Results

By type

          2023-01-06 03:07:54,127 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2023-01-06 03:07:55,597 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2023-01-06 03:07:56.370  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Jan 06, 2023 3:07:58 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Jan 06, 2023 3:07:58 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Jan 06, 2023 3:07:58 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Jan 06, 2023 3:07:58 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2023-01-06 03:07:59.589 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2023-01-06 03:07:59.956  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2023-01-06 03:08:00.178  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2023-01-06 03:08:01.773 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2023-01-06 03:08:01.778 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
2023-01-06 03:08:01.780 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2023-01-06 03:08:01.788 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2023-01-06 03:08:01.834 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2023-01-06 03:08:01.838 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
	{GET [/docs]}: redirectToUi(HttpServletRequest)
2023-01-06 03:08:02.012 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2023-01-06 03:08:03.600 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Jan 06, 2023 3:08:04 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2023-01-06 03:08:05.044  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 12.087 seconds (JVM running for 14.069)
Jan 06, 2023 3:08:22 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2023-01-06 03:08:58.946  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-06 03:08:58.953 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-06 03:08:58.993 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2023-01-06 03:08:58.996 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-06 03:08:59.018  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2023-01-06 03:08:59.021  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-06 03:08:59.022  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-06 03:08:59.023 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-06 03:08:59.023 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-06 03:08:59.027 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-06 03:08:59.035 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-06 03:08:59.038 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-06 03:08:59.099 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-06 03:08:59.104 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-06 03:08:59.104 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-06 03:08:59.108 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-06 03:08:59.788  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-06 03:08:59.790  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-06 03:08:59.791 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-06 03:08:59.793 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-06 03:08:59.803  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-06 03:08:59.804  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-06 03:08:59.805 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-06 03:08:59.806 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-06 03:08:59.806 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-06 03:08:59.823 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-06 03:08:59.824 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-06 03:08:59.824 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-06 03:08:59.830 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-06 03:08:59.831 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-06 03:08:59.831 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-06 03:08:59.832 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-06 03:08:59.871 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 710233828469976386990212338093246758290967979139
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jan 06 03:01:27 UTC 2023
           Final Date: Wed Jan 05 03:01:26 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [43:7a:df:cb:3c:00:cb:93:a8:be:cf:20:44:94:ef:34:a2:f5:fa:49],[56:66:d1:a4]
        modulus: d58c5f1a1e999968796e08b6323c70fe712414b51013c69a0212b47aa56ddfa11707f265c6539c793b8420808416c5515bd52737e22130b70bad197f56692c5332e5dae28d3a7f1c9a6ae3e312fab6cf74e2182a4fab3f1638d21af1fc06e1a3277c5d2f55ad3c6982f08b7bd80376659680ef2307db06636e0be5653864b8ca7e7b832d9fcaf2b4813194dbe296313a55c470b57f74a2e2ad5f4542c2284b51d366a1823064c5f2abede3e9dd93e5ad2a73feaf8d6ce5efe2497ab8eb1b355a036d936b99d812d3eec550bba069493f6714d66a8857af355d7d0f4563f1b0670780120fb3369e12f8e6631d6717dc27fd3222a11d45cddd3478179890cb5d5a32914c23a17a5879b8019815c68a6180a5cdc09a7439ca498a16728af2c5d8376d39fa19453874f51ca5b75c1e591f018a0066762342cd033550b957397f87bee4447cf8a6ceb187deff5511f3fb2e9ea12844aebcaa960eb313e93b4d9b04fa1f782d7d810f41f08b4121e55517c63c0dee951e85b93f2321b5d51a10d10127
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5476f871910f593e5d42adbfa2e043d6c2a0135d
                       8f47d2d72c75406a777c74d8d7256c70c101778f
                       a1de2b9fdfe288c3278ff6a80edc7b14f057560d
                       2b2f2c3f50a1d062394f0432be5284c58e7901d3
                       42269c8aabf2e7700998926a5be810bcb5c52984
                       28d97d3a95e647f7ed1f16352efd0e79be15ad36
                       4878d2966a8d2381895c7daecc3dcb0bca9cfff2
                       3a41cc2a5c9356b45aeadd9545e7c71133ba7b88
                       895d82e8630e28a686d4268f8ae5dec8d6c2fa32
                       ec23c2d1241ad4ad44acd29715cb7d4f41d735c2
                       a0056da28f0c71a913a6d30ddd09daee563cead7
                       803e872dab726fac93314757dcdce269ac43c24f
                       2904e33cde1a874834afda4ea7acda4e31bd8804
                       7d26c73d4d0bd355909e08f5e95de5a637b494b3
                       4a873c21f3ba79dd63ea77c0617a182516df8297
                       d0e6bad691218a42c58fbbe3bc232c3a6b85b182
                       5a453ce63e16ccbe79598896c95610e855645567
                       cab3fb895e0b7c1b7efeff1fd99c11ecaee57afc
                       bbb68f3d0e48eea0ec6892fe67f4a3d1b205abcf
                       e581787d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [52:f3:bc:1e:de:17:e3:97:0c:95:6c:e1:bd:ec:d1:5f:5e:42:ef:46],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-06 04:44:05.960  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-06 04:44:05.966 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-06 04:44:05.969 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-06 04:44:05.976 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-06 04:44:05.977  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-06 04:44:05.978  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-06 04:44:05.978  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-06 04:44:05.979 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-06 04:44:05.979 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-06 04:44:05.980 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-06 04:44:05.986 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-06 04:44:05.988 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-06 04:44:05.988 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-06 04:44:05.988 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-06 04:44:06.239  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-06 04:44:06.240  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-06 04:44:06.240 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-06 04:44:06.241 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-06 04:44:06.244  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-06 04:44:06.244  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-06 04:44:06.245 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-06 04:44:06.246 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-06 04:44:06.246 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-06 04:44:06.247 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-06 04:44:06.247 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-06 04:44:06.248 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-06 04:44:06.249 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-06 04:44:06.249 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-06 04:44:06.250 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-06 04:44:06.251 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-06 04:44:06.255 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 710233828469976386990212338093246758290967979139
