Results

By type

          2023-01-17 03:09:15,427 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2023-01-17 03:09:16,319 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2023-01-17 03:09:17.023  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Jan 17, 2023 3:09:18 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Jan 17, 2023 3:09:18 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Jan 17, 2023 3:09:18 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Jan 17, 2023 3:09:18 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2023-01-17 03:09:19.494 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2023-01-17 03:09:19.805  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2023-01-17 03:09:19.969  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2023-01-17 03:09:20.820 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2023-01-17 03:09:20.824 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
2023-01-17 03:09:20.825 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2023-01-17 03:09:20.829 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2023-01-17 03:09:20.869 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
2023-01-17 03:09:20.872 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
	{GET [/docs]}: redirectToUi(HttpServletRequest)
2023-01-17 03:09:20.992 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2023-01-17 03:09:21.679 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Jan 17, 2023 3:09:22 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2023-01-17 03:09:22.688  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 8.056 seconds (JVM running for 9.932)
Jan 17, 2023 3:09:43 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2023-01-17 03:09:57.196  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-17 03:09:57.204 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-17 03:09:57.254 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2023-01-17 03:09:57.257 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-17 03:09:57.276  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2023-01-17 03:09:57.280  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-17 03:09:57.282  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-17 03:09:57.283 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-17 03:09:57.283 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-17 03:09:57.287 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-17 03:09:57.294 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-17 03:09:57.298 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-17 03:09:57.368 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-17 03:09:57.378 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-17 03:09:57.380 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-17 03:09:57.384 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-17 03:09:58.052  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-17 03:09:58.055  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-17 03:09:58.055 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-17 03:09:58.057 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-17 03:09:58.065  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-17 03:09:58.066  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-17 03:09:58.067 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-17 03:09:58.068 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-17 03:09:58.068 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-17 03:09:58.083 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-17 03:09:58.083 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-17 03:09:58.084 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-17 03:09:58.089 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-17 03:09:58.089 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-17 03:09:58.090 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-17 03:09:58.091 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-17 03:09:58.121 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 531494411584569409526722408551663954771970500609
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jan 17 03:06:12 UTC 2023
           Final Date: Sun Jan 16 03:06:11 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [8d:3d:72:90:dd:fa:d8:5c:35:5f:b8:66:64:39:dc:11:a9:42:d2:8e],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 2b53a0e51a78bb3691324fcb7692cee10f298122
                       beec5497c3032623bbf7e3108c6d100254fb62b2
                       50e04ca9bbffef2b7c7d211ea4aa917b41b330c6
                       3a3815030819de66272e6f287290f44b04c014d2
                       d9717404d3b7ca6eabe80489ea5e7007703c7b63
                       6f23521744172c5110cc1112fc4982a3941f567f
                       fd4eba0da5bcc5c5d483f8d1f65ae38274a8616d
                       d2e899b0eaaff79df8d8850310fe6680dc9eb451
                       e6565b078e98d41ab35cb41b459b4d32bc6f2363
                       4bc5b56bae672963dae7614479dad5e9cbc0a7f8
                       e5b1ed84c718b72d414fb4dc32ec6d66ba93f1a1
                       2240c226eb74d879998d17fbe11496db9127ebc0
                       483e0d3f2d74c135ef6b3ae1a4ba18ccda9c7ae2
                       b728b6c720fc48c25e13d70fc76185a7f8b9a717
                       354f2a396a896b5ddc6c9467366f4ef6d21f3d7e
                       0645e65db99418775bb5375918345f207b92f273
