Results

By type

          2023-01-11 03:32:12,954 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2023-01-11 03:32:16,806 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2023-01-11 03:32:19.681  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Jan 11, 2023 3:32:28 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Jan 11, 2023 3:32:28 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Jan 11, 2023 3:32:28 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Jan 11, 2023 3:32:28 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2023-01-11 03:32:29.818 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2023-01-11 03:32:30.411  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2023-01-11 03:32:30.774  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2023-01-11 03:32:33.469 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2023-01-11 03:32:33.498 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
2023-01-11 03:32:33.502 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2023-01-11 03:32:33.514 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2023-01-11 03:32:33.612 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2023-01-11 03:32:33.623 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/docs]}: redirectToUi(HttpServletRequest)
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
2023-01-11 03:32:33.944 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2023-01-11 03:32:36.118 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Jan 11, 2023 3:32:38 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2023-01-11 03:32:39.338  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 29.875 seconds (JVM running for 37.913)
Jan 11, 2023 3:32:40 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2023-01-11 04:53:18.929  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-11 04:53:18.969 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-11 04:53:19.307 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-11 04:53:19.330 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-11 04:53:19.398  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-11 04:53:19.405  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-11 04:53:19.411  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-11 04:53:19.414 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-11 04:53:19.415 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-11 04:53:19.423 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-11 04:53:19.446 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-11 04:53:19.470 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-11 04:53:19.672 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-11 04:53:20.020 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-11 04:53:20.021 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-11 04:53:20.027 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-11 04:53:21.314  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-11 04:53:21.324  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-11 04:53:21.325 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-11 04:53:21.338 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-11 04:53:21.361  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-11 04:53:21.365  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-11 04:53:21.366 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-11 04:53:21.367 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-11 04:53:21.370 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-11 04:53:21.431 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-11 04:53:21.433 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-11 04:53:21.438 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-11 04:53:21.463 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-11 04:53:21.465 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-11 04:53:21.466 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-11 04:53:21.472 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-11 04:53:21.580 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 155166148919103244539810985875530366520352351227
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Jan 11 03:07:48 UTC 2023
           Final Date: Mon Jan 10 03:07:47 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [e5:45:72:be:d2:06:59:09:f7:4a:f8:d6:18:1e:40:1b:c5:7e:e8:17],[56:66:d1:a4]
        modulus: ae31560371b2c7f03bc67231f9d7d31b3a7f8944e5e376a0fc2ea80426eab83e6ae07b03fd1c329de34eacb9fd1b43395b6bbb7956c00c2c4b3e1e5c208844f278b903756dd3080f16bb64c7e4f65816f55d5a7294b5f8e816189faff054f29282c6dbb43ac67d751affb6378bc36866e9279836046d6674c7de7a2892d90f2311886b32ecb7f4a8d8e7b6ae350cffcfcd82d252ebf7e40ccb0af7580d3a05b93fc4089886c6904ebea7a7bb9a3caf2094bc3f2844c839da69c29f10a0a778a1a361be3fbbeaf9bdf7dffd5ebd2d2e52a9afe6b578ab5297e485b7f4b9c9fb444af014af3091f7fbbdd2325994e914370f6493672ea7dabc1f5ae9444a8ceca1b0628d32a65042451bba267fcbc5fd83c04c32c7e4d61eef2930ea09d324c46bf5368b087b7f8041571a0d2b2cd5dede44a77ef9c37c845674300d5e5c22e1f1e92debb5ea2341a6df5d53f57a3851150855489b92f6634c26b9a7ee2f2ac13570c668ce1e379085538987bf78ad19fc2f42df5ca2d7ab72b65df784937edea1
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 6ff09f5608c2c000c0f2cbe186467da6971c794d
                       5ccbd2099bc307a3b20c8a3faa40db9284c895e2
                       f723d9e64c56410b80763057a16dac511aed3fea
                       9cb9fa63fa5ef33fccca7bb6e171816ba59c434d
                       33f91ccb67799128ec8ae5a96ea9d0fcda2c78c5
                       fa3f12c4b65d0714347c43cc7d4369100e2f1434
                       05f852596ef4aa8fe8b8b67507f11717f4ce8eaf
                       7e1a0bd0ce55f4326bd2c2737ca4eb2087752fba
                       12c9e8739502bd10138df6c19a2e9ede21240c11
                       1d58298612eaa4c01a3c801f3503313da79c80a2
                       3677e840e3d8c9ef8f55dab3c1844ddc91f54795
                       bd71945ac701d4e4c288385e5b7ee956be487936
                       ecc27e02e9a7e38adcfbac3cf61f8fcc7490f6c6
                       54602e61132ee7722f6f1654b563abb4a136ea42
                       4f049b5f435b11b1e6de94cb6b2900c848621a14
                       d148f89f7ad71909ee1d3165d8f0343dd2515580
                       4142649cbcd83474fc56dc5e3248c3e26c998434
                       0530da368f1425ec20c26c6cf9498a4abceb8fff
                       96a9f696355fbbe2e50975d7b3f68f875cc0d9a9