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jan 06 03:01:27 UTC 2023
           Final Date: Wed Jan 05 03:01:26 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [43:7a:df:cb:3c:00:cb:93:a8:be:cf:20:44:94:ef:34:a2:f5:fa:49],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5476f871910f593e5d42adbfa2e043d6c2a0135d
                       8f47d2d72c75406a777c74d8d7256c70c101778f
                       a1de2b9fdfe288c3278ff6a80edc7b14f057560d
                       2b2f2c3f50a1d062394f0432be5284c58e7901d3
                       42269c8aabf2e7700998926a5be810bcb5c52984
                       28d97d3a95e647f7ed1f16352efd0e79be15ad36
                       4878d2966a8d2381895c7daecc3dcb0bca9cfff2
                       3a41cc2a5c9356b45aeadd9545e7c71133ba7b88
                       895d82e8630e28a686d4268f8ae5dec8d6c2fa32
                       ec23c2d1241ad4ad44acd29715cb7d4f41d735c2
                       a0056da28f0c71a913a6d30ddd09daee563cead7
                       803e872dab726fac93314757dcdce269ac43c24f
                       2904e33cde1a874834afda4ea7acda4e31bd8804
                       7d26c73d4d0bd355909e08f5e95de5a637b494b3
                       4a873c21f3ba79dd63ea77c0617a182516df8297
                       d0e6bad691218a42c58fbbe3bc232c3a6b85b182
                       5a453ce63e16ccbe79598896c95610e855645567
                       cab3fb895e0b7c1b7efeff1fd99c11ecaee57afc
                       bbb68f3d0e48eea0ec6892fe67f4a3d1b205abcf
                       e581787d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [68:8c:37:8a:00:78:b8:e7:43:34:9f:ee:ef:63:c6:2a:31:e6:5a:f5],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-06 04:45:52.116  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-06 04:45:52.117 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-06 04:45:52.119 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2023-01-06 04:45:52.120 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-06 04:45:52.120  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2023-01-06 04:45:52.121  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-06 04:45:52.121  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-06 04:45:52.122 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-06 04:45:52.122 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-06 04:45:52.124 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-06 04:45:52.133 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-06 04:45:52.134 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-06 04:45:52.134 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-06 04:45:52.134 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-06 04:45:52.365  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-06 04:45:52.366  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-06 04:45:52.366 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-06 04:45:52.367 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-06 04:45:52.369  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-06 04:45:52.369  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-06 04:45:52.369 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-06 04:45:52.370 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-06 04:45:52.370 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-06 04:45:52.371 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-06 04:45:52.371 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-06 04:45:52.371 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-06 04:45:52.372 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-06 04:45:52.372 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-06 04:45:52.373 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-06 04:45:52.374 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-06 04:45:52.377 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 710233828469976386990212338093246758290967979139
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jan 06 03:01:27 UTC 2023
           Final Date: Wed Jan 05 03:01:26 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [43:7a:df:cb:3c:00:cb:93:a8:be:cf:20:44:94:ef:34:a2:f5:fa:49],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5476f871910f593e5d42adbfa2e043d6c2a0135d
                       8f47d2d72c75406a777c74d8d7256c70c101778f
                       a1de2b9fdfe288c3278ff6a80edc7b14f057560d
                       2b2f2c3f50a1d062394f0432be5284c58e7901d3
                       42269c8aabf2e7700998926a5be810bcb5c52984
                       28d97d3a95e647f7ed1f16352efd0e79be15ad36
                       4878d2966a8d2381895c7daecc3dcb0bca9cfff2
                       3a41cc2a5c9356b45aeadd9545e7c71133ba7b88
                       895d82e8630e28a686d4268f8ae5dec8d6c2fa32
                       ec23c2d1241ad4ad44acd29715cb7d4f41d735c2
                       a0056da28f0c71a913a6d30ddd09daee563cead7
                       803e872dab726fac93314757dcdce269ac43c24f
                       2904e33cde1a874834afda4ea7acda4e31bd8804
                       7d26c73d4d0bd355909e08f5e95de5a637b494b3
                       4a873c21f3ba79dd63ea77c0617a182516df8297
                       d0e6bad691218a42c58fbbe3bc232c3a6b85b182
                       5a453ce63e16ccbe79598896c95610e855645567
                       cab3fb895e0b7c1b7efeff1fd99c11ecaee57afc
                       bbb68f3d0e48eea0ec6892fe67f4a3d1b205abcf
                       e581787d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [2f:b7:bd:a5:ad:c4:d0:03:2e:07:d0:1a:46:09:aa:b2:db:20:70:3c],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-06 04:48:49.827  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-06 04:48:49.829 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-06 04:48:49.832 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2023-01-06 04:48:49.832 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-06 04:48:49.833  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2023-01-06 04:48:49.834  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-06 04:48:49.834  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-06 04:48:49.834 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-06 04:48:49.835 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-06 04:48:49.835 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-06 04:48:49.839 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-06 04:48:49.840 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-06 04:48:49.840 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-06 04:48:49.841 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-06 04:48:50.061  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-06 04:48:50.062  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-06 04:48:50.063 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-06 04:48:50.063 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-06 04:48:50.064  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-06 04:48:50.065  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-06 04:48:50.065 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-06 04:48:50.066 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-06 04:48:50.066 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-06 04:48:50.067 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-06 04:48:50.067 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-06 04:48:50.067 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-06 04:48:50.068 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-06 04:48:50.068 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-06 04:48:50.069 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-06 04:48:50.070 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-06 04:48:50.074 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 710233828469976386990212338093246758290967979139
