Results

By type

          2022-12-16 03:15:11,168 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-12-16 03:15:12,086 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-12-16 03:15:12.810  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Dec 16, 2022 3:15:14 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Dec 16, 2022 3:15:14 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Dec 16, 2022 3:15:14 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Dec 16, 2022 3:15:14 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-12-16 03:15:15.432 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-12-16 03:15:15.715  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-12-16 03:15:15.898  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-12-16 03:15:16.656 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-12-16 03:15:16.659 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
2022-12-16 03:15:16.660 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-12-16 03:15:16.664 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-12-16 03:15:16.708 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
2022-12-16 03:15:16.711 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
	{GET [/docs]}: redirectToUi(HttpServletRequest)
2022-12-16 03:15:16.851 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-12-16 03:15:17.461 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Dec 16, 2022 3:15:18 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-12-16 03:15:18.500  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 8.158 seconds (JVM running for 9.962)
Dec 16, 2022 3:15:44 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-12-16 03:15:59.792  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-16 03:15:59.802 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-16 03:15:59.844 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-12-16 03:15:59.847 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-16 03:15:59.869  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-12-16 03:15:59.871  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-16 03:15:59.872  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-16 03:15:59.874 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-16 03:15:59.874 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-16 03:15:59.879 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-16 03:15:59.890 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-16 03:15:59.894 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-16 03:15:59.942 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-16 03:15:59.950 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-16 03:15:59.951 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-16 03:15:59.954 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-16 03:16:00.441  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-16 03:16:00.443  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-16 03:16:00.444 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-16 03:16:00.445 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-16 03:16:00.455  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-16 03:16:00.456  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-16 03:16:00.457 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-16 03:16:00.457 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-16 03:16:00.458 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-16 03:16:00.474 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-16 03:16:00.475 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-16 03:16:00.475 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-16 03:16:00.481 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-16 03:16:00.481 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-16 03:16:00.482 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-16 03:16:00.483 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-16 03:16:00.514 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 695172726589900452199922147937034232894960977533
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Dec 16 03:13:02 UTC 2022
           Final Date: Wed Dec 15 03:13:01 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [12:6c:b2:f6:7a:e9:75:1a:54:fd:f3:dd:8c:86:83:f5:2d:bb:05:79],[56:66:d1:a4]
        modulus: c7b64dbf34e52bedb840e2d587fc66a671fa287c209bdebe30a236ca532b5ed5ed31b79043eaa6c6170e7f76e08e9a59aba64e0bd81be87317be02d2517fbf26ce870367315ce3969ed96a790a62665b1067a0ff680b4bd6c48b77f6c7e89d645b660b8b06ef9ca33ac06470928b1e20706eb5431949264f0742c74a3c95b3caf7586eaf9f7a275d981d5d14f216a863a93dd43cf477bb38bcc8f17212913408b7322bfec6aeb7cfc34fdd65c438cf76c582282440f55740a789af5c3fea04067443f3c9d0240eb2d9e5495f7920b3ba8fbfa2a9ed31adc914c7f27915f392ff1dae1dc8fcdbab3d817c58a364edbad7faefb96c56622c3970f7c5f9cf89e5530ad453b04043ca2395e165c6f6b81ca4b9ce7b3e4ba346497e8ffea16be0109124300acc26d6222b15e4fa617a579153fa983c241f09f255731152c8a3dcd809e688bc7d857a6c73de0cbe683c49e363ac46ec25de27f32babe0a85c2e7666e9ca3b48bfe80e1006cb4baf070104d7caf0c92be5bb54a25878e796eabf7a266f
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7d58d4d12b2c76e19ce6d7b6aa8075ff4f20081a
                       f4ec135c425626762c2fdf3b940373b2b8b96714
                       39eb1795895d46ec54a3e9017bd71d86068d06c1
                       facff84f5a807e4c06179ecb723d4ed590de9536
                       c0f5ca56f76a725f4db4c73985132e2987fae0ee
                       f2d8195825ccf2d766e671481ce0a0496e8aa51c
                       d19ce025dd63d82835798697e64c28d73fa7a0f8
                       fe42d6d484f21079a2439e62db59602fc37a7c19
                       a3ed551fcdeaa81e3c4704c04d28d68a4197f8be
                       e8987a94036e49f9b6435f1e5b5b2bf75288f9ea
                       5912a99c61ad67d36f65ae7971b9c235d1a78000
                       cee14da06a8d46ead1dcfa215c1f626210d34cc2
                       a16f6f0bfde3ede8e58f481f5a7cd9ea83ff12a8
                       2215c5b0e8119717c6db6279894835afd7f62c41
                       461b9a8c687ff254c707174276219e7cf595f9a7
                       b98807cf84da2a6b4143897f1aeb0daff2471ba2
                       27360656a1cc8abd58c6d510cdab9385404a9091
                       6bcb4933b32fc1604284ee2e5f9b0dd8fc0c3079
                       e85604d669d411b15481f0f3c762626280287b16
                       63b3ba1e