                       8b9d9014
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [c2:8c:7d:19:ea:74:05:e9:05:6e:8f:3d:77:91:d3:e9:5a:ba:38:88],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-11 05:00:39.606  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-11 05:00:39.609 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-11 05:00:39.613 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-11 05:00:39.615 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-11 05:00:39.615  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-11 05:00:39.616  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-11 05:00:39.617  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-11 05:00:39.618 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-11 05:00:39.619 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-11 05:00:39.620 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-11 05:00:39.629 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-11 05:00:39.631 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-11 05:00:39.632 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-11 05:00:39.632 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-11 05:00:39.876  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-11 05:00:39.878  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-11 05:00:39.878 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-11 05:00:39.879 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-11 05:00:39.883  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-11 05:00:39.885  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-11 05:00:39.885 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-11 05:00:39.886 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-11 05:00:39.886 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-11 05:00:39.888 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-11 05:00:39.889 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-11 05:00:39.889 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-11 05:00:39.891 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-11 05:00:39.891 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-11 05:00:39.892 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-11 05:00:39.894 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-11 05:00:39.901 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 155166148919103244539810985875530366520352351227
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Jan 11 03:07:48 UTC 2023
           Final Date: Mon Jan 10 03:07:47 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [e5:45:72:be:d2:06:59:09:f7:4a:f8:d6:18:1e:40:1b:c5:7e:e8:17],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 6ff09f5608c2c000c0f2cbe186467da6971c794d
                       5ccbd2099bc307a3b20c8a3faa40db9284c895e2
                       f723d9e64c56410b80763057a16dac511aed3fea
                       9cb9fa63fa5ef33fccca7bb6e171816ba59c434d
                       33f91ccb67799128ec8ae5a96ea9d0fcda2c78c5
                       fa3f12c4b65d0714347c43cc7d4369100e2f1434
                       05f852596ef4aa8fe8b8b67507f11717f4ce8eaf
                       7e1a0bd0ce55f4326bd2c2737ca4eb2087752fba
                       12c9e8739502bd10138df6c19a2e9ede21240c11
                       1d58298612eaa4c01a3c801f3503313da79c80a2
                       3677e840e3d8c9ef8f55dab3c1844ddc91f54795
                       bd71945ac701d4e4c288385e5b7ee956be487936
                       ecc27e02e9a7e38adcfbac3cf61f8fcc7490f6c6
                       54602e61132ee7722f6f1654b563abb4a136ea42
                       4f049b5f435b11b1e6de94cb6b2900c848621a14
                       d148f89f7ad71909ee1d3165d8f0343dd2515580
                       4142649cbcd83474fc56dc5e3248c3e26c998434
                       0530da368f1425ec20c26c6cf9498a4abceb8fff
                       96a9f696355fbbe2e50975d7b3f68f875cc0d9a9
                       8b9d9014
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [fd:ea:b0:c7:ba:ed:39:ac:47:c2:27:94:87:a2:ec:31:c9:56:e2:5f],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-11 05:02:28.084  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-11 05:02:28.092 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-11 05:02:28.103 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2023-01-11 05:02:28.112 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-11 05:02:28.116  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2023-01-11 05:02:28.125  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-11 05:02:28.126  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-11 05:02:28.131 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-11 05:02:28.132 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-11 05:02:28.135 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-11 05:02:28.150 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-11 05:02:28.156 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-11 05:02:28.157 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-11 05:02:28.158 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-11 05:02:28.323  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-11 05:02:28.324  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-11 05:02:28.325 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-11 05:02:28.325 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-11 05:02:28.328  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-11 05:02:28.328  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-11 05:02:28.329 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-11 05:02:28.330 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-11 05:02:28.330 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-11 05:02:28.331 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-11 05:02:28.332 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-11 05:02:28.332 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-11 05:02:28.333 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-11 05:02:28.334 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-11 05:02:28.334 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-11 05:02:28.336 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-11 05:02:28.341 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 155166148919103244539810985875530366520352351227
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Jan 11 03:07:48 UTC 2023