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jan 06 03:01:27 UTC 2023
           Final Date: Wed Jan 05 03:01:26 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [43:7a:df:cb:3c:00:cb:93:a8:be:cf:20:44:94:ef:34:a2:f5:fa:49],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5476f871910f593e5d42adbfa2e043d6c2a0135d
                       8f47d2d72c75406a777c74d8d7256c70c101778f
                       a1de2b9fdfe288c3278ff6a80edc7b14f057560d
                       2b2f2c3f50a1d062394f0432be5284c58e7901d3
                       42269c8aabf2e7700998926a5be810bcb5c52984
                       28d97d3a95e647f7ed1f16352efd0e79be15ad36
                       4878d2966a8d2381895c7daecc3dcb0bca9cfff2
                       3a41cc2a5c9356b45aeadd9545e7c71133ba7b88
                       895d82e8630e28a686d4268f8ae5dec8d6c2fa32
                       ec23c2d1241ad4ad44acd29715cb7d4f41d735c2
                       a0056da28f0c71a913a6d30ddd09daee563cead7
                       803e872dab726fac93314757dcdce269ac43c24f
                       2904e33cde1a874834afda4ea7acda4e31bd8804
                       7d26c73d4d0bd355909e08f5e95de5a637b494b3
                       4a873c21f3ba79dd63ea77c0617a182516df8297
                       d0e6bad691218a42c58fbbe3bc232c3a6b85b182
                       5a453ce63e16ccbe79598896c95610e855645567
                       cab3fb895e0b7c1b7efeff1fd99c11ecaee57afc
                       bbb68f3d0e48eea0ec6892fe67f4a3d1b205abcf
                       e581787d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [10:8e:6c:ef:96:0b:27:e4:6d:e2:80:dd:e3:c2:98:da:54:84:37:1c],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-06 04:51:18.275  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-06 04:51:18.278 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-06 04:51:18.280 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-06 04:51:18.281 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-06 04:51:18.282  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-06 04:51:18.282  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-06 04:51:18.283  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-06 04:51:18.284 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-06 04:51:18.284 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-06 04:51:18.284 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-06 04:51:18.289 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-06 04:51:18.290 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-06 04:51:18.290 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-06 04:51:18.291 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-06 04:51:18.466  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-06 04:51:18.468  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-06 04:51:18.468 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-06 04:51:18.469 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-06 04:51:18.470  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-06 04:51:18.471  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-06 04:51:18.472 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-06 04:51:18.472 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-06 04:51:18.472 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-06 04:51:18.474 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-06 04:51:18.474 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-06 04:51:18.474 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-06 04:51:18.475 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-06 04:51:18.475 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-06 04:51:18.476 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-06 04:51:18.477 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-06 04:51:18.480 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 710233828469976386990212338093246758290967979139
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jan 06 03:01:27 UTC 2023
           Final Date: Wed Jan 05 03:01:26 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [43:7a:df:cb:3c:00:cb:93:a8:be:cf:20:44:94:ef:34:a2:f5:fa:49],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5476f871910f593e5d42adbfa2e043d6c2a0135d
                       8f47d2d72c75406a777c74d8d7256c70c101778f
                       a1de2b9fdfe288c3278ff6a80edc7b14f057560d
                       2b2f2c3f50a1d062394f0432be5284c58e7901d3
                       42269c8aabf2e7700998926a5be810bcb5c52984
                       28d97d3a95e647f7ed1f16352efd0e79be15ad36
                       4878d2966a8d2381895c7daecc3dcb0bca9cfff2
                       3a41cc2a5c9356b45aeadd9545e7c71133ba7b88
                       895d82e8630e28a686d4268f8ae5dec8d6c2fa32
                       ec23c2d1241ad4ad44acd29715cb7d4f41d735c2
                       a0056da28f0c71a913a6d30ddd09daee563cead7
                       803e872dab726fac93314757dcdce269ac43c24f
                       2904e33cde1a874834afda4ea7acda4e31bd8804
                       7d26c73d4d0bd355909e08f5e95de5a637b494b3
                       4a873c21f3ba79dd63ea77c0617a182516df8297
                       d0e6bad691218a42c58fbbe3bc232c3a6b85b182
                       5a453ce63e16ccbe79598896c95610e855645567
                       cab3fb895e0b7c1b7efeff1fd99c11ecaee57afc
                       bbb68f3d0e48eea0ec6892fe67f4a3d1b205abcf
                       e581787d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [c3:e2:5c:1d:e4:c0:a9:78:85:ff:08:71:19:25:f5:27:b2:19:ba:3d],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-06 04:58:37.542  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-06 04:58:37.545 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-06 04:58:37.547 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-06 04:58:37.548 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-06 04:58:37.549  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-06 04:58:37.550  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-06 04:58:37.550  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-06 04:58:37.551 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-06 04:58:37.551 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-06 04:58:37.552 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-06 04:58:37.558 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-06 04:58:37.558 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-06 04:58:37.559 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-06 04:58:37.559 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-06 04:58:37.713  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-06 04:58:37.713  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-06 04:58:37.714 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-06 04:58:37.714 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-06 04:58:37.716  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-06 04:58:37.716  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-06 04:58:37.717 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-06 04:58:37.717 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-06 04:58:37.718 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-06 04:58:37.719 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-06 04:58:37.719 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-06 04:58:37.719 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-06 04:58:37.720 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-06 04:58:37.720 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-06 04:58:37.721 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-06 04:58:37.721 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-06 04:58:37.725 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 710233828469976386990212338093246758290967979139