                       1354b24acd3e01965ca8e804b42ad69a38c9e43d
                       b7dcfdfad0590aeaba081c25004309b5843fdf28
                       9f6a4a35d81374a3654305591457209b227efa25
                       6515834a
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [a4:ac:9e:ca:26:ab:b9:99:93:a6:f2:6f:1e:c9:b6:4f:ef:e6:62:96],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-17 04:52:43.627  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-17 04:52:43.631 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-17 04:52:43.635 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-17 04:52:43.636 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-17 04:52:43.637  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-17 04:52:43.638  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-17 04:52:43.638  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-17 04:52:43.639 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-17 04:52:43.640 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-17 04:52:43.640 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-17 04:52:43.646 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-17 04:52:43.647 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-17 04:52:43.648 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-17 04:52:43.648 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-17 04:52:43.899  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-17 04:52:43.900  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-17 04:52:43.901 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-17 04:52:43.901 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-17 04:52:43.912  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-17 04:52:43.913  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-17 04:52:43.914 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-17 04:52:43.914 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-17 04:52:43.914 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-17 04:52:43.919 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-17 04:52:43.920 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-17 04:52:43.920 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-17 04:52:43.921 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-17 04:52:43.921 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-17 04:52:43.921 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-17 04:52:43.922 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-17 04:52:43.926 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 531494411584569409526722408551663954771970500609
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jan 17 03:06:12 UTC 2023
           Final Date: Sun Jan 16 03:06:11 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [8d:3d:72:90:dd:fa:d8:5c:35:5f:b8:66:64:39:dc:11:a9:42:d2:8e],[56:66:d1:a4]
        modulus: aea74a6a33676231d8c5950127d289f8c2399cb15bdc6c8c793f935412be9c5b8c0db5154a42809414d8cf03836f313c4489441eeeda211a83ea637ee9890b7f613e72bdc08b80e7b7c3365eb5c8b71583b1214ffd205a66fc5aa345ff7c03b3dcae57fedcc215aab3735b1b1258da8a73c56a108de632afe01b9296617fdfa8c1aa6f47a04c017c6656fc9b4edce4ccfaa1283998cace01a7dc54971694a4ae21c81b26df772f3c8736d52dfcf81560d38030987081e4d07f846bced30ea28281453e87813fbb92df3ff06d036b571f041dda662c151877810762522914ae5d8da487cf583ccc9200009ea6eb97fc6307ae81a45909a86ef12d8917614fcd93dfaf2f4da38373a31efadcc0e0139a666949bbc5a7ca1e7e4d73a4d7c50d239112d5893966dc4ec702f733654fc40c59fe0811ae68153cedcc5af6dbfc2cb8e84f302ab917652bae7caeb14cadef321ffc49731bf66f7a914f2771a625a0904a092c1d2e87c45f04c70ca542474e361db12ca3ab4bf7dcd806672319085dc1eb
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 2b53a0e51a78bb3691324fcb7692cee10f298122
                       beec5497c3032623bbf7e3108c6d100254fb62b2
                       50e04ca9bbffef2b7c7d211ea4aa917b41b330c6
                       3a3815030819de66272e6f287290f44b04c014d2
                       d9717404d3b7ca6eabe80489ea5e7007703c7b63
                       6f23521744172c5110cc1112fc4982a3941f567f
                       fd4eba0da5bcc5c5d483f8d1f65ae38274a8616d
                       d2e899b0eaaff79df8d8850310fe6680dc9eb451
                       e6565b078e98d41ab35cb41b459b4d32bc6f2363
                       4bc5b56bae672963dae7614479dad5e9cbc0a7f8
                       e5b1ed84c718b72d414fb4dc32ec6d66ba93f1a1
                       2240c226eb74d879998d17fbe11496db9127ebc0
                       483e0d3f2d74c135ef6b3ae1a4ba18ccda9c7ae2
                       b728b6c720fc48c25e13d70fc76185a7f8b9a717
                       354f2a396a896b5ddc6c9467366f4ef6d21f3d7e
                       0645e65db99418775bb5375918345f207b92f273
                       1354b24acd3e01965ca8e804b42ad69a38c9e43d
                       b7dcfdfad0590aeaba081c25004309b5843fdf28
                       9f6a4a35d81374a3654305591457209b227efa25
                       6515834a