           Final Date: Mon Jan 10 03:07:47 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [e5:45:72:be:d2:06:59:09:f7:4a:f8:d6:18:1e:40:1b:c5:7e:e8:17],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 6ff09f5608c2c000c0f2cbe186467da6971c794d
                       5ccbd2099bc307a3b20c8a3faa40db9284c895e2
                       f723d9e64c56410b80763057a16dac511aed3fea
                       9cb9fa63fa5ef33fccca7bb6e171816ba59c434d
                       33f91ccb67799128ec8ae5a96ea9d0fcda2c78c5
                       fa3f12c4b65d0714347c43cc7d4369100e2f1434
                       05f852596ef4aa8fe8b8b67507f11717f4ce8eaf
                       7e1a0bd0ce55f4326bd2c2737ca4eb2087752fba
                       12c9e8739502bd10138df6c19a2e9ede21240c11
                       1d58298612eaa4c01a3c801f3503313da79c80a2
                       3677e840e3d8c9ef8f55dab3c1844ddc91f54795
                       bd71945ac701d4e4c288385e5b7ee956be487936
                       ecc27e02e9a7e38adcfbac3cf61f8fcc7490f6c6
                       54602e61132ee7722f6f1654b563abb4a136ea42
                       4f049b5f435b11b1e6de94cb6b2900c848621a14
                       d148f89f7ad71909ee1d3165d8f0343dd2515580
                       4142649cbcd83474fc56dc5e3248c3e26c998434
                       0530da368f1425ec20c26c6cf9498a4abceb8fff
                       96a9f696355fbbe2e50975d7b3f68f875cc0d9a9
                       8b9d9014
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [d3:80:82:9f:ed:7a:b3:6c:67:b0:93:d4:2e:6a:2c:e3:9e:ac:6a:9e],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-11 05:06:28.494  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-11 05:06:28.502 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-11 05:06:28.506 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2023-01-11 05:06:28.507 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-11 05:06:28.509  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2023-01-11 05:06:28.513  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-11 05:06:28.514  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-11 05:06:28.515 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-11 05:06:28.517 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-11 05:06:28.572 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-11 05:06:28.600 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-11 05:06:28.605 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-11 05:06:28.606 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-11 05:06:28.607 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-11 05:06:28.828  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-11 05:06:28.829  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-11 05:06:28.829 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-11 05:06:28.830 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-11 05:06:28.838  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-11 05:06:28.894  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-11 05:06:28.908 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-11 05:06:28.909 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-11 05:06:28.909 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-11 05:06:28.912 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-11 05:06:28.918 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-11 05:06:28.920 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-11 05:06:28.924 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-11 05:06:28.925 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-11 05:06:28.926 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-11 05:06:28.928 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-11 05:06:29.020 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 155166148919103244539810985875530366520352351227
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Jan 11 03:07:48 UTC 2023
           Final Date: Mon Jan 10 03:07:47 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [e5:45:72:be:d2:06:59:09:f7:4a:f8:d6:18:1e:40:1b:c5:7e:e8:17],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 6ff09f5608c2c000c0f2cbe186467da6971c794d
                       5ccbd2099bc307a3b20c8a3faa40db9284c895e2
                       f723d9e64c56410b80763057a16dac511aed3fea
                       9cb9fa63fa5ef33fccca7bb6e171816ba59c434d
                       33f91ccb67799128ec8ae5a96ea9d0fcda2c78c5
                       fa3f12c4b65d0714347c43cc7d4369100e2f1434
                       05f852596ef4aa8fe8b8b67507f11717f4ce8eaf
                       7e1a0bd0ce55f4326bd2c2737ca4eb2087752fba
                       12c9e8739502bd10138df6c19a2e9ede21240c11
                       1d58298612eaa4c01a3c801f3503313da79c80a2
                       3677e840e3d8c9ef8f55dab3c1844ddc91f54795
                       bd71945ac701d4e4c288385e5b7ee956be487936
                       ecc27e02e9a7e38adcfbac3cf61f8fcc7490f6c6
                       54602e61132ee7722f6f1654b563abb4a136ea42
                       4f049b5f435b11b1e6de94cb6b2900c848621a14
                       d148f89f7ad71909ee1d3165d8f0343dd2515580
                       4142649cbcd83474fc56dc5e3248c3e26c998434
                       0530da368f1425ec20c26c6cf9498a4abceb8fff
                       96a9f696355fbbe2e50975d7b3f68f875cc0d9a9
                       8b9d9014
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [aa:c5:8d:4d:6a:90:6d:fd:14:04:bf:ad:06:db:84:5f:d8:87:b6:0c],[56:66:d1:a4]
        modulus: f3900855e42d6366851590bc7a2fd2967bba3a81b711f7433dfb2e7caac21ae38e60a7e9e52dde2df493ec0d722e0e04fde849d78d62609c5c65fadcc698ff6560d9aea850206400752b6df7d8760e8a04e258edb40299742637257db4a832fdf4e0f0b9e32f1ed3dc515f5216b5fc9a452a371684b9fe96dd1d1743ba5de537826d8eeb1eabd66acac136ce3dd44e3da5ff40b6c15aecdc8ba58199d779b34e7dba37a3e99a5addfa133edf01c9314e7914306d33d0a6f5ac1fe9c280b9fb4198bd3b8bf44b566d4e8abad3430ae8f571e384014ccd8582259bafe657c7abbd7013ea4a021b9c949b88132a2a0be21de6de4980fe1c49e7907304ae055b3465
public exponent: 10001

] 