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [57:42:d6:63:83:2e:2d:2b:11:aa:34:e6:b5:8a:ee:a7:71:cf:0d:c9],[56:66:d1:a4]
        modulus: e88a01e3219d096f6625beee1381b79df03e58091c50ebcc98a922df3b794e0257d8636c9723fed8fbae798153815435cf22d12891b57b8c2eba8c06e48dbd1ab9d8e0aac0a297c4a28959ea2ffc00a1e22da1a801e120e8964c28ea4918a2ea4f7ae72c363fe051952e33ae506bbd6ecdfdc792908c30e38c7fa2bc6a8f6ebb3bff0fd424c3569c9e0e38c924ce30243175aa6913ec758087ae0e99aac732abdaab290a6a323fd4cc935a9f9079aa9664666b78ac2f9f1824f52a225a4b0af594264c935eb60a0c250f4b68cdfe79c9871063df3d4efe670f4d441dde469e6c850a11e436f75fa1fb6d34d6f55ded28c442713330aada3403e791d123ea0cf7
public exponent: 10001

] 
2022-12-16 05:04:35.125  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-16 05:04:35.129 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-16 05:04:35.132 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-12-16 05:04:35.133 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-16 05:04:35.134  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-12-16 05:04:35.135  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-16 05:04:35.135  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-16 05:04:35.136 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-16 05:04:35.136 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-16 05:04:35.137 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-16 05:04:35.141 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-16 05:04:35.143 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-16 05:04:35.144 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-16 05:04:35.145 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-16 05:04:35.343  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-16 05:04:35.343  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-16 05:04:35.344 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-16 05:04:35.344 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-16 05:04:35.347  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-16 05:04:35.348  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-16 05:04:35.348 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-16 05:04:35.348 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-16 05:04:35.349 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-16 05:04:35.350 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-16 05:04:35.350 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-16 05:04:35.351 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-16 05:04:35.352 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-16 05:04:35.352 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-16 05:04:35.352 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-16 05:04:35.353 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-16 05:04:35.358 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 695172726589900452199922147937034232894960977533
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Dec 16 03:13:02 UTC 2022
           Final Date: Wed Dec 15 03:13:01 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [12:6c:b2:f6:7a:e9:75:1a:54:fd:f3:dd:8c:86:83:f5:2d:bb:05:79],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7d58d4d12b2c76e19ce6d7b6aa8075ff4f20081a
                       f4ec135c425626762c2fdf3b940373b2b8b96714
                       39eb1795895d46ec54a3e9017bd71d86068d06c1
                       facff84f5a807e4c06179ecb723d4ed590de9536
                       c0f5ca56f76a725f4db4c73985132e2987fae0ee
                       f2d8195825ccf2d766e671481ce0a0496e8aa51c
                       d19ce025dd63d82835798697e64c28d73fa7a0f8
                       fe42d6d484f21079a2439e62db59602fc37a7c19
                       a3ed551fcdeaa81e3c4704c04d28d68a4197f8be
                       e8987a94036e49f9b6435f1e5b5b2bf75288f9ea
                       5912a99c61ad67d36f65ae7971b9c235d1a78000
                       cee14da06a8d46ead1dcfa215c1f626210d34cc2
                       a16f6f0bfde3ede8e58f481f5a7cd9ea83ff12a8
                       2215c5b0e8119717c6db6279894835afd7f62c41
                       461b9a8c687ff254c707174276219e7cf595f9a7
                       b98807cf84da2a6b4143897f1aeb0daff2471ba2
                       27360656a1cc8abd58c6d510cdab9385404a9091
                       6bcb4933b32fc1604284ee2e5f9b0dd8fc0c3079
                       e85604d669d411b15481f0f3c762626280287b16
                       63b3ba1e
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [50:9d:ab:87:86:86:96:75:fc:3f:0a:fc:02:b8:53:7f:c0:cf:89:0b],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-12-16 05:11:10.046  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-16 05:11:10.049 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-16 05:11:10.052 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-12-16 05:11:10.053 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-16 05:11:10.054  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-12-16 05:11:10.054  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-16 05:11:10.055  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-16 05:11:10.056 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-16 05:11:10.056 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-16 05:11:10.057 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-16 05:11:10.063 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-16 05:11:10.063 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-16 05:11:10.064 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-16 05:11:10.064 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-16 05:11:10.240  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-16 05:11:10.241  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-16 05:11:10.241 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-16 05:11:10.242 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-16 05:11:10.244  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-16 05:11:10.245  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-16 05:11:10.245 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-16 05:11:10.246 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-16 05:11:10.246 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-16 05:11:10.247 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-16 05:11:10.248 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-16 05:11:10.248 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-16 05:11:10.249 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-16 05:11:10.250 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-16 05:11:10.250 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-16 05:11:10.252 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-16 05:11:10.256 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 695172726589900452199922147937034232894960977533