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [3a:15:e1:25:20:3d:80:65:5f:51:4c:55:07:72:88:27:4c:a4:77:0e],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-17 04:54:46.093  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-17 04:54:46.094 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-17 04:54:46.096 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2023-01-17 04:54:46.096 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-17 04:54:46.097  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2023-01-17 04:54:46.098  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-17 04:54:46.098  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-17 04:54:46.098 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-17 04:54:46.099 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-17 04:54:46.100 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-17 04:54:46.104 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-17 04:54:46.104 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-17 04:54:46.105 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-17 04:54:46.105 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-17 04:54:46.285  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-17 04:54:46.286  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-17 04:54:46.286 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-17 04:54:46.287 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-17 04:54:46.291  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-17 04:54:46.291  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-17 04:54:46.292 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-17 04:54:46.292 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-17 04:54:46.292 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-17 04:54:46.293 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-17 04:54:46.293 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-17 04:54:46.294 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-17 04:54:46.295 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-17 04:54:46.295 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-17 04:54:46.295 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-17 04:54:46.296 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-17 04:54:46.299 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 531494411584569409526722408551663954771970500609
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jan 17 03:06:12 UTC 2023
           Final Date: Sun Jan 16 03:06:11 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [8d:3d:72:90:dd:fa:d8:5c:35:5f:b8:66:64:39:dc:11:a9:42:d2:8e],[56:66:d1:a4]
        modulus: aea74a6a33676231d8c5950127d289f8c2399cb15bdc6c8c793f935412be9c5b8c0db5154a42809414d8cf03836f313c4489441eeeda211a83ea637ee9890b7f613e72bdc08b80e7b7c3365eb5c8b71583b1214ffd205a66fc5aa345ff7c03b3dcae57fedcc215aab3735b1b1258da8a73c56a108de632afe01b9296617fdfa8c1aa6f47a04c017c6656fc9b4edce4ccfaa1283998cace01a7dc54971694a4ae21c81b26df772f3c8736d52dfcf81560d38030987081e4d07f846bced30ea28281453e87813fbb92df3ff06d036b571f041dda662c151877810762522914ae5d8da487cf583ccc9200009ea6eb97fc6307ae81a45909a86ef12d8917614fcd93dfaf2f4da38373a31efadcc0e0139a666949bbc5a7ca1e7e4d73a4d7c50d239112d5893966dc4ec702f733654fc40c59fe0811ae68153cedcc5af6dbfc2cb8e84f302ab917652bae7caeb14cadef321ffc49731bf66f7a914f2771a625a0904a092c1d2e87c45f04c70ca542474e361db12ca3ab4bf7dcd806672319085dc1eb
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 2b53a0e51a78bb3691324fcb7692cee10f298122
                       beec5497c3032623bbf7e3108c6d100254fb62b2
                       50e04ca9bbffef2b7c7d211ea4aa917b41b330c6
                       3a3815030819de66272e6f287290f44b04c014d2
                       d9717404d3b7ca6eabe80489ea5e7007703c7b63
                       6f23521744172c5110cc1112fc4982a3941f567f
                       fd4eba0da5bcc5c5d483f8d1f65ae38274a8616d
                       d2e899b0eaaff79df8d8850310fe6680dc9eb451
                       e6565b078e98d41ab35cb41b459b4d32bc6f2363
                       4bc5b56bae672963dae7614479dad5e9cbc0a7f8
                       e5b1ed84c718b72d414fb4dc32ec6d66ba93f1a1
                       2240c226eb74d879998d17fbe11496db9127ebc0
                       483e0d3f2d74c135ef6b3ae1a4ba18ccda9c7ae2
                       b728b6c720fc48c25e13d70fc76185a7f8b9a717
                       354f2a396a896b5ddc6c9467366f4ef6d21f3d7e
                       0645e65db99418775bb5375918345f207b92f273
                       1354b24acd3e01965ca8e804b42ad69a38c9e43d
                       b7dcfdfad0590aeaba081c25004309b5843fdf28
                       9f6a4a35d81374a3654305591457209b227efa25
                       6515834a
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [4c:ef:82:be:72:ba:0c:02:1f:22:cb:b0:33:e9:06:d7:ac:fb:e0:50],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-17 04:56:44.851  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-17 04:56:44.852 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-17 04:56:44.853 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2023-01-17 04:56:44.854 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-17 04:56:44.854  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2023-01-17 04:56:44.855  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-17 04:56:44.855  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-17 04:56:44.855 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-17 04:56:44.856 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-17 04:56:44.856 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-17 04:56:44.860 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-17 04:56:44.860 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-17 04:56:44.860 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-17 04:56:44.861 