2023-01-11 05:09:52.133  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-11 05:09:52.137 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-11 05:09:52.139 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-11 05:09:52.141 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-11 05:09:52.142  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-11 05:09:52.143  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-11 05:09:52.144  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-11 05:09:52.144 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-11 05:09:52.145 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-11 05:09:52.145 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-11 05:09:52.151 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-11 05:09:52.152 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-11 05:09:52.153 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-11 05:09:52.153 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-11 05:09:52.314  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-11 05:09:52.315  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-11 05:09:52.316 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-11 05:09:52.316 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-11 05:09:52.318  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-11 05:09:52.318  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-11 05:09:52.319 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-11 05:09:52.319 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-11 05:09:52.320 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-11 05:09:52.320 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-11 05:09:52.321 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-11 05:09:52.321 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-11 05:09:52.322 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-11 05:09:52.323 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-11 05:09:52.323 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-11 05:09:52.324 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-11 05:09:52.329 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 155166148919103244539810985875530366520352351227
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Jan 11 03:07:48 UTC 2023
           Final Date: Mon Jan 10 03:07:47 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [e5:45:72:be:d2:06:59:09:f7:4a:f8:d6:18:1e:40:1b:c5:7e:e8:17],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 6ff09f5608c2c000c0f2cbe186467da6971c794d
                       5ccbd2099bc307a3b20c8a3faa40db9284c895e2
                       f723d9e64c56410b80763057a16dac511aed3fea
                       9cb9fa63fa5ef33fccca7bb6e171816ba59c434d
                       33f91ccb67799128ec8ae5a96ea9d0fcda2c78c5
                       fa3f12c4b65d0714347c43cc7d4369100e2f1434
                       05f852596ef4aa8fe8b8b67507f11717f4ce8eaf
                       7e1a0bd0ce55f4326bd2c2737ca4eb2087752fba
                       12c9e8739502bd10138df6c19a2e9ede21240c11
                       1d58298612eaa4c01a3c801f3503313da79c80a2
                       3677e840e3d8c9ef8f55dab3c1844ddc91f54795
                       bd71945ac701d4e4c288385e5b7ee956be487936
                       ecc27e02e9a7e38adcfbac3cf61f8fcc7490f6c6
                       54602e61132ee7722f6f1654b563abb4a136ea42
                       4f049b5f435b11b1e6de94cb6b2900c848621a14
                       d148f89f7ad71909ee1d3165d8f0343dd2515580
                       4142649cbcd83474fc56dc5e3248c3e26c998434
                       0530da368f1425ec20c26c6cf9498a4abceb8fff
                       96a9f696355fbbe2e50975d7b3f68f875cc0d9a9
                       8b9d9014
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [04:f9:77:11:54:ca:5d:07:a2:d1:96:1a:7a:c2:fd:73:47:ec:d0:b3],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-11 05:17:54.779  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-11 05:17:54.785 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-11 05:17:54.809 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-11 05:17:54.810 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-11 05:17:54.811  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-11 05:17:54.812  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-11 05:17:54.812  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-11 05:17:54.813 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-11 05:17:54.814 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-11 05:17:54.815 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-11 05:17:54.824 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-11 05:17:54.827 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-11 05:17:54.827 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-11 05:17:54.827 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-11 05:17:54.993  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-11 05:17:54.994  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-11 05:17:54.995 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-11 05:17:54.996 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-11 05:17:54.999  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-11 05:17:55.000  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-11 05:17:55.005 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-11 05:17:55.005 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-11 05:17:55.049 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-11 05:17:55.054 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-11 05:17:55.055 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-11 05:17:55.055 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-11 05:17:55.062 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-11 05:17:55.070 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-11 05:17:55.073 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-11 05:17:55.078 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-11 05:17:55.090 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 155166148919103244539810985875530366520352351227
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Jan 11 03:07:48 UTC 2023
           Final Date: Mon Jan 10 03:07:47 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [e5:45:72:be:d2:06:59:09:f7:4a:f8:d6:18:1e:40:1b:c5:7e:e8:17],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 6ff09f5608c2c000c0f2cbe186467da6971c794d
                       5ccbd2099bc307a3b20c8a3faa40db9284c895e2
                       f723d9e64c56410b80763057a16dac511aed3fea
                       9cb9fa63fa5ef33fccca7bb6e171816ba59c434d
                       33f91ccb67799128ec8ae5a96ea9d0fcda2c78c5
