac0e3174aed
                       4d8be4f68858239cffc5520f1ac43b8496cae27a
                       b22a56e2
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [88:2a:43:23:f2:d2:e4:58:5e:04:e5:e9:77:8e:40:71:29:fc:8f:b8],[56:66:d1:a4]
        modulus: d6d0c88ca35229360aaa5fc04e39f8cbd86ecd4e80a3a6cc0da9a8e15345686441837b8e5760c24168b645834d2b509f2fce6e93e748a4a5c20a3c7f15950fb53b8af67323b8df2b47e484e68f3e4fefca2342dab9a7f09e0829f387f23eaecc7a02eed5fcd3ed7a5fe628fdc74dd145a1c9a7fe9cf7b8381b2e4f7609a5cfb2a8f368c66b303bb2faca01e0fda681dd60caa3b512f5c9f59bf2c1fe6744f470338e8e19d0dc81ff44b941d18b9c302fdf1a6da82464e49e775d459d07a13e9155d9870bb0cd345054ce90047ffbdbc0ec2a21c03d14b72ec250c699319d45479e4f918f8fe2dd51bc1556939d347aa91016c01df056008c88e1e40ef4547a83
public exponent: 10001

] 
2022-12-08 05:39:40.040  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-08 05:39:40.043 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-08 05:39:40.046 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-12-08 05:39:40.046 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-08 05:39:40.047  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-12-08 05:39:40.048  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-08 05:39:40.048  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-08 05:39:40.048 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-08 05:39:40.049 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-08 05:39:40.049 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-08 05:39:40.055 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-08 05:39:40.057 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-08 05:39:40.057 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-08 05:39:40.058 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-08 05:39:40.269  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-08 05:39:40.270  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-08 05:39:40.270 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-08 05:39:40.271 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-08 05:39:40.272  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-08 05:39:40.273  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-08 05:39:40.274 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-08 05:39:40.274 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-08 05:39:40.274 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-08 05:39:40.276 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-08 05:39:40.276 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-08 05:39:40.276 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-08 05:39:40.277 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-08 05:39:40.278 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-08 05:39:40.278 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-08 05:39:40.279 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-08 05:39:40.284 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 589208839865928687635669034821277214525682892339
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Dec 08 02:54:00 UTC 2022
           Final Date: Tue Dec 07 02:53:59 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [68:47:a9:bb:39:d0:1c:c4:71:35:54:82:45:42:b7:53:cf:c0:25:bf],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1cf7f8f8922b6dc4f59578ffe178be94b2796d9e
                       c767e1a1713b61860efe4021ead385add8e09c81
                       73f28cc5765601cca4ce29094dc8bf2f6104671e
                       25964d7132ff9c84290a4570b09509679980d7bb
                       3708d126ff4dd3bdc5d0c2ae84452d76282673bc
                       7a8cf4c963b477b1d1e57e162c84113186b428db
                       026597e939843b205a76364cd258dceba8f463bd
                       aa34339a1aada04d621fb1393bb2f5cfae1eed82
                       8137f00964a5a528dc7b86b5a2af2f89aeead98d
                       0359fb1994fb8bcfe4d2c7a6496879713d386878
                       f93bcafc38d3397af6d5acf9bc940889bae5e2fd
                       55d831ce3b0b27d4de7f6f721d5ab0bf5e168e84
                       031973117c2143c930d1dfa178ab2202802b7f54
                       7304c52ad29d19c8418f06ab5439ee2809419e75
                       9dab5bfd10c010bf09d9d3d24db39e686ecd9946
                       14a6959374eb01142850d3f9e5c5c6ed6dbd328c
                       472b21f8078bad8c4fb450770fd4357adb4bf42b
                       5512d58b0391a920eefda1f14070eac0e3174aed
                       4d8be4f68858239cffc5520f1ac43b8496cae27a
                       b22a56e2
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [7e:24:6e:30:2b:b0:32:0c:03:04:d8:9e:d7:d6:4e:15:8b:31:ea:7f],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-12-08 05:39:47.356  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-08 05:39:47.357 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-08 05:39:47.359 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-12-08 05:39:47.360 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-08 05:39:47.360  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-12-08 05:39:47.361  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-08 05:39:47.362  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-08 05:39:47.362 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-08 05:39:47.362 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-08 05:39:47.364 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-08 05:39:47.368 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-08 05:39:47.368 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-08 05:39:47.369 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-08 05:39:47.369 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-08 05:39:47.497  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-08 05:39:47.498  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-08 05:39:47.498 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-08 05:39:47.498 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-08 05:39:47.499  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-08 05:39:47.500  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-08 05:39:47.500 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-08 05:39:47.500 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-08 05:39:47.501 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-08 05:39:47.501 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-08 05:39:47.501 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-08 05:39:47.501 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-08 05:39:47.502 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-08 05:39:47.502 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-08 05:39:47.502 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-08 05:39:47.503 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-08 05:39:47.507 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 589208839865928687635669034821277214525682892339
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Dec 08 02:54:00 UTC 2022
           Final Date: Tue Dec 07 02:53:59 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [68:47:a9:bb:39:d0:1c:c4:71:35:54:82:45:42:b7:53:cf:c0:25:bf],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1cf7f8f8922b6dc4f59578ffe178be94b2796d9e
                       c767e1a1713b61860efe4021ead385add8e09c81
                       73f28cc5765601cca4ce29094dc8bf2f6104671e
                       25964d7132ff9c84290a4570b09509679980d7bb
                       3708d126ff4dd3bdc5d0c2ae84452d76282673bc
                       7a8cf4c963b477b1d1e57e162c84113186b428db
                       026597e939843b205a76364cd258dceba8f463bd
                       aa34339a1aada04d621fb1393bb2f5cfae1eed82
                       8137f00964a5a528dc7b86b5a2af2f89aeead98d
                       0359fb1994fb8bcfe4d2c7a6496879713d386878
                       f93bcafc38d3397af6d5acf9bc940889bae5e2fd
                       55d831ce3b0b27d4de7f6f721d5ab0bf5e168e84
                       031973117c2143c930d1dfa178ab2202802b7f54
                       7304c52ad29d19c8418f06ab5439ee2809419e75
                       9dab5bfd10c010bf09d9d3d24db39e686ecd9946
                       14a6959374eb01142850d3f9e5c5c6ed6dbd328c
                       472b21f8078bad8c4fb450770fd4357adb4bf42b
                       5512d58b0391a920eefda1f14070eac0e3174aed
                       4d8be4f68858239cffc5520f1ac43b8496cae27a
                       b22a56e2
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ab:02:49:e8:cf:43:1c:87:bc:3e:d6:89:5b:cf:c1:e8:36:56:78:a9],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

]