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-17 04:56:45.018  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-17 04:56:45.019  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-17 04:56:45.020 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-17 04:56:45.020 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-17 04:56:45.023  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-17 04:56:45.023  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-17 04:56:45.024 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-17 04:56:45.024 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-17 04:56:45.025 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-17 04:56:45.026 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-17 04:56:45.026 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-17 04:56:45.027 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-17 04:56:45.028 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-17 04:56:45.029 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-17 04:56:45.029 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-17 04:56:45.030 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-17 04:56:45.036 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 531494411584569409526722408551663954771970500609
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jan 17 03:06:12 UTC 2023
           Final Date: Sun Jan 16 03:06:11 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [8d:3d:72:90:dd:fa:d8:5c:35:5f:b8:66:64:39:dc:11:a9:42:d2:8e],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 2b53a0e51a78bb3691324fcb7692cee10f298122
                       beec5497c3032623bbf7e3108c6d100254fb62b2
                       50e04ca9bbffef2b7c7d211ea4aa917b41b330c6
                       3a3815030819de66272e6f287290f44b04c014d2
                       d9717404d3b7ca6eabe80489ea5e7007703c7b63
                       6f23521744172c5110cc1112fc4982a3941f567f
                       fd4eba0da5bcc5c5d483f8d1f65ae38274a8616d
                       d2e899b0eaaff79df8d8850310fe6680dc9eb451
                       e6565b078e98d41ab35cb41b459b4d32bc6f2363
                       4bc5b56bae672963dae7614479dad5e9cbc0a7f8
                       e5b1ed84c718b72d414fb4dc32ec6d66ba93f1a1
                       2240c226eb74d879998d17fbe11496db9127ebc0
                       483e0d3f2d74c135ef6b3ae1a4ba18ccda9c7ae2
                       b728b6c720fc48c25e13d70fc76185a7f8b9a717
                       354f2a396a896b5ddc6c9467366f4ef6d21f3d7e
                       0645e65db99418775bb5375918345f207b92f273
                       1354b24acd3e01965ca8e804b42ad69a38c9e43d
                       b7dcfdfad0590aeaba081c25004309b5843fdf28
                       9f6a4a35d81374a3654305591457209b227efa25
                       6515834a
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [8a:b5:af:8c:34:a4:50:9f:9a:71:2b:af:c7:40:79:20:96:28:b8:ca],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-17 04:59:20.991  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-17 04:59:20.994 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-17 04:59:20.997 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-17 04:59:20.999 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-17 04:59:21.000  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-17 04:59:21.001  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-17 04:59:21.001  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-17 04:59:21.002 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-17 04:59:21.002 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-17 04:59:21.003 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-17 04:59:21.008 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-17 04:59:21.010 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-17 04:59:21.010 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-17 04:59:21.011 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-17 04:59:21.190  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-17 04:59:21.191  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-17 04:59:21.192 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-17 04:59:21.192 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-17 04:59:21.194  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-17 04:59:21.195  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-17 04:59:21.196 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-17 04:59:21.196 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-17 04:59:21.197 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-17 04:59:21.198 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-17 04:59:21.199 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-17 04:59:21.199 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-17 04:59:21.200 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-17 04:59:21.200 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-17 04:59:21.201 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-17 04:59:21.201 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-17 04:59:21.205 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 531494411584569409526722408551663954771970500609
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jan 17 03:06:12 UTC 2023