                       fa3f12c4b65d0714347c43cc7d4369100e2f1434
                       05f852596ef4aa8fe8b8b67507f11717f4ce8eaf
                       7e1a0bd0ce55f4326bd2c2737ca4eb2087752fba
                       12c9e8739502bd10138df6c19a2e9ede21240c11
                       1d58298612eaa4c01a3c801f3503313da79c80a2
                       3677e840e3d8c9ef8f55dab3c1844ddc91f54795
                       bd71945ac701d4e4c288385e5b7ee956be487936
                       ecc27e02e9a7e38adcfbac3cf61f8fcc7490f6c6
                       54602e61132ee7722f6f1654b563abb4a136ea42
                       4f049b5f435b11b1e6de94cb6b2900c848621a14
                       d148f89f7ad71909ee1d3165d8f0343dd2515580
                       4142649cbcd83474fc56dc5e3248c3e26c998434
                       0530da368f1425ec20c26c6cf9498a4abceb8fff
                       96a9f696355fbbe2e50975d7b3f68f875cc0d9a9
                       8b9d9014
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [eb:93:1f:33:25:ab:96:98:3f:77:9d:38:a3:54:23:14:3f:5a:08:d5],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-11 05:25:23.558  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-11 05:25:23.565 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-11 05:25:23.576 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-11 05:25:23.579 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-11 05:25:23.580  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-11 05:25:23.581  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-11 05:25:23.583  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-11 05:25:23.583 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-11 05:25:23.584 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-11 05:25:23.590 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-11 05:25:23.601 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-11 05:25:23.603 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-11 05:25:23.604 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-11 05:25:23.605 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-11 05:25:23.783  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-11 05:25:23.784  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-11 05:25:23.785 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-11 05:25:23.786 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-11 05:25:23.788  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-11 05:25:23.790  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-11 05:25:23.791 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-11 05:25:23.792 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-11 05:25:23.793 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-11 05:25:23.799 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-11 05:25:23.801 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-11 05:25:23.801 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-11 05:25:23.817 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-11 05:25:23.824 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-11 05:25:23.825 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-11 05:25:23.826 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-11 05:25:23.833 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 155166148919103244539810985875530366520352351227
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Jan 11 03:07:48 UTC 2023
           Final Date: Mon Jan 10 03:07:47 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [e5:45:72:be:d2:06:59:09:f7:4a:f8:d6:18:1e:40:1b:c5:7e:e8:17],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 6ff09f5608c2c000c0f2cbe186467da6971c794d
                       5ccbd2099bc307a3b20c8a3faa40db9284c895e2
                       f723d9e64c56410b80763057a16dac511aed3fea
                       9cb9fa63fa5ef33fccca7bb6e171816ba59c434d
                       33f91ccb67799128ec8ae5a96ea9d0fcda2c78c5
                       fa3f12c4b65d0714347c43cc7d4369100e2f1434
                       05f852596ef4aa8fe8b8b67507f11717f4ce8eaf
                       7e1a0bd0ce55f4326bd2c2737ca4eb2087752fba
                       12c9e8739502bd10138df6c19a2e9ede21240c11
                       1d58298612eaa4c01a3c801f3503313da79c80a2
                       3677e840e3d8c9ef8f55dab3c1844ddc91f54795
                       bd71945ac701d4e4c288385e5b7ee956be487936
                       ecc27e02e9a7e38adcfbac3cf61f8fcc7490f6c6
                       54602e61132ee7722f6f1654b563abb4a136ea42
                       4f049b5f435b11b1e6de94cb6b2900c848621a14
                       d148f89f7ad71909ee1d3165d8f0343dd2515580
                       4142649cbcd83474fc56dc5e3248c3e26c998434
                       0530da368f1425ec20c26c6cf9498a4abceb8fff
                       96a9f696355fbbe2e50975d7b3f68f875cc0d9a9
                       8b9d9014
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [93:79:35:d3:a4:e1:9a:47:68:b8:51:3d:f6:1e:6a:bb:bb:9f:80:0d],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-11 05:35:19.810  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-11 05:35:19.813 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-11 05:35:19.821 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2023-01-11 05:35:19.823 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-11 05:35:19.825  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2023-01-11 05:35:19.826  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-11 05:35:19.827  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-11 05:35:19.828 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-11 05:35:19.829 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-11 05:35:19.830 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-11 05:35:19.845 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-11 05:35:19.850 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-11 05:35:19.851 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-11 05:35:19.852 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-11 05:35:20.065  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-11 05:35:20.066  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-11 05:35:20.070 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-11 05:35:20.070 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-11 05:35:20.074  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-11 05:35:20.082  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-11 05:35:20.084 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-11 05:35:20.085 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-11 05:35:20.085 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-11 05:35:20.088 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-11 05:35:20.089 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-11 05:35:20.089 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-11 05:35:20.092 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-11 05:35:20.093 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-11 05:35:20.093 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-11 05:35:20.095 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-11 05:35:20.101 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 155166148919103244539810985875530366520352351227