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jan 06 03:01:27 UTC 2023
           Final Date: Wed Jan 05 03:01:26 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [43:7a:df:cb:3c:00:cb:93:a8:be:cf:20:44:94:ef:34:a2:f5:fa:49],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5476f871910f593e5d42adbfa2e043d6c2a0135d
                       8f47d2d72c75406a777c74d8d7256c70c101778f
                       a1de2b9fdfe288c3278ff6a80edc7b14f057560d
                       2b2f2c3f50a1d062394f0432be5284c58e7901d3
                       42269c8aabf2e7700998926a5be810bcb5c52984
                       28d97d3a95e647f7ed1f16352efd0e79be15ad36
                       4878d2966a8d2381895c7daecc3dcb0bca9cfff2
                       3a41cc2a5c9356b45aeadd9545e7c71133ba7b88
                       895d82e8630e28a686d4268f8ae5dec8d6c2fa32
                       ec23c2d1241ad4ad44acd29715cb7d4f41d735c2
                       a0056da28f0c71a913a6d30ddd09daee563cead7
                       803e872dab726fac93314757dcdce269ac43c24f
                       2904e33cde1a874834afda4ea7acda4e31bd8804
                       7d26c73d4d0bd355909e08f5e95de5a637b494b3
                       4a873c21f3ba79dd63ea77c0617a182516df8297
                       d0e6bad691218a42c58fbbe3bc232c3a6b85b182
                       5a453ce63e16ccbe79598896c95610e855645567
                       cab3fb895e0b7c1b7efeff1fd99c11ecaee57afc
                       bbb68f3d0e48eea0ec6892fe67f4a3d1b205abcf
                       e581787d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [8a:f1:43:a7:9e:b0:8c:f1:62:a8:25:d8:c7:45:de:21:41:a1:58:c4],[56:66:d1:a4]
        modulus: e49b2da356c26a5654dbb3db27386323e27773364a40455584a03c85c5e3a88174dca61be00680100773739e44876713f9629b4231d5813952df78dc9dd3a7eb54fadebda0228ba783a239ce353d168a1ef90728d70e84e0654303e3a1bca62dd6b32187d6cbb9143aad647081706d9186f1613cb39c3089f10d9d6b8f529032e0949423abc78b170345308f2902e97f81d14ce1281ed63eff58c7ce3ebca93f31055686ef813e17c97657dcd2103cbc592288a0edd3489a96f517b80d6cac071d8d47401e64647a448eba77148c33860da599fb9c10fa94e0cf2c0f86b19dcb46169eedb6912939f51d91f91d1afd3e989db18aa1448baa749da3c7b236849f
public exponent: 10001

] 
2023-01-06 05:05:03.715  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-06 05:05:03.718 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-06 05:05:03.721 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-06 05:05:03.722 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-06 05:05:03.723  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-06 05:05:03.723  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-06 05:05:03.724  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-06 05:05:03.724 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-06 05:05:03.725 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-06 05:05:03.725 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-06 05:05:03.730 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-06 05:05:03.731 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-06 05:05:03.731 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-06 05:05:03.732 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-06 05:05:03.915  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-06 05:05:03.915  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-06 05:05:03.916 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-06 05:05:03.916 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-06 05:05:03.917  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-06 05:05:03.918  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-06 05:05:03.918 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-06 05:05:03.918 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-06 05:05:03.919 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-06 05:05:03.920 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-06 05:05:03.920 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-06 05:05:03.920 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-06 05:05:03.921 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-06 05:05:03.921 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-06 05:05:03.922 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-06 05:05:03.922 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-06 05:05:03.926 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 710233828469976386990212338093246758290967979139
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jan 06 03:01:27 UTC 2023
           Final Date: Wed Jan 05 03:01:26 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [43:7a:df:cb:3c:00:cb:93:a8:be:cf:20:44:94:ef:34:a2:f5:fa:49],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5476f871910f593e5d42adbfa2e043d6c2a0135d
                       8f47d2d72c75406a777c74d8d7256c70c101778f
                       a1de2b9fdfe288c3278ff6a80edc7b14f057560d
                       2b2f2c3f50a1d062394f0432be5284c58e7901d3
                       42269c8aabf2e7700998926a5be810bcb5c52984
                       28d97d3a95e647f7ed1f16352efd0e79be15ad36
                       4878d2966a8d2381895c7daecc3dcb0bca9cfff2
                       3a41cc2a5c9356b45aeadd9545e7c71133ba7b88
                       895d82e8630e28a686d4268f8ae5dec8d6c2fa32
                       ec23c2d1241ad4ad44acd29715cb7d4f41d735c2
                       a0056da28f0c71a913a6d30ddd09daee563cead7
                       803e872dab726fac93314757dcdce269ac43c24f
                       2904e33cde1a874834afda4ea7acda4e31bd8804
                       7d26c73d4d0bd355909e08f5e95de5a637b494b3
                       4a873c21f3ba79dd63ea77c0617a182516df8297
                       d0e6bad691218a42c58fbbe3bc232c3a6b85b182
                       5a453ce63e16ccbe79598896c95610e855645567
                       cab3fb895e0b7c1b7efeff1fd99c11ecaee57afc
                       bbb68f3d0e48eea0ec6892fe67f4a3d1b205abcf
                       e581787d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [92:7f:88:0c:f4:3b:55:eb:2c:12:56:3b:49:dd:01:82:35:32:48:3f],[56:66:d1:a4]
        modulus: cf53513d23a4517831a7d03fbbfef3f4d331432ba51983838be424ddd3caa9530557839e7365717076e99884f1de6a5120eeec7f8074f3fa7e4859b1c5f7a1cc759e42f2fe67be48c3365ffefad32070032f70e75da99c0e6bd2ce1e7eb8cd896ce704bc8a86a44888f26242ebde41637454f32e4cfbb38b7870c49718fa6d735f7ca93ee7a600db7d49d6da00acd6c1b391c352d000054ea2cb192e74ab9c6f16f37534cdd61118a812b04184945e75ba5aac00db8ff482ea0b957d7c26e1727fd59252a29508dd17adf08f62fefa74ce34da51a7bff13aaff8f4c902529dfd02a72647e3a79454b8112ce5d2bf96e41d11c20b565d534f47b937212965cbf5
public exponent: 10001

] 