           Final Date: Sun Jan 16 03:06:11 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [8d:3d:72:90:dd:fa:d8:5c:35:5f:b8:66:64:39:dc:11:a9:42:d2:8e],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 2b53a0e51a78bb3691324fcb7692cee10f298122
                       beec5497c3032623bbf7e3108c6d100254fb62b2
                       50e04ca9bbffef2b7c7d211ea4aa917b41b330c6
                       3a3815030819de66272e6f287290f44b04c014d2
                       d9717404d3b7ca6eabe80489ea5e7007703c7b63
                       6f23521744172c5110cc1112fc4982a3941f567f
                       fd4eba0da5bcc5c5d483f8d1f65ae38274a8616d
                       d2e899b0eaaff79df8d8850310fe6680dc9eb451
                       e6565b078e98d41ab35cb41b459b4d32bc6f2363
                       4bc5b56bae672963dae7614479dad5e9cbc0a7f8
                       e5b1ed84c718b72d414fb4dc32ec6d66ba93f1a1
                       2240c226eb74d879998d17fbe11496db9127ebc0
                       483e0d3f2d74c135ef6b3ae1a4ba18ccda9c7ae2
                       b728b6c720fc48c25e13d70fc76185a7f8b9a717
                       354f2a396a896b5ddc6c9467366f4ef6d21f3d7e
                       0645e65db99418775bb5375918345f207b92f273
                       1354b24acd3e01965ca8e804b42ad69a38c9e43d
                       b7dcfdfad0590aeaba081c25004309b5843fdf28
                       9f6a4a35d81374a3654305591457209b227efa25
                       6515834a
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [05:68:10:43:bd:f8:d4:d4:2c:5b:c6:d4:11:5f:c1:d5:55:9d:ee:36],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-17 05:07:17.279  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-17 05:07:17.282 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-17 05:07:17.286 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-17 05:07:17.288 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-17 05:07:17.289  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-17 05:07:17.290  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-17 05:07:17.290  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-17 05:07:17.291 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-17 05:07:17.291 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-17 05:07:17.292 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-17 05:07:17.298 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-17 05:07:17.300 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-17 05:07:17.300 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-17 05:07:17.301 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-17 05:07:17.513  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-17 05:07:17.513  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-17 05:07:17.514 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-17 05:07:17.514 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-17 05:07:17.515  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-17 05:07:17.516  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-17 05:07:17.516 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-17 05:07:17.517 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-17 05:07:17.517 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-17 05:07:17.518 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-17 05:07:17.518 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-17 05:07:17.519 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-17 05:07:17.519 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-17 05:07:17.520 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-17 05:07:17.520 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-17 05:07:17.521 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-17 05:07:17.524 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 531494411584569409526722408551663954771970500609
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jan 17 03:06:12 UTC 2023
           Final Date: Sun Jan 16 03:06:11 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [8d:3d:72:90:dd:fa:d8:5c:35:5f:b8:66:64:39:dc:11:a9:42:d2:8e],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 2b53a0e51a78bb3691324fcb7692cee10f298122
                       beec5497c3032623bbf7e3108c6d100254fb62b2
                       50e04ca9bbffef2b7c7d211ea4aa917b41b330c6
                       3a3815030819de66272e6f287290f44b04c014d2
                       d9717404d3b7ca6eabe80489ea5e7007703c7b63
                       6f23521744172c5110cc1112fc4982a3941f567f
                       fd4eba0da5bcc5c5d483f8d1f65ae38274a8616d
                       d2e899b0eaaff79df8d8850310fe6680dc9eb451
                       e6565b078e98d41ab35cb41b459b4d32bc6f2363
                       4bc5b56bae672963dae7614479dad5e9cbc0a7f8
                       e5b1ed84c718b72d414fb4dc32ec6d66ba93f1a1
                       2240c226eb74d879998d17fbe11496db9127ebc0
                       483e0d3f2d74c135ef6b3ae1a4ba18ccda9c7ae2
                       b728b6c720fc48c25e13d70fc76185a7f8b9a717
                       354f2a396a896b5ddc6c9467366f4ef6d21f3d7e
                       0645e65db99418775bb5375918345f207b92f273
                       1354b24acd3e01965ca8e804b42ad69a38c9e43d
                       b7dcfdfad0590aeaba081c25004309b5843fdf28
                       9f6a4a35d81374a3654305591457209b227efa25
                       6515834a