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Dec 16 03:13:02 UTC 2022
           Final Date: Wed Dec 15 03:13:01 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [12:6c:b2:f6:7a:e9:75:1a:54:fd:f3:dd:8c:86:83:f5:2d:bb:05:79],[56:66:d1:a4]
        modulus: c7b64dbf34e52bedb840e2d587fc66a671fa287c209bdebe30a236ca532b5ed5ed31b79043eaa6c6170e7f76e08e9a59aba64e0bd81be87317be02d2517fbf26ce870367315ce3969ed96a790a62665b1067a0ff680b4bd6c48b77f6c7e89d645b660b8b06ef9ca33ac06470928b1e20706eb5431949264f0742c74a3c95b3caf7586eaf9f7a275d981d5d14f216a863a93dd43cf477bb38bcc8f17212913408b7322bfec6aeb7cfc34fdd65c438cf76c582282440f55740a789af5c3fea04067443f3c9d0240eb2d9e5495f7920b3ba8fbfa2a9ed31adc914c7f27915f392ff1dae1dc8fcdbab3d817c58a364edbad7faefb96c56622c3970f7c5f9cf89e5530ad453b04043ca2395e165c6f6b81ca4b9ce7b3e4ba346497e8ffea16be0109124300acc26d6222b15e4fa617a579153fa983c241f09f255731152c8a3dcd809e688bc7d857a6c73de0cbe683c49e363ac46ec25de27f32babe0a85c2e7666e9ca3b48bfe80e1006cb4baf070104d7caf0c92be5bb54a25878e796eabf7a266f
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7d58d4d12b2c76e19ce6d7b6aa8075ff4f20081a
                       f4ec135c425626762c2fdf3b940373b2b8b96714
                       39eb1795895d46ec54a3e9017bd71d86068d06c1
                       facff84f5a807e4c06179ecb723d4ed590de9536
                       c0f5ca56f76a725f4db4c73985132e2987fae0ee
                       f2d8195825ccf2d766e671481ce0a0496e8aa51c
                       d19ce025dd63d82835798697e64c28d73fa7a0f8
                       fe42d6d484f21079a2439e62db59602fc37a7c19
                       a3ed551fcdeaa81e3c4704c04d28d68a4197f8be
                       e8987a94036e49f9b6435f1e5b5b2bf75288f9ea
                       5912a99c61ad67d36f65ae7971b9c235d1a78000
                       cee14da06a8d46ead1dcfa215c1f626210d34cc2
                       a16f6f0bfde3ede8e58f481f5a7cd9ea83ff12a8
                       2215c5b0e8119717c6db6279894835afd7f62c41
                       461b9a8c687ff254c707174276219e7cf595f9a7
                       b98807cf84da2a6b4143897f1aeb0daff2471ba2
                       27360656a1cc8abd58c6d510cdab9385404a9091
                       6bcb4933b32fc1604284ee2e5f9b0dd8fc0c3079
                       e85604d669d411b15481f0f3c762626280287b16
                       63b3ba1e
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ad:1f:7b:14:68:cc:f4:be:75:2a:81:c6:79:42:43:29:f3:93:06:61],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-12-16 05:12:59.070  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-16 05:12:59.071 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-16 05:12:59.072 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-12-16 05:12:59.073 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-16 05:12:59.074  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-12-16 05:12:59.075  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-16 05:12:59.075  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-16 05:12:59.075 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-16 05:12:59.076 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-16 05:12:59.076 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-16 05:12:59.080 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-16 05:12:59.081 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-16 05:12:59.081 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-16 05:12:59.081 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-16 05:12:59.592  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-16 05:12:59.592  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-16 05:12:59.593 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-16 05:12:59.593 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-16 05:12:59.595  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-16 05:12:59.595  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-16 05:12:59.596 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-16 05:12:59.596 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-16 05:12:59.596 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-16 05:12:59.597 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-16 05:12:59.597 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-16 05:12:59.598 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-16 05:12:59.598 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-16 05:12:59.599 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-16 05:12:59.599 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-16 05:12:59.600 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-16 05:12:59.604 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 695172726589900452199922147937034232894960977533
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Dec 16 03:13:02 UTC 2022
           Final Date: Wed Dec 15 03:13:01 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [12:6c:b2:f6:7a:e9:75:1a:54:fd:f3:dd:8c:86:83:f5:2d:bb:05:79],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7d58d4d12b2c76e19ce6d7b6aa8075ff4f20081a
                       f4ec135c425626762c2fdf3b940373b2b8b96714
                       39eb1795895d46ec54a3e9017bd71d86068d06c1
                       facff84f5a807e4c06179ecb723d4ed590de9536
                       c0f5ca56f76a725f4db4c73985132e2987fae0ee
                       f2d8195825ccf2d766e671481ce0a0496e8aa51c
                       d19ce025dd63d82835798697e64c28d73fa7a0f8
                       fe42d6d484f21079a2439e62db59602fc37a7c19
                       a3ed551fcdeaa81e3c4704c04d28d68a4197f8be
                       e8987a94036e49f9b6435f1e5b5b2bf75288f9ea
                       5912a99c61ad67d36f65ae7971b9c235d1a78000
                       cee14da06a8d46ead1dcfa215c1f626210d34cc2
                       a16f6f0bfde3ede8e58f481f5a7cd9ea83ff12a8
                       2215c5b0e8119717c6db6279894835afd7f62c41
                       461b9a8c687ff254c707174276219e7cf595f9a7