2023-01-06 05:12:18.211  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-06 05:12:18.217 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-06 05:12:18.224 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-06 05:12:18.225 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-06 05:12:18.226  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-06 05:12:18.226  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-06 05:12:18.227  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-06 05:12:18.227 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-06 05:12:18.228 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-06 05:12:18.228 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-06 05:12:18.233 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-06 05:12:18.233 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-06 05:12:18.234 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-06 05:12:18.234 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-06 05:12:18.454  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-06 05:12:18.455  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-06 05:12:18.455 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-06 05:12:18.456 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-06 05:12:18.457  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-06 05:12:18.457  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-06 05:12:18.458 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-06 05:12:18.458 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-06 05:12:18.458 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-06 05:12:18.459 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-06 05:12:18.460 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-06 05:12:18.460 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-06 05:12:18.460 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-06 05:12:18.461 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-06 05:12:18.461 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-06 05:12:18.462 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-06 05:12:18.465 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 710233828469976386990212338093246758290967979139
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jan 06 03:01:27 UTC 2023
           Final Date: Wed Jan 05 03:01:26 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [43:7a:df:cb:3c:00:cb:93:a8:be:cf:20:44:94:ef:34:a2:f5:fa:49],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5476f871910f593e5d42adbfa2e043d6c2a0135d
                       8f47d2d72c75406a777c74d8d7256c70c101778f
                       a1de2b9fdfe288c3278ff6a80edc7b14f057560d
                       2b2f2c3f50a1d062394f0432be5284c58e7901d3
                       42269c8aabf2e7700998926a5be810bcb5c52984
                       28d97d3a95e647f7ed1f16352efd0e79be15ad36
                       4878d2966a8d2381895c7daecc3dcb0bca9cfff2
                       3a41cc2a5c9356b45aeadd9545e7c71133ba7b88
                       895d82e8630e28a686d4268f8ae5dec8d6c2fa32
                       ec23c2d1241ad4ad44acd29715cb7d4f41d735c2
                       a0056da28f0c71a913a6d30ddd09daee563cead7
                       803e872dab726fac93314757dcdce269ac43c24f
                       2904e33cde1a874834afda4ea7acda4e31bd8804
                       7d26c73d4d0bd355909e08f5e95de5a637b494b3
                       4a873c21f3ba79dd63ea77c0617a182516df8297
                       d0e6bad691218a42c58fbbe3bc232c3a6b85b182
                       5a453ce63e16ccbe79598896c95610e855645567
                       cab3fb895e0b7c1b7efeff1fd99c11ecaee57afc
                       bbb68f3d0e48eea0ec6892fe67f4a3d1b205abcf
                       e581787d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [51:a2:d1:5c:25:68:a9:74:12:49:b1:11:7a:56:ef:ad:e3:47:30:be],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-06 05:18:10.502  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-06 05:18:10.504 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-06 05:18:10.506 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-06 05:18:10.507 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-06 05:18:10.507  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-06 05:18:10.508  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-06 05:18:10.508  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-06 05:18:10.508 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-06 05:18:10.509 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-06 05:18:10.509 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-06 05:18:10.513 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-06 05:18:10.514 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-06 05:18:10.514 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-06 05:18:10.514 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-06 05:18:10.676  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-06 05:18:10.677  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-06 05:18:10.677 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-06 05:18:10.677 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-06 05:18:10.679  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-06 05:18:10.679  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-06 05:18:10.680 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-06 05:18:10.680 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-06 05:18:10.680 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-06 05:18:10.681 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-06 05:18:10.681 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-06 05:18:10.681 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-06 05:18:10.682 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-06 05:18:10.682 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-06 05:18:10.682 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-06 05:18:10.683 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-06 05:18:10.686 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 710233828469976386990212338093246758290967979139
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jan 06 03:01:27 UTC 2023
           Final Date: Wed Jan 05 03:01:26 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [43:7a:df:cb:3c:00:cb:93:a8:be:cf:20:44:94:ef:34:a2:f5:fa:49],[56:66:d1:a4]
        modulus: d58c5f1a1e999968796e08b6323c70fe712414b51013c69a0212b47aa56ddfa11707f265c6539c793b8420808416c5515bd52737e22130b70bad197f56692c5332e5dae28d3a7f1c9a6ae3e312fab6cf74e2182a4fab3f1638d21af1fc06e1a3277c5d2f55ad3c6982f08b7bd80376659680ef2307db06636e0be5653864b8ca7e7b832d9fcaf2b4813194dbe296313a55c470b57f74a2e2ad5f4542c2284b51d366a1823064c5f2abede3e9dd93e5ad2a73feaf8d6ce5efe2497ab8eb1b355a036d936b99d812d3eec550bba069493f6714d66a8857af355d7d0f4563f1b0670780120fb3369e12f8e6631d6717dc27fd3222a11d45cddd3478179890cb5d5a32914c23a17a5879b8019815c68a6180a5cdc09a7439ca498a16728af2c5d8376d39fa19453874f51ca5b75c1e591f018a0066762342cd033550b957397f87bee4447cf8a6ceb187deff5511f3fb2e9ea12844aebcaa960eb313e93b4d9b04fa1f782d7d810f41f08b4121e55517c63c0dee951e85b93f2321b5d51a10d10127
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5476f871910f593e5d42adbfa2e043d6c2a0135d
                       8f47d2d72c75406a777c74d8d7256c70c101778f
                       a1de2b9fdfe288c3278ff6a80edc7b14f057560d
                       2b2f2c3f50a1d062394f0432be5284c58e7901d3
                       42269c8aabf2e7700998926a5be810bcb5c52984
                       28d97d3a95e647f7ed1f16352efd0e79be15ad36
                       4878d2966a8d2381895c7daecc3dcb0bca9cfff2
                       3a41cc2a5c9356b45aeadd9545e7c71133ba7b88
                       895d82e8630e28a686d4268f8ae5dec8d6c2fa32