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Jan 11 03:07:48 UTC 2023
           Final Date: Mon Jan 10 03:07:47 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [e5:45:72:be:d2:06:59:09:f7:4a:f8:d6:18:1e:40:1b:c5:7e:e8:17],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 6ff09f5608c2c000c0f2cbe186467da6971c794d
                       5ccbd2099bc307a3b20c8a3faa40db9284c895e2
                       f723d9e64c56410b80763057a16dac511aed3fea
                       9cb9fa63fa5ef33fccca7bb6e171816ba59c434d
                       33f91ccb67799128ec8ae5a96ea9d0fcda2c78c5
                       fa3f12c4b65d0714347c43cc7d4369100e2f1434
                       05f852596ef4aa8fe8b8b67507f11717f4ce8eaf
                       7e1a0bd0ce55f4326bd2c2737ca4eb2087752fba
                       12c9e8739502bd10138df6c19a2e9ede21240c11
                       1d58298612eaa4c01a3c801f3503313da79c80a2
                       3677e840e3d8c9ef8f55dab3c1844ddc91f54795
                       bd71945ac701d4e4c288385e5b7ee956be487936
                       ecc27e02e9a7e38adcfbac3cf61f8fcc7490f6c6
                       54602e61132ee7722f6f1654b563abb4a136ea42
                       4f049b5f435b11b1e6de94cb6b2900c848621a14
                       d148f89f7ad71909ee1d3165d8f0343dd2515580
                       4142649cbcd83474fc56dc5e3248c3e26c998434
                       0530da368f1425ec20c26c6cf9498a4abceb8fff
                       96a9f696355fbbe2e50975d7b3f68f875cc0d9a9
                       8b9d9014
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [90:2d:70:2e:f6:70:af:9d:96:ae:18:f7:57:23:8e:c1:1f:1c:68:61],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-11 05:41:28.373  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-11 05:41:28.374 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-11 05:41:28.377 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2023-01-11 05:41:28.378 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-11 05:41:28.379  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2023-01-11 05:41:28.380  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-11 05:41:28.380  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-11 05:41:28.381 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-11 05:41:28.382 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-11 05:41:28.382 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-11 05:41:28.392 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-11 05:41:28.394 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-11 05:41:28.394 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-11 05:41:28.395 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-11 05:41:28.595  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-11 05:41:28.597  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-11 05:41:28.598 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-11 05:41:28.598 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-11 05:41:28.600  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-11 05:41:28.601  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-11 05:41:28.601 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-11 05:41:28.602 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-11 05:41:28.602 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-11 05:41:28.603 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-11 05:41:28.604 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-11 05:41:28.604 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-11 05:41:28.605 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-11 05:41:28.605 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-11 05:41:28.606 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-11 05:41:28.608 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-11 05:41:28.612 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 155166148919103244539810985875530366520352351227
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Jan 11 03:07:48 UTC 2023
           Final Date: Mon Jan 10 03:07:47 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [e5:45:72:be:d2:06:59:09:f7:4a:f8:d6:18:1e:40:1b:c5:7e:e8:17],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 6ff09f5608c2c000c0f2cbe186467da6971c794d
                       5ccbd2099bc307a3b20c8a3faa40db9284c895e2
                       f723d9e64c56410b80763057a16dac511aed3fea
                       9cb9fa63fa5ef33fccca7bb6e171816ba59c434d
                       33f91ccb67799128ec8ae5a96ea9d0fcda2c78c5
                       fa3f12c4b65d0714347c43cc7d4369100e2f1434
                       05f852596ef4aa8fe8b8b67507f11717f4ce8eaf
                       7e1a0bd0ce55f4326bd2c2737ca4eb2087752fba
                       12c9e8739502bd10138df6c19a2e9ede21240c11
                       1d58298612eaa4c01a3c801f3503313da79c80a2
                       3677e840e3d8c9ef8f55dab3c1844ddc91f54795
                       bd71945ac701d4e4c288385e5b7ee956be487936
                       ecc27e02e9a7e38adcfbac3cf61f8fcc7490f6c6
                       54602e61132ee7722f6f1654b563abb4a136ea42
                       4f049b5f435b11b1e6de94cb6b2900c848621a14
                       d148f89f7ad71909ee1d3165d8f0343dd2515580
                       4142649cbcd83474fc56dc5e3248c3e26c998434
                       0530da368f1425ec20c26c6cf9498a4abceb8fff
                       96a9f696355fbbe2e50975d7b3f68f875cc0d9a9
                       8b9d9014