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [b0:de:10:d9:b4:77:54:11:60:b9:0c:6a:c9:1f:6c:5c:88:66:b4:7a],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-17 05:13:20.833  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-17 05:13:20.835 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-17 05:13:20.838 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-17 05:13:20.839 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-17 05:13:20.840  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-17 05:13:20.840  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-17 05:13:20.841  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-17 05:13:20.841 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-17 05:13:20.841 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-17 05:13:20.842 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-17 05:13:20.846 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-17 05:13:20.847 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-17 05:13:20.847 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-17 05:13:20.848 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-17 05:13:20.989  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-17 05:13:20.990  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-17 05:13:20.990 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-17 05:13:20.990 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-17 05:13:20.992  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-17 05:13:20.992  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-17 05:13:20.992 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-17 05:13:20.993 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-17 05:13:20.994 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-17 05:13:20.994 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-17 05:13:20.995 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-17 05:13:20.995 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-17 05:13:20.996 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-17 05:13:20.996 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-17 05:13:20.996 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-17 05:13:20.997 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-17 05:13:21.001 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 531494411584569409526722408551663954771970500609
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jan 17 03:06:12 UTC 2023
           Final Date: Sun Jan 16 03:06:11 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [8d:3d:72:90:dd:fa:d8:5c:35:5f:b8:66:64:39:dc:11:a9:42:d2:8e],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 2b53a0e51a78bb3691324fcb7692cee10f298122
                       beec5497c3032623bbf7e3108c6d100254fb62b2
                       50e04ca9bbffef2b7c7d211ea4aa917b41b330c6
                       3a3815030819de66272e6f287290f44b04c014d2
                       d9717404d3b7ca6eabe80489ea5e7007703c7b63
                       6f23521744172c5110cc1112fc4982a3941f567f
                       fd4eba0da5bcc5c5d483f8d1f65ae38274a8616d
                       d2e899b0eaaff79df8d8850310fe6680dc9eb451
                       e6565b078e98d41ab35cb41b459b4d32bc6f2363
                       4bc5b56bae672963dae7614479dad5e9cbc0a7f8
                       e5b1ed84c718b72d414fb4dc32ec6d66ba93f1a1
                       2240c226eb74d879998d17fbe11496db9127ebc0
                       483e0d3f2d74c135ef6b3ae1a4ba18ccda9c7ae2
                       b728b6c720fc48c25e13d70fc76185a7f8b9a717
                       354f2a396a896b5ddc6c9467366f4ef6d21f3d7e
                       0645e65db99418775bb5375918345f207b92f273
                       1354b24acd3e01965ca8e804b42ad69a38c9e43d
                       b7dcfdfad0590aeaba081c25004309b5843fdf28
                       9f6a4a35d81374a3654305591457209b227efa25
                       6515834a
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ed:17:ff:14:ee:fb:36:68:47:11:d5:35:d9:4e:92:7f:04:3d:53:8f],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-17 05:20:36.765  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-17 05:20:36.768 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-17 05:20:36.771 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-17 05:20:36.772 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-17 05:20:36.772  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-17 05:20:36.773  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-17 05:20:36.773  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-17 05:20:36.774 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-17 05:20:36.775 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-17 05:20:36.775 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-17 05:20:36.779 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-17 05:20:36.780 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-17 05:20:36.780 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-17 05:20:36.781 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-17 05:20:37.007  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-17 05:20:37.007  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-17 05:20:37.008 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-17 05:20:37.008 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-17 05:20:37.010  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-17 05:20:37.010  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-17 05:20:37.011 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-17 05:20:37.011 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-17 05:20:37.012 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-17 05:20:37.012 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-17 05:20:37.013 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-17 05:20:37.013 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-17 05:20:37.014 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-17 05:20:37.015 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-17 05:20:37.015 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-17 05:20:37.016 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-17 05:20:37.021 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 531494411584569409526722408551663954771970500609