                       b98807cf84da2a6b4143897f1aeb0daff2471ba2
                       27360656a1cc8abd58c6d510cdab9385404a9091
                       6bcb4933b32fc1604284ee2e5f9b0dd8fc0c3079
                       e85604d669d411b15481f0f3c762626280287b16
                       63b3ba1e
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [4e:50:77:93:87:10:c3:96:85:ec:87:9f:14:db:b5:01:7c:e2:57:ba],[56:66:d1:a4]
        modulus: bba3ad1a84cac0eeef131236ba9ce8f6ea27bed1ec5b0e4ca7d08d316c7d44e4f9a1e3e146553d2e73496c509940860a8b471cb28b525086e3ea2f71f02f9611bcf991c1d7a2a8ddc8c797a15848f966ff5c428b2eebaf481f4c87ae8791683c1f57d4e980f2f8d715fd2f67550ab9a8a90c8ecc4dda403636703670da3f21aa4f04488217b0b2d1f6ccfc17bb4040d0ec95fa09d99d398d6488e73c1abfb532dda675224921880892f96a812afea205b930d2a9b57a4aae7aa87693192afc0a20b77db9e618d66b36b4cbb7905daab560bad2f8fd2b95aa3d218f72a7d5212c8a31ec9996a2424aef232c6e60fceedbf74756c64ad8633a0cad6b64c2a3b215
public exponent: 10001

] 
2022-12-16 05:14:40.795  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-16 05:14:40.798 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-16 05:14:40.801 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-12-16 05:14:40.802 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-16 05:14:40.802  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-12-16 05:14:40.803  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-16 05:14:40.805  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-16 05:14:40.805 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-16 05:14:40.806 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-16 05:14:40.806 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-16 05:14:40.811 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-16 05:14:40.813 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-16 05:14:40.813 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-16 05:14:40.814 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-16 05:14:40.952  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-16 05:14:40.953  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-16 05:14:40.953 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-16 05:14:40.953 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-16 05:14:40.955  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-16 05:14:40.956  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-16 05:14:40.957 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-16 05:14:40.959 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-16 05:14:40.960 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-16 05:14:40.962 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-16 05:14:40.962 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-16 05:14:40.974 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-16 05:14:40.976 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-16 05:14:40.977 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-16 05:14:40.977 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-16 05:14:40.978 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-16 05:14:40.982 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 695172726589900452199922147937034232894960977533
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Dec 16 03:13:02 UTC 2022
           Final Date: Wed Dec 15 03:13:01 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [12:6c:b2:f6:7a:e9:75:1a:54:fd:f3:dd:8c:86:83:f5:2d:bb:05:79],[56:66:d1:a4]
        modulus: c7b64dbf34e52bedb840e2d587fc66a671fa287c209bdebe30a236ca532b5ed5ed31b79043eaa6c6170e7f76e08e9a59aba64e0bd81be87317be02d2517fbf26ce870367315ce3969ed96a790a62665b1067a0ff680b4bd6c48b77f6c7e89d645b660b8b06ef9ca33ac06470928b1e20706eb5431949264f0742c74a3c95b3caf7586eaf9f7a275d981d5d14f216a863a93dd43cf477bb38bcc8f17212913408b7322bfec6aeb7cfc34fdd65c438cf76c582282440f55740a789af5c3fea04067443f3c9d0240eb2d9e5495f7920b3ba8fbfa2a9ed31adc914c7f27915f392ff1dae1dc8fcdbab3d817c58a364edbad7faefb96c56622c3970f7c5f9cf89e5530ad453b04043ca2395e165c6f6b81ca4b9ce7b3e4ba346497e8ffea16be0109124300acc26d6222b15e4fa617a579153fa983c241f09f255731152c8a3dcd809e688bc7d857a6c73de0cbe683c49e363ac46ec25de27f32babe0a85c2e7666e9ca3b48bfe80e1006cb4baf070104d7caf0c92be5bb54a25878e796eabf7a266f
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7d58d4d12b2c76e19ce6d7b6aa8075ff4f20081a
                       f4ec135c425626762c2fdf3b940373b2b8b96714
                       39eb1795895d46ec54a3e9017bd71d86068d06c1
                       facff84f5a807e4c06179ecb723d4ed590de9536
                       c0f5ca56f76a725f4db4c73985132e2987fae0ee
                       f2d8195825ccf2d766e671481ce0a0496e8aa51c
                       d19ce025dd63d82835798697e64c28d73fa7a0f8
                       fe42d6d484f21079a2439e62db59602fc37a7c19
                       a3ed551fcdeaa81e3c4704c04d28d68a4197f8be
                       e8987a94036e49f9b6435f1e5b5b2bf75288f9ea
                       5912a99c61ad67d36f65ae7971b9c235d1a78000
                       cee14da06a8d46ead1dcfa215c1f626210d34cc2
                       a16f6f0bfde3ede8e58f481f5a7cd9ea83ff12a8
                       2215c5b0e8119717c6db6279894835afd7f62c41
                       461b9a8c687ff254c707174276219e7cf595f9a7
                       b98807cf84da2a6b4143897f1aeb0daff2471ba2
                       27360656a1cc8abd58c6d510cdab9385404a9091
                       6bcb4933b32fc1604284ee2e5f9b0dd8fc0c3079
                       e85604d669d411b15481f0f3c762626280287b16
                       63b3ba1e