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [5c:d7:29:f5:64:54:51:77:28:ac:29:95:a1:7c:cf:54:b6:71:be:66],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-11 05:41:51.580  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-11 05:41:51.583 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-11 05:41:51.586 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2023-01-11 05:41:51.588 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-11 05:41:51.588  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2023-01-11 05:41:51.589  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-11 05:41:51.590  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-11 05:41:51.590 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-11 05:41:51.591 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-11 05:41:51.592 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-11 05:41:51.599 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-11 05:41:51.601 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-11 05:41:51.602 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-11 05:41:51.602 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-11 05:41:51.746  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-11 05:41:51.747  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-11 05:41:51.747 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-11 05:41:51.753 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-11 05:41:51.759  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-11 05:41:51.760  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-11 05:41:51.761 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-11 05:41:51.762 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-11 05:41:51.762 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-11 05:41:51.763 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-11 05:41:51.764 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-11 05:41:51.765 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-11 05:41:51.768 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-11 05:41:51.768 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-11 05:41:51.769 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-11 05:41:51.771 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-11 05:41:51.785 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 155166148919103244539810985875530366520352351227
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Jan 11 03:07:48 UTC 2023
           Final Date: Mon Jan 10 03:07:47 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [e5:45:72:be:d2:06:59:09:f7:4a:f8:d6:18:1e:40:1b:c5:7e:e8:17],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 6ff09f5608c2c000c0f2cbe186467da6971c794d
                       5ccbd2099bc307a3b20c8a3faa40db9284c895e2
                       f723d9e64c56410b80763057a16dac511aed3fea
                       9cb9fa63fa5ef33fccca7bb6e171816ba59c434d
                       33f91ccb67799128ec8ae5a96ea9d0fcda2c78c5
                       fa3f12c4b65d0714347c43cc7d4369100e2f1434
                       05f852596ef4aa8fe8b8b67507f11717f4ce8eaf
                       7e1a0bd0ce55f4326bd2c2737ca4eb2087752fba
                       12c9e8739502bd10138df6c19a2e9ede21240c11
                       1d58298612eaa4c01a3c801f3503313da79c80a2
                       3677e840e3d8c9ef8f55dab3c1844ddc91f54795
                       bd71945ac701d4e4c288385e5b7ee956be487936
                       ecc27e02e9a7e38adcfbac3cf61f8fcc7490f6c6
                       54602e61132ee7722f6f1654b563abb4a136ea42
                       4f049b5f435b11b1e6de94cb6b2900c848621a14
                       d148f89f7ad71909ee1d3165d8f0343dd2515580
                       4142649cbcd83474fc56dc5e3248c3e26c998434
                       0530da368f1425ec20c26c6cf9498a4abceb8fff
                       96a9f696355fbbe2e50975d7b3f68f875cc0d9a9
                       8b9d9014
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [c5:67:6e:aa:d9:30:d6:07:46:42:e5:5e:1f:ed:eb:43:51:5e:ce:f6],[56:66:d1:a4]
        modulus: bd3d943cce4f7d6b99a92994cad264ba1cb3ec96a55aac8dd0d0792abe62e3524f4663391ae3948d83ab9cd1dbbf8d25e87d80e81d17d3f0e8606e2be837cb73b88056f2932417d419fbc5afdb8d467479a4d8e04956e685392352de59244e4c9dced13fb5b9ca64477166aec1a07900b8e18b5eec3511694adf109b9372bb4a06397879c722d1cf38deea24a1c12a95acfdd354d7d36285533a45e4d4e430ef47c4cc433dff4e68cb0d901b48f17df9fb4bdf5d32719dc5280494f0cb8199e86ac08522699864c2ef6a624505324a63aa6eb53f8e8927fe2f93ce4a4d78dbf37d0c5f2aca65619f721814813bd705ce45ee719cf9dae62b89558c5f79fba1b7
public exponent: 10001

] 
2023-01-11 06:09:28.946  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-11 06:09:28.950 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-11 06:09:28.954 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2023-01-11 06:09:28.956 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-11 06:09:28.957  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2023-01-11 06:09:28.963  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-11 06:09:28.964  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-11 06:09:28.965 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-11 06:09:28.966 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-11 06:09:28.967 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-11 06:09:28.974 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-11 06:09:28.976 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-11 06:09:28.977 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-11 06:09:28.979 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-11 06:09:29.170  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-11 06:09:29.171  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-11 06:09:29.171 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-11 06:09:29.172 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-11 06:09:29.174  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-11 06:09:29.181  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-11 06:09:29.182 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-11 06:09:29.182 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-11 06:09:29.182 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-11 06:09:29.184 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-11 06:09:29.185 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-11 06:09:29.185 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-11 06:09:29.187 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-11 06:09:29.187 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-11 06:09:29.187 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-11 06:09:29.193 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-11 06:09:29.202 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 155166148919103244539810985875530366520352351227