                       ec23c2d1241ad4ad44acd29715cb7d4f41d735c2
                       a0056da28f0c71a913a6d30ddd09daee563cead7
                       803e872dab726fac93314757dcdce269ac43c24f
                       2904e33cde1a874834afda4ea7acda4e31bd8804
                       7d26c73d4d0bd355909e08f5e95de5a637b494b3
                       4a873c21f3ba79dd63ea77c0617a182516df8297
                       d0e6bad691218a42c58fbbe3bc232c3a6b85b182
                       5a453ce63e16ccbe79598896c95610e855645567
                       cab3fb895e0b7c1b7efeff1fd99c11ecaee57afc
                       bbb68f3d0e48eea0ec6892fe67f4a3d1b205abcf
                       e581787d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [8e:b5:29:ab:56:68:c7:8f:5f:38:83:7c:e7:fa:0c:ec:79:be:50:12],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-06 05:25:05.816  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-06 05:25:05.821 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-06 05:25:05.826 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2023-01-06 05:25:05.828 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-06 05:25:05.829  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2023-01-06 05:25:05.830  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-06 05:25:05.831  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-06 05:25:05.832 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-06 05:25:05.833 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-06 05:25:05.834 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-06 05:25:05.841 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-06 05:25:05.843 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-06 05:25:05.844 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-06 05:25:05.845 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-06 05:25:06.055  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-06 05:25:06.056  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-06 05:25:06.056 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-06 05:25:06.057 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-06 05:25:06.058  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-06 05:25:06.058  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-06 05:25:06.059 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-06 05:25:06.059 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-06 05:25:06.060 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-06 05:25:06.060 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-06 05:25:06.061 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-06 05:25:06.061 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-06 05:25:06.062 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-06 05:25:06.062 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-06 05:25:06.062 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-06 05:25:06.063 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-06 05:25:06.066 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 710233828469976386990212338093246758290967979139
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jan 06 03:01:27 UTC 2023
           Final Date: Wed Jan 05 03:01:26 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [43:7a:df:cb:3c:00:cb:93:a8:be:cf:20:44:94:ef:34:a2:f5:fa:49],[56:66:d1:a4]
        modulus: d58c5f1a1e999968796e08b6323c70fe712414b51013c69a0212b47aa56ddfa11707f265c6539c793b8420808416c5515bd52737e22130b70bad197f56692c5332e5dae28d3a7f1c9a6ae3e312fab6cf74e2182a4fab3f1638d21af1fc06e1a3277c5d2f55ad3c6982f08b7bd80376659680ef2307db06636e0be5653864b8ca7e7b832d9fcaf2b4813194dbe296313a55c470b57f74a2e2ad5f4542c2284b51d366a1823064c5f2abede3e9dd93e5ad2a73feaf8d6ce5efe2497ab8eb1b355a036d936b99d812d3eec550bba069493f6714d66a8857af355d7d0f4563f1b0670780120fb3369e12f8e6631d6717dc27fd3222a11d45cddd3478179890cb5d5a32914c23a17a5879b8019815c68a6180a5cdc09a7439ca498a16728af2c5d8376d39fa19453874f51ca5b75c1e591f018a0066762342cd033550b957397f87bee4447cf8a6ceb187deff5511f3fb2e9ea12844aebcaa960eb313e93b4d9b04fa1f782d7d810f41f08b4121e55517c63c0dee951e85b93f2321b5d51a10d10127
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5476f871910f593e5d42adbfa2e043d6c2a0135d
                       8f47d2d72c75406a777c74d8d7256c70c101778f
                       a1de2b9fdfe288c3278ff6a80edc7b14f057560d
                       2b2f2c3f50a1d062394f0432be5284c58e7901d3
                       42269c8aabf2e7700998926a5be810bcb5c52984
                       28d97d3a95e647f7ed1f16352efd0e79be15ad36
                       4878d2966a8d2381895c7daecc3dcb0bca9cfff2
                       3a41cc2a5c9356b45aeadd9545e7c71133ba7b88
                       895d82e8630e28a686d4268f8ae5dec8d6c2fa32
                       ec23c2d1241ad4ad44acd29715cb7d4f41d735c2
                       a0056da28f0c71a913a6d30ddd09daee563cead7
                       803e872dab726fac93314757dcdce269ac43c24f
                       2904e33cde1a874834afda4ea7acda4e31bd8804
                       7d26c73d4d0bd355909e08f5e95de5a637b494b3
                       4a873c21f3ba79dd63ea77c0617a182516df8297
                       d0e6bad691218a42c58fbbe3bc232c3a6b85b182
                       5a453ce63e16ccbe79598896c95610e855645567
                       cab3fb895e0b7c1b7efeff1fd99c11ecaee57afc
                       bbb68f3d0e48eea0ec6892fe67f4a3d1b205abcf
                       e581787d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [d6:76:11:04:2c:93:a4:87:f9:8c:c7:52:e9:51:0d:57:20:58:81:7c],[56:66:d1:a4]
        modulus: a1bb32d238db07f64e78e000014db1ea8236a4007120241f3074f3d29ac7cf4d1b4297ddd2b2e7042a34ce053df06cbaa5cfaa26d55310986415771e099589980d10fba720e4c471f917db0bcee71939de17bc838d7232240d9313f2f0daea39c9469516eeb70c02a244d30b86e48ed690e53a0ba32b89c91674b1c254ae63f09851e16a8e383e9a1e7a190f47611bf6d8f5e02bcccc48a21367550978746b5cc44ee1d7f6d69b5f4531299a212d0e801dfabe3c0771248bfc44d82a497b1ba8c74de7afdae7a255edd980497ce263a76cf10d2ffab5972afa8a7ac5811613947437668a8682800080d2f3e253c8ad87f74239e1b97ca40542fcc4fb79662ba1
public exponent: 10001

] 
2023-01-06 05:32:51.132  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-06 05:32:51.135 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-06 05:32:51.139 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2023-01-06 05:32:51.141 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-06 05:32:51.142  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2023-01-06 05:32:51.143  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-06 05:32:51.143  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-06 05:32:51.144 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-06 05:32:51.144 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-06 05:32:51.145 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-06 05:32:51.149 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-06 05:32:51.151 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-06 05:32:51.151 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-06 05:32:51.151 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-06 05:32:51.328  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-06 05:32:51.329  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-06 05:32:51.329 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-06 05:32:51.329 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-06 05:32:51.331  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-06 05:32:51.331  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-06 05:32:51.331 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-06 05:32:51.332 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-06 05:32:51.332 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-06 05:32:51.333 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-06 05:32:51.333 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-06 05:32:51.333 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-06 05:32:51.334 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-06 05:32:51.334 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-06 05:32:51.334 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-06 05:32:51.335 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-06 05:32:51.339 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 710233828469976386990212338093246758290967979139