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [fb:c6:17:3a:13:a7:50:60:e9:73:be:32:63:0c:a4:fa:68:b2:b9:0e],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-12-16 05:17:31.606  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-16 05:17:31.608 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-16 05:17:31.609 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-12-16 05:17:31.610 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-16 05:17:31.611  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-12-16 05:17:31.611  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-16 05:17:31.612  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-16 05:17:31.612 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-16 05:17:31.612 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-16 05:17:31.613 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-16 05:17:31.618 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-16 05:17:31.619 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-16 05:17:31.619 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-16 05:17:31.620 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-16 05:17:31.755  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-16 05:17:31.757  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-16 05:17:31.757 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-16 05:17:31.757 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-16 05:17:31.760  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-16 05:17:31.760  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-16 05:17:31.761 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-16 05:17:31.761 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-16 05:17:31.762 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-16 05:17:31.763 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-16 05:17:31.763 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-16 05:17:31.764 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-16 05:17:31.765 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-16 05:17:31.765 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-16 05:17:31.765 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-16 05:17:31.766 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-16 05:17:31.770 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 695172726589900452199922147937034232894960977533
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Dec 16 03:13:02 UTC 2022
           Final Date: Wed Dec 15 03:13:01 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [12:6c:b2:f6:7a:e9:75:1a:54:fd:f3:dd:8c:86:83:f5:2d:bb:05:79],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7d58d4d12b2c76e19ce6d7b6aa8075ff4f20081a
                       f4ec135c425626762c2fdf3b940373b2b8b96714
                       39eb1795895d46ec54a3e9017bd71d86068d06c1
                       facff84f5a807e4c06179ecb723d4ed590de9536
                       c0f5ca56f76a725f4db4c73985132e2987fae0ee
                       f2d8195825ccf2d766e671481ce0a0496e8aa51c
                       d19ce025dd63d82835798697e64c28d73fa7a0f8
                       fe42d6d484f21079a2439e62db59602fc37a7c19
                       a3ed551fcdeaa81e3c4704c04d28d68a4197f8be
                       e8987a94036e49f9b6435f1e5b5b2bf75288f9ea
                       5912a99c61ad67d36f65ae7971b9c235d1a78000
                       cee14da06a8d46ead1dcfa215c1f626210d34cc2
                       a16f6f0bfde3ede8e58f481f5a7cd9ea83ff12a8
                       2215c5b0e8119717c6db6279894835afd7f62c41
                       461b9a8c687ff254c707174276219e7cf595f9a7
                       b98807cf84da2a6b4143897f1aeb0daff2471ba2
                       27360656a1cc8abd58c6d510cdab9385404a9091
                       6bcb4933b32fc1604284ee2e5f9b0dd8fc0c3079
                       e85604d669d411b15481f0f3c762626280287b16
                       63b3ba1e
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [58:0d:ef:6b:6d:b3:a3:d9:3e:23:0f:af:e7:ee:69:85:dc:7d:25:37],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-12-16 05:24:34.938  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-16 05:24:34.941 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-16 05:24:34.943 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-12-16 05:24:34.944 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-16 05:24:34.944  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-12-16 05:24:34.945  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-16 05:24:34.945  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-16 05:24:34.946 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-16 05:24:34.946 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-16 05:24:34.947 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-16 05:24:34.951 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-16 05:24:34.957 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-16 05:24:34.957 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-16 05:24:34.958 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-16 05:24:35.180  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-16 05:24:35.181  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-16 05:24:35.181 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-16 05:24:35.182 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-16 05:24:35.184  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-16 05:24:35.185  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-16 05:24:35.185 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-16 05:24:35.185 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-16 05:24:35.186 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-16 05:24:35.187 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-16 05:24:35.187 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-16 05:24:35.188 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-16 05:24:35.188 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-16 05:24:35.189 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-16 05:24:35.189 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-16 05:24:35.190 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-16 05:24:35.193 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 695172726589900452199922147937034232894960977533
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Dec 16 03:13:02 UTC 2022
           Final Date: Wed Dec 15 03:13:01 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [12:6c:b2:f6:7a:e9:75:1a:54:fd:f3:dd:8c:86:83:f5:2d:bb:05:79],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7d58d4d12b2c76e19ce6d7b6aa8075ff4f20081a
                       f4ec135c425626762c2fdf3b940373b2b8b96714
                       39eb1795895d46ec54a3e9017bd71d86068d06c1
                       facff84f5a807e4c06179ecb723d4ed590de9536
                       c0f5ca56f76a725f4db4c73985132e2987fae0ee
                       f2d8195825ccf2d766e671481ce0a0496e8aa51c
                       d19ce025dd63d82835798697e64c28d73fa7a0f8
                       fe42d6d484f21079a2439e62db59602fc37a7c19
                       a3ed551fcdeaa81e3c4704c04d28d68a4197f8be