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Jan 11 03:07:48 UTC 2023
           Final Date: Mon Jan 10 03:07:47 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [e5:45:72:be:d2:06:59:09:f7:4a:f8:d6:18:1e:40:1b:c5:7e:e8:17],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 6ff09f5608c2c000c0f2cbe186467da6971c794d
                       5ccbd2099bc307a3b20c8a3faa40db9284c895e2
                       f723d9e64c56410b80763057a16dac511aed3fea
                       9cb9fa63fa5ef33fccca7bb6e171816ba59c434d
                       33f91ccb67799128ec8ae5a96ea9d0fcda2c78c5
                       fa3f12c4b65d0714347c43cc7d4369100e2f1434
                       05f852596ef4aa8fe8b8b67507f11717f4ce8eaf
                       7e1a0bd0ce55f4326bd2c2737ca4eb2087752fba
                       12c9e8739502bd10138df6c19a2e9ede21240c11
                       1d58298612eaa4c01a3c801f3503313da79c80a2
                       3677e840e3d8c9ef8f55dab3c1844ddc91f54795
                       bd71945ac701d4e4c288385e5b7ee956be487936
                       ecc27e02e9a7e38adcfbac3cf61f8fcc7490f6c6
                       54602e61132ee7722f6f1654b563abb4a136ea42
                       4f049b5f435b11b1e6de94cb6b2900c848621a14
                       d148f89f7ad71909ee1d3165d8f0343dd2515580
                       4142649cbcd83474fc56dc5e3248c3e26c998434
                       0530da368f1425ec20c26c6cf9498a4abceb8fff
                       96a9f696355fbbe2e50975d7b3f68f875cc0d9a9
                       8b9d9014
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [e8:45:fb:e8:5b:ff:74:5e:db:5e:b0:57:c7:4b:7c:65:fd:ef:88:ec],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-11 06:09:34.608  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-11 06:09:34.609 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-11 06:09:34.611 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2023-01-11 06:09:34.612 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-11 06:09:34.612  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2023-01-11 06:09:34.612  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-11 06:09:34.613  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-11 06:09:34.613 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-11 06:09:34.614 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-11 06:09:34.614 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-11 06:09:34.622 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-11 06:09:34.623 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-11 06:09:34.623 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-11 06:09:34.624 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-11 06:09:34.749  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-11 06:09:34.750  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-11 06:09:34.750 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-11 06:09:34.750 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-11 06:09:34.752  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-11 06:09:34.753  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-11 06:09:34.754 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-11 06:09:34.754 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-11 06:09:34.754 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-11 06:09:34.758 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-11 06:09:34.758 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-11 06:09:34.759 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-11 06:09:34.759 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-11 06:09:34.760 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-11 06:09:34.761 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-11 06:09:34.762 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-11 06:09:34.766 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 155166148919103244539810985875530366520352351227
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Jan 11 03:07:48 UTC 2023
           Final Date: Mon Jan 10 03:07:47 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [e5:45:72:be:d2:06:59:09:f7:4a:f8:d6:18:1e:40:1b:c5:7e:e8:17],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 6ff09f5608c2c000c0f2cbe186467da6971c794d
                       5ccbd2099bc307a3b20c8a3faa40db9284c895e2
                       f723d9e64c56410b80763057a16dac511aed3fea
                       9cb9fa63fa5ef33fccca7bb6e171816ba59c434d
                       33f91ccb67799128ec8ae5a96ea9d0fcda2c78c5
                       fa3f12c4b65d0714347c43cc7d4369100e2f1434
                       05f852596ef4aa8fe8b8b67507f11717f4ce8eaf
                       7e1a0bd0ce55f4326bd2c2737ca4eb2087752fba
                       12c9e8739502bd10138df6c19a2e9ede21240c11
                       1d58298612eaa4c01a3c801f3503313da79c80a2
                       3677e840e3d8c9ef8f55dab3c1844ddc91f54795
                       bd71945ac701d4e4c288385e5b7ee956be487936
                       ecc27e02e9a7e38adcfbac3cf61f8fcc7490f6c6
                       54602e61132ee7722f6f1654b563abb4a136ea42
                       4f049b5f435b11b1e6de94cb6b2900c848621a14
                       d148f89f7ad71909ee1d3165d8f0343dd2515580
                       4142649cbcd83474fc56dc5e3248c3e26c998434
                       0530da368f1425ec20c26c6cf9498a4abceb8fff
                       96a9f696355fbbe2e50975d7b3f68f875cc0d9a9
                       8b9d9014
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [34:24:48:b4:bf:02:d7:c6:89:99:df:f1:48:77:ad:10:71:31:2c:74],[56:66:d1:a4]
        modulus: c182b3e8365aa210afbb46cbe27bf027a98fc6841582f44f6d9caff86a60d5cbdf287321c78301c081832dba4fd90d3475466439b9f8430bb2655fbf0f9355c376af1a0cc6c35fac91956d2a737e69dd88813375062b0c4efff6a6a3eba5f6546e7c62203b20d0765fda631631d3170248547fd9546c367f9fa027a85d6ac71730f2d09378c683d08842a43a8c7f15b66230dad74c85391150012fdef443d6ba44b93b7e11888f11bd871dc87f362980796d582b48850d8518025cf8c837e0eef94a53eee4b3cd20b82350f10cddc6abec3e0a873c59d25b27a48e17fa716a0d6b6b961e1243dc499e10e495f7adcd30d55c6ce6f60c74ec25f9201977eff9f9
public exponent: 10001

]