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jan 06 03:01:27 UTC 2023
           Final Date: Wed Jan 05 03:01:26 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [43:7a:df:cb:3c:00:cb:93:a8:be:cf:20:44:94:ef:34:a2:f5:fa:49],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5476f871910f593e5d42adbfa2e043d6c2a0135d
                       8f47d2d72c75406a777c74d8d7256c70c101778f
                       a1de2b9fdfe288c3278ff6a80edc7b14f057560d
                       2b2f2c3f50a1d062394f0432be5284c58e7901d3
                       42269c8aabf2e7700998926a5be810bcb5c52984
                       28d97d3a95e647f7ed1f16352efd0e79be15ad36
                       4878d2966a8d2381895c7daecc3dcb0bca9cfff2
                       3a41cc2a5c9356b45aeadd9545e7c71133ba7b88
                       895d82e8630e28a686d4268f8ae5dec8d6c2fa32
                       ec23c2d1241ad4ad44acd29715cb7d4f41d735c2
                       a0056da28f0c71a913a6d30ddd09daee563cead7
                       803e872dab726fac93314757dcdce269ac43c24f
                       2904e33cde1a874834afda4ea7acda4e31bd8804
                       7d26c73d4d0bd355909e08f5e95de5a637b494b3
                       4a873c21f3ba79dd63ea77c0617a182516df8297
                       d0e6bad691218a42c58fbbe3bc232c3a6b85b182
                       5a453ce63e16ccbe79598896c95610e855645567
                       cab3fb895e0b7c1b7efeff1fd99c11ecaee57afc
                       bbb68f3d0e48eea0ec6892fe67f4a3d1b205abcf
                       e581787d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [31:35:94:11:52:de:bf:85:c2:4f:03:cc:64:47:19:17:9e:05:04:da],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-06 05:33:08.184  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-06 05:33:08.185 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-06 05:33:08.187 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2023-01-06 05:33:08.187 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-06 05:33:08.188  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2023-01-06 05:33:08.188  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-06 05:33:08.189  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-06 05:33:08.189 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-06 05:33:08.189 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-06 05:33:08.190 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-06 05:33:08.193 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-06 05:33:08.194 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-06 05:33:08.194 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-06 05:33:08.195 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-06 05:33:08.329  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-06 05:33:08.330  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-06 05:33:08.331 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-06 05:33:08.331 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-06 05:33:08.332  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-06 05:33:08.333  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-06 05:33:08.333 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-06 05:33:08.334 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-06 05:33:08.334 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-06 05:33:08.335 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-06 05:33:08.335 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-06 05:33:08.335 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-06 05:33:08.336 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-06 05:33:08.337 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-06 05:33:08.337 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-06 05:33:08.338 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-06 05:33:08.341 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 710233828469976386990212338093246758290967979139
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jan 06 03:01:27 UTC 2023
           Final Date: Wed Jan 05 03:01:26 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [43:7a:df:cb:3c:00:cb:93:a8:be:cf:20:44:94:ef:34:a2:f5:fa:49],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5476f871910f593e5d42adbfa2e043d6c2a0135d
                       8f47d2d72c75406a777c74d8d7256c70c101778f
                       a1de2b9fdfe288c3278ff6a80edc7b14f057560d
                       2b2f2c3f50a1d062394f0432be5284c58e7901d3
                       42269c8aabf2e7700998926a5be810bcb5c52984
                       28d97d3a95e647f7ed1f16352efd0e79be15ad36
                       4878d2966a8d2381895c7daecc3dcb0bca9cfff2
                       3a41cc2a5c9356b45aeadd9545e7c71133ba7b88
                       895d82e8630e28a686d4268f8ae5dec8d6c2fa32
                       ec23c2d1241ad4ad44acd29715cb7d4f41d735c2
                       a0056da28f0c71a913a6d30ddd09daee563cead7
                       803e872dab726fac93314757dcdce269ac43c24f
                       2904e33cde1a874834afda4ea7acda4e31bd8804
                       7d26c73d4d0bd355909e08f5e95de5a637b494b3
                       4a873c21f3ba79dd63ea77c0617a182516df8297
                       d0e6bad691218a42c58fbbe3bc232c3a6b85b182
                       5a453ce63e16ccbe79598896c95610e855645567
                       cab3fb895e0b7c1b7efeff1fd99c11ecaee57afc
                       bbb68f3d0e48eea0ec6892fe67f4a3d1b205abcf
                       e581787d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [4e:b7:c0:5a:5f:d0:b5:87:4a:42:8c:6c:f9:24:ff:d5:7a:5d:d7:c7],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-06 05:58:04.124  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-06 05:58:04.128 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-06 05:58:04.131 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2023-01-06 05:58:04.132 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-06 05:58:04.132  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2023-01-06 05:58:04.133  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-06 05:58:04.134  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-06 05:58:04.134 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-06 05:58:04.135 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-06 05:58:04.135 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-06 05:58:04.140 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-06 05:58:04.141 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-06 05:58:04.142 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-06 05:58:04.142 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-06 05:58:04.292  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-06 05:58:04.293  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-06 05:58:04.293 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-06 05:58:04.293 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-06 05:58:04.295  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-06 05:58:04.295  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-06 05:58:04.296 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-06 05:58:04.296 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-06 05:58:04.296 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-06 05:58:04.297 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-06 05:58:04.298 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-06 05:58:04.298 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-06 05:58:04.298 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-06 05:58:04.299 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-06 05:58:04.299 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-06 05:58:04.300 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-06 05:58:04.303 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 710233828469976386990212338093246758290967979139