                       e8987a94036e49f9b6435f1e5b5b2bf75288f9ea
                       5912a99c61ad67d36f65ae7971b9c235d1a78000
                       cee14da06a8d46ead1dcfa215c1f626210d34cc2
                       a16f6f0bfde3ede8e58f481f5a7cd9ea83ff12a8
                       2215c5b0e8119717c6db6279894835afd7f62c41
                       461b9a8c687ff254c707174276219e7cf595f9a7
                       b98807cf84da2a6b4143897f1aeb0daff2471ba2
                       27360656a1cc8abd58c6d510cdab9385404a9091
                       6bcb4933b32fc1604284ee2e5f9b0dd8fc0c3079
                       e85604d669d411b15481f0f3c762626280287b16
                       63b3ba1e
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [dd:d3:6d:a2:de:74:8c:fb:e0:41:f6:3c:bc:fa:44:9b:a9:6d:dd:98],[56:66:d1:a4]
        modulus: cfd70b8aeac0b3278b81162e4b8cc9cd1ae4d2da3de6bcb3355553067f2dc536e29ba058dc60fe378753b12f9c8f322ccb216bd27a54d022da621a1ebc0e4ffb7ea5f1acdb58e3cf24100c87fe8d787f67c3ab4d36bec64625a087eb57b4273207e06dd164f13bef62cd1517e5cb262dd62f65e1bd3495c090466995a8570cfc7afba09214ab84ea7d26dc7546b027ad38b4389d9ee7e20c350285e7dd6785b627c4bf2578d451baf7a692c2838e795e3441296f19c765121a7e777e91f6b9d08b6715de2d8a08637c63ce521c5b5ea32f1e35a259d31c29409b584a32138555037a18843ce13230ac421fa4a95b7db12d245930d482774161db76d07712c0c9
public exponent: 10001

] 
2022-12-16 05:33:46.105  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-16 05:33:46.108 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-16 05:33:46.111 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-12-16 05:33:46.122 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-16 05:33:46.123  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-12-16 05:33:46.124  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-16 05:33:46.124  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-16 05:33:46.125 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-16 05:33:46.125 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-16 05:33:46.126 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-16 05:33:46.130 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-16 05:33:46.131 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-16 05:33:46.131 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-16 05:33:46.132 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-16 05:33:46.306  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-16 05:33:46.307  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-16 05:33:46.307 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-16 05:33:46.308 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-16 05:33:46.310  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-16 05:33:46.310  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-16 05:33:46.311 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-16 05:33:46.311 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-16 05:33:46.311 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-16 05:33:46.312 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-16 05:33:46.313 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-16 05:33:46.313 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-16 05:33:46.314 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-16 05:33:46.314 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-16 05:33:46.315 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-16 05:33:46.315 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-16 05:33:46.319 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 695172726589900452199922147937034232894960977533
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Dec 16 03:13:02 UTC 2022
           Final Date: Wed Dec 15 03:13:01 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [12:6c:b2:f6:7a:e9:75:1a:54:fd:f3:dd:8c:86:83:f5:2d:bb:05:79],[56:66:d1:a4]
        modulus: c7b64dbf34e52bedb840e2d587fc66a671fa287c209bdebe30a236ca532b5ed5ed31b79043eaa6c6170e7f76e08e9a59aba64e0bd81be87317be02d2517fbf26ce870367315ce3969ed96a790a62665b1067a0ff680b4bd6c48b77f6c7e89d645b660b8b06ef9ca33ac06470928b1e20706eb5431949264f0742c74a3c95b3caf7586eaf9f7a275d981d5d14f216a863a93dd43cf477bb38bcc8f17212913408b7322bfec6aeb7cfc34fdd65c438cf76c582282440f55740a789af5c3fea04067443f3c9d0240eb2d9e5495f7920b3ba8fbfa2a9ed31adc914c7f27915f392ff1dae1dc8fcdbab3d817c58a364edbad7faefb96c56622c3970f7c5f9cf89e5530ad453b04043ca2395e165c6f6b81ca4b9ce7b3e4ba346497e8ffea16be0109124300acc26d6222b15e4fa617a579153fa983c241f09f255731152c8a3dcd809e688bc7d857a6c73de0cbe683c49e363ac46ec25de27f32babe0a85c2e7666e9ca3b48bfe80e1006cb4baf070104d7caf0c92be5bb54a25878e796eabf7a266f
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7d58d4d12b2c76e19ce6d7b6aa8075ff4f20081a
                       f4ec135c425626762c2fdf3b940373b2b8b96714
                       39eb1795895d46ec54a3e9017bd71d86068d06c1
                       facff84f5a807e4c06179ecb723d4ed590de9536
                       c0f5ca56f76a725f4db4c73985132e2987fae0ee
                       f2d8195825ccf2d766e671481ce0a0496e8aa51c
                       d19ce025dd63d82835798697e64c28d73fa7a0f8
                       fe42d6d484f21079a2439e62db59602fc37a7c19
                       a3ed551fcdeaa81e3c4704c04d28d68a4197f8be
                       e8987a94036e49f9b6435f1e5b5b2bf75288f9ea
                       5912a99c61ad67d36f65ae7971b9c235d1a78000
                       cee14da06a8d46ead1dcfa215c1f626210d34cc2
                       a16f6f0bfde3ede8e58f481f5a7cd9ea83ff12a8
                       2215c5b0e8119717c6db6279894835afd7f62c41
                       461b9a8c687ff254c707174276219e7cf595f9a7
                       b98807cf84da2a6b4143897f1aeb0daff2471ba2
                       27360656a1cc8abd58c6d510cdab9385404a9091
                       6bcb4933b32fc1604284ee2e5f9b0dd8fc0c3079
                       e85604d669d411b15481f0f3c762626280287b16
                       63b3ba1e
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [40:33:4e:16:53:8b:09:eb:83:2f:5b:05:e2:95:59:de:e9:fd:de:b4],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-12-16 05:34:06.019  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-16 05:34:06.020 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-16 05:34:06.021 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-12-16 05:34:06.022 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-16 05:34:06.022  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-12-16 05:34:06.022  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-16 05:34:06.023  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-16 05:34:06.023 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-16 05:34:06.024 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-16 05:34:06.024 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-16 05:34:06.029 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-16 05:34:06.030 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-16 05:34:06.030 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-16 05:34:06.030 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-16 05:34:07.005  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-16 05:34:07.006  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-16 05:34:07.007 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-16 05:34:07.009 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-16 05:34:07.010  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-16 05:34:07.010  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-16 05:34:07.011 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-16 05:34:07.011 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-16 05:34:07.012 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-16 05:34:07.012 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-16 05:34:07.013 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-16 05:34:07.013 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-16 05:34:07.014 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-16 05:34:07.015 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-16 05:34:07.015 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-16 05:34:07.016 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-16 05:34:07.019 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 695172726589900452199922147937034232894960977533
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Dec 16 03:13:02 UTC 2022
           Final Date: Wed Dec 15 03:13:01 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [12:6c:b2:f6:7a:e9:75:1a:54:fd:f3:dd:8c:86:83:f5:2d:bb:05:79],[56:66:d1:a4]
        modulus: c7b64dbf34e52bedb840e2d587fc66a671fa287c209bdebe30a236ca532b5ed5ed31b79043eaa6c6170e7f76e08e9a59aba64e0bd81be87317be02d2517fbf26ce870367315ce3969ed96a790a62665b1067a0ff680b4bd6c48b77f6c7e89d645b660b8b06ef9ca33ac06470928b1e20706eb5431949264f0742c74a3c95b3caf7586eaf9f7a275d981d5d14f216a863a93dd43cf477bb38bcc8f17212913408b7322bfec6aeb7cfc34fdd65c438cf76c582282440f55740a789af5c3fea04067443f3c9d0240eb2d9e5495f7920b3ba8fbfa2a9ed31adc914c7f27915f392ff1dae1dc8fcdbab3d817c58a364edbad7faefb96c56622c3970f7c5f9cf89e5530ad453b04043ca2395e165c6f6b81ca4b9ce7b3e4ba346497e8ffea16be0109124300acc26d6222b15e4fa617a579153fa983c241f09f255731152c8a3dcd809e688bc7d857a6c73de0cbe683c49e363ac46ec25de27f32babe0a85c2e7666e9ca3b48bfe80e1006cb4baf070104d7caf0c92be5bb54a25878e796eabf7a266f
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7d58d4d12b2c76e19ce6d7b6aa8075ff4f20081a
                       f4ec135c425626762c2fdf3b940373b2b8b96714
                       39eb1795895d46ec54a3e9017bd71d86068d06c1
                       facff84f5a807e4c06179ecb723d4ed590de9536
                       c0f5ca56f76a725f4db4c73985132e2987fae0ee
                       f2d8195825ccf2d766e671481ce0a0496e8aa51c
                       d19ce025dd63d82835798697e64c28d73fa7a0f8
                       fe42d6d484f21079a2439e62db59602fc37a7c19
                       a3ed551fcdeaa81e3c4704c04d28d68a4197f8be
                       e8987a94036e49f9b6435f1e5b5b2bf75288f9ea
                       5912a99c61ad67d36f65ae7971b9c235d1a78000
                       cee14da06a8d46ead1dcfa215c1f626210d34cc2
                       a16f6f0bfde3ede8e58f481f5a7cd9ea83ff12a8
                       2215c5b0e8119717c6db6279894835afd7f62c41
                       461b9a8c687ff254c707174276219e7cf595f9a7
                       b98807cf84da2a6b4143897f1aeb0daff2471ba2
                       27360656a1cc8abd58c6d510cdab9385404a9091
                       6bcb4933b32fc1604284ee2e5f9b0dd8fc0c3079
                       e85604d669d411b15481f0f3c762626280287b16
                       63b3ba1e
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [06:31:83:de:13:05:30:24:88:d1:86:3b:69:85:96:de:a4:f5:78:aa],[56:66:d1:a4]
        modulus: c21b028d0d8343c462cb4dbae9b0fba57dbb6c655bd956396843afba8442902ae17924c277876cd68963292f723eacc48ba9641913e0b548612bb958f20923bfe983f809430a6b908d6a04ecc57137ef9505f0de71c44731b2154ba4a5eef83249557bf6cb689b9588cfc7c3aed1d29435a6de56fbbc2edf48b224f0aa5e00ce8e06582d0a3c225e149f59bf4c95e29c34d73c2b07000196c53e5826bce0f8042d747cffcb878b57278f80b5287f4baab640a572283ff03775c113f6342be64aa583df7c824fdf3fc626c158092bc2f2f9cacbbc19fbc63200503b541d29eb567d54396156f6062c70166602d699ecbdec83b5709227574dc4f70d32fd55efaf
public exponent: 10001

] 
2022-12-16 06:02:22.115  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-16 06:02:22.120 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-16 06:02:22.123 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-12-16 06:02:22.124 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-16 06:02:22.124  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-12-16 06:02:22.125  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-16 06:02:22.125  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-16 06:02:22.125 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-16 06:02:22.126 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-16 06:02:22.126 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-16 06:02:22.131 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-16 06:02:22.132 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-16 06:02:22.132 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-16 06:02:22.133 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-16 06:02:22.297  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-16 06:02:22.298  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-16 06:02:22.298 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-16 06:02:22.299 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-16 06:02:22.300  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-16 06:02:22.300  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-16 06:02:22.301 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-16 06:02:22.301 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-16 06:02:22.301 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-16 06:02:22.302 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-16 06:02:22.302 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-16 06:02:22.302 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-16 06:02:22.304 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-16 06:02:22.304 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-16 06:02:22.304 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-16 06:02:22.305 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-16 06:02:22.309 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 695172726589900452199922147937034232894960977533