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jan 06 03:01:27 UTC 2023
           Final Date: Wed Jan 05 03:01:26 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [43:7a:df:cb:3c:00:cb:93:a8:be:cf:20:44:94:ef:34:a2:f5:fa:49],[56:66:d1:a4]
        modulus: d58c5f1a1e999968796e08b6323c70fe712414b51013c69a0212b47aa56ddfa11707f265c6539c793b8420808416c5515bd52737e22130b70bad197f56692c5332e5dae28d3a7f1c9a6ae3e312fab6cf74e2182a4fab3f1638d21af1fc06e1a3277c5d2f55ad3c6982f08b7bd80376659680ef2307db06636e0be5653864b8ca7e7b832d9fcaf2b4813194dbe296313a55c470b57f74a2e2ad5f4542c2284b51d366a1823064c5f2abede3e9dd93e5ad2a73feaf8d6ce5efe2497ab8eb1b355a036d936b99d812d3eec550bba069493f6714d66a8857af355d7d0f4563f1b0670780120fb3369e12f8e6631d6717dc27fd3222a11d45cddd3478179890cb5d5a32914c23a17a5879b8019815c68a6180a5cdc09a7439ca498a16728af2c5d8376d39fa19453874f51ca5b75c1e591f018a0066762342cd033550b957397f87bee4447cf8a6ceb187deff5511f3fb2e9ea12844aebcaa960eb313e93b4d9b04fa1f782d7d810f41f08b4121e55517c63c0dee951e85b93f2321b5d51a10d10127
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5476f871910f593e5d42adbfa2e043d6c2a0135d
                       8f47d2d72c75406a777c74d8d7256c70c101778f
                       a1de2b9fdfe288c3278ff6a80edc7b14f057560d
                       2b2f2c3f50a1d062394f0432be5284c58e7901d3
                       42269c8aabf2e7700998926a5be810bcb5c52984
                       28d97d3a95e647f7ed1f16352efd0e79be15ad36
                       4878d2966a8d2381895c7daecc3dcb0bca9cfff2
                       3a41cc2a5c9356b45aeadd9545e7c71133ba7b88
                       895d82e8630e28a686d4268f8ae5dec8d6c2fa32
                       ec23c2d1241ad4ad44acd29715cb7d4f41d735c2
                       a0056da28f0c71a913a6d30ddd09daee563cead7
                       803e872dab726fac93314757dcdce269ac43c24f
                       2904e33cde1a874834afda4ea7acda4e31bd8804
                       7d26c73d4d0bd355909e08f5e95de5a637b494b3
                       4a873c21f3ba79dd63ea77c0617a182516df8297
                       d0e6bad691218a42c58fbbe3bc232c3a6b85b182
                       5a453ce63e16ccbe79598896c95610e855645567
                       cab3fb895e0b7c1b7efeff1fd99c11ecaee57afc
                       bbb68f3d0e48eea0ec6892fe67f4a3d1b205abcf
                       e581787d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [98:63:ab:dd:84:d6:e2:a7:0b:ce:29:5a:f5:9a:fe:a7:8a:63:c0:e6],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-06 05:58:09.248  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-06 05:58:09.249 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-06 05:58:09.251 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2023-01-06 05:58:09.252 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-06 05:58:09.252  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2023-01-06 05:58:09.252  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-06 05:58:09.253  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-06 05:58:09.253 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-06 05:58:09.253 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-06 05:58:09.254 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-06 05:58:09.257 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-06 05:58:09.258 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-06 05:58:09.258 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-06 05:58:09.258 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-06 05:58:09.358  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-06 05:58:09.359  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-06 05:58:09.359 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-06 05:58:09.359 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-06 05:58:09.361  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-06 05:58:09.361  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-06 05:58:09.362 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-06 05:58:09.362 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-06 05:58:09.363 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-06 05:58:09.363 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-06 05:58:09.364 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-06 05:58:09.364 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-06 05:58:09.365 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-06 05:58:09.365 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-06 05:58:09.365 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-06 05:58:09.366 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-06 05:58:09.369 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 710233828469976386990212338093246758290967979139
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jan 06 03:01:27 UTC 2023
           Final Date: Wed Jan 05 03:01:26 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [43:7a:df:cb:3c:00:cb:93:a8:be:cf:20:44:94:ef:34:a2:f5:fa:49],[56:66:d1:a4]
        modulus: d58c5f1a1e999968796e08b6323c70fe712414b51013c69a0212b47aa56ddfa11707f265c6539c793b8420808416c5515bd52737e22130b70bad197f56692c5332e5dae28d3a7f1c9a6ae3e312fab6cf74e2182a4fab3f1638d21af1fc06e1a3277c5d2f55ad3c6982f08b7bd80376659680ef2307db06636e0be5653864b8ca7e7b832d9fcaf2b4813194dbe296313a55c470b57f74a2e2ad5f4542c2284b51d366a1823064c5f2abede3e9dd93e5ad2a73feaf8d6ce5efe2497ab8eb1b355a036d936b99d812d3eec550bba069493f6714d66a8857af355d7d0f4563f1b0670780120fb3369e12f8e6631d6717dc27fd3222a11d45cddd3478179890cb5d5a32914c23a17a5879b8019815c68a6180a5cdc09a7439ca498a16728af2c5d8376d39fa19453874f51ca5b75c1e591f018a0066762342cd033550b957397f87bee4447cf8a6ceb187deff5511f3fb2e9ea12844aebcaa960eb313e93b4d9b04fa1f782d7d810f41f08b4121e55517c63c0dee951e85b93f2321b5d51a10d10127
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5476f871910f593e5d42adbfa2e043d6c2a0135d
                       8f47d2d72c75406a777c74d8d7256c70c101778f
                       a1de2b9fdfe288c3278ff6a80edc7b14f057560d
                       2b2f2c3f50a1d062394f0432be5284c58e7901d3
                       42269c8aabf2e7700998926a5be810bcb5c52984
                       28d97d3a95e647f7ed1f16352efd0e79be15ad36
                       4878d2966a8d2381895c7daecc3dcb0bca9cfff2
                       3a41cc2a5c9356b45aeadd9545e7c71133ba7b88
                       895d82e8630e28a686d4268f8ae5dec8d6c2fa32
                       ec23c2d1241ad4ad44acd29715cb7d4f41d735c2
                       a0056da28f0c71a913a6d30ddd09daee563cead7
                       803e872dab726fac93314757dcdce269ac43c24f
                       2904e33cde1a874834afda4ea7acda4e31bd8804
                       7d26c73d4d0bd355909e08f5e95de5a637b494b3
                       4a873c21f3ba79dd63ea77c0617a182516df8297
                       d0e6bad691218a42c58fbbe3bc232c3a6b85b182
                       5a453ce63e16ccbe79598896c95610e855645567
                       cab3fb895e0b7c1b7efeff1fd99c11ecaee57afc
                       bbb68f3d0e48eea0ec6892fe67f4a3d1b205abcf
                       e581787d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [98:92:a7:77:1e:c5:3c:a7:7a:1e:3b:8b:79:12:c4:40:70:d0:fb:17],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

]