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Dec 16 03:13:02 UTC 2022
           Final Date: Wed Dec 15 03:13:01 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [12:6c:b2:f6:7a:e9:75:1a:54:fd:f3:dd:8c:86:83:f5:2d:bb:05:79],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7d58d4d12b2c76e19ce6d7b6aa8075ff4f20081a
                       f4ec135c425626762c2fdf3b940373b2b8b96714
                       39eb1795895d46ec54a3e9017bd71d86068d06c1
                       facff84f5a807e4c06179ecb723d4ed590de9536
                       c0f5ca56f76a725f4db4c73985132e2987fae0ee
                       f2d8195825ccf2d766e671481ce0a0496e8aa51c
                       d19ce025dd63d82835798697e64c28d73fa7a0f8
                       fe42d6d484f21079a2439e62db59602fc37a7c19
                       a3ed551fcdeaa81e3c4704c04d28d68a4197f8be
                       e8987a94036e49f9b6435f1e5b5b2bf75288f9ea
                       5912a99c61ad67d36f65ae7971b9c235d1a78000
                       cee14da06a8d46ead1dcfa215c1f626210d34cc2
                       a16f6f0bfde3ede8e58f481f5a7cd9ea83ff12a8
                       2215c5b0e8119717c6db6279894835afd7f62c41
                       461b9a8c687ff254c707174276219e7cf595f9a7
                       b98807cf84da2a6b4143897f1aeb0daff2471ba2
                       27360656a1cc8abd58c6d510cdab9385404a9091
                       6bcb4933b32fc1604284ee2e5f9b0dd8fc0c3079
                       e85604d669d411b15481f0f3c762626280287b16
                       63b3ba1e
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ed:a4:a6:bb:9d:77:ab:30:81:5b:3f:25:60:94:93:37:c2:3b:d0:ea],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-12-16 06:02:27.907  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-16 06:02:27.908 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-16 06:02:27.909 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-12-16 06:02:27.909 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-16 06:02:27.909  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-12-16 06:02:27.910  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-16 06:02:27.910  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-16 06:02:27.911 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-16 06:02:27.911 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-16 06:02:27.911 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-16 06:02:27.915 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-16 06:02:27.915 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-16 06:02:27.915 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-16 06:02:27.915 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-16 06:02:28.017  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-16 06:02:28.018  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-16 06:02:28.018 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-16 06:02:28.018 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-16 06:02:28.020  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-16 06:02:28.020  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-16 06:02:28.020 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-16 06:02:28.020 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-16 06:02:28.021 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-16 06:02:28.023 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-16 06:02:28.024 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-16 06:02:28.024 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-16 06:02:28.024 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-16 06:02:28.025 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-16 06:02:28.025 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-16 06:02:28.027 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-16 06:02:28.030 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 695172726589900452199922147937034232894960977533
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Dec 16 03:13:02 UTC 2022
           Final Date: Wed Dec 15 03:13:01 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [12:6c:b2:f6:7a:e9:75:1a:54:fd:f3:dd:8c:86:83:f5:2d:bb:05:79],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7d58d4d12b2c76e19ce6d7b6aa8075ff4f20081a
                       f4ec135c425626762c2fdf3b940373b2b8b96714
                       39eb1795895d46ec54a3e9017bd71d86068d06c1
                       facff84f5a807e4c06179ecb723d4ed590de9536
                       c0f5ca56f76a725f4db4c73985132e2987fae0ee
                       f2d8195825ccf2d766e671481ce0a0496e8aa51c
                       d19ce025dd63d82835798697e64c28d73fa7a0f8
                       fe42d6d484f21079a2439e62db59602fc37a7c19
                       a3ed551fcdeaa81e3c4704c04d28d68a4197f8be
                       e8987a94036e49f9b6435f1e5b5b2bf75288f9ea
                       5912a99c61ad67d36f65ae7971b9c235d1a78000
                       cee14da06a8d46ead1dcfa215c1f626210d34cc2
                       a16f6f0bfde3ede8e58f481f5a7cd9ea83ff12a8
                       2215c5b0e8119717c6db6279894835afd7f62c41
                       461b9a8c687ff254c707174276219e7cf595f9a7
                       b98807cf84da2a6b4143897f1aeb0daff2471ba2
                       27360656a1cc8abd58c6d510cdab9385404a9091
                       6bcb4933b32fc1604284ee2e5f9b0dd8fc0c3079
                       e85604d669d411b15481f0f3c762626280287b16
                       63b3ba1e
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ef:7c:11:3d:f3:75:a0:1a:50:ed:7e:c9:76:6a:09:97:90:22:0c:2a],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

]