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jan 17 03:06:12 UTC 2023
           Final Date: Sun Jan 16 03:06:11 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [8d:3d:72:90:dd:fa:d8:5c:35:5f:b8:66:64:39:dc:11:a9:42:d2:8e],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 2b53a0e51a78bb3691324fcb7692cee10f298122
                       beec5497c3032623bbf7e3108c6d100254fb62b2
                       50e04ca9bbffef2b7c7d211ea4aa917b41b330c6
                       3a3815030819de66272e6f287290f44b04c014d2
                       d9717404d3b7ca6eabe80489ea5e7007703c7b63
                       6f23521744172c5110cc1112fc4982a3941f567f
                       fd4eba0da5bcc5c5d483f8d1f65ae38274a8616d
                       d2e899b0eaaff79df8d8850310fe6680dc9eb451
                       e6565b078e98d41ab35cb41b459b4d32bc6f2363
                       4bc5b56bae672963dae7614479dad5e9cbc0a7f8
                       e5b1ed84c718b72d414fb4dc32ec6d66ba93f1a1
                       2240c226eb74d879998d17fbe11496db9127ebc0
                       483e0d3f2d74c135ef6b3ae1a4ba18ccda9c7ae2
                       b728b6c720fc48c25e13d70fc76185a7f8b9a717
                       354f2a396a896b5ddc6c9467366f4ef6d21f3d7e
                       0645e65db99418775bb5375918345f207b92f273
                       1354b24acd3e01965ca8e804b42ad69a38c9e43d
                       b7dcfdfad0590aeaba081c25004309b5843fdf28
                       9f6a4a35d81374a3654305591457209b227efa25
                       6515834a
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [7f:ea:9c:72:b5:39:5c:0b:ad:e8:ab:b4:ac:c2:1f:e4:0d:99:64:69],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-17 05:26:10.036  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-17 05:26:10.037 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-17 05:26:10.038 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-17 05:26:10.039 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-17 05:26:10.039  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-17 05:26:10.040  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-17 05:26:10.040  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-17 05:26:10.041 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-17 05:26:10.041 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-17 05:26:10.041 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-17 05:26:10.045 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-17 05:26:10.046 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-17 05:26:10.046 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-17 05:26:10.047 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-17 05:26:10.159  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-17 05:26:10.160  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-17 05:26:10.160 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-17 05:26:10.161 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-17 05:26:10.162  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-17 05:26:10.162  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-17 05:26:10.163 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-17 05:26:10.163 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-17 05:26:10.163 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-17 05:26:10.164 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-17 05:26:10.164 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-17 05:26:10.165 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-17 05:26:10.165 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-17 05:26:10.166 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-17 05:26:10.166 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-17 05:26:10.167 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-17 05:26:10.169 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 531494411584569409526722408551663954771970500609
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jan 17 03:06:12 UTC 2023
           Final Date: Sun Jan 16 03:06:11 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [8d:3d:72:90:dd:fa:d8:5c:35:5f:b8:66:64:39:dc:11:a9:42:d2:8e],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 2b53a0e51a78bb3691324fcb7692cee10f298122
                       beec5497c3032623bbf7e3108c6d100254fb62b2
                       50e04ca9bbffef2b7c7d211ea4aa917b41b330c6
                       3a3815030819de66272e6f287290f44b04c014d2
                       d9717404d3b7ca6eabe80489ea5e7007703c7b63
                       6f23521744172c5110cc1112fc4982a3941f567f
                       fd4eba0da5bcc5c5d483f8d1f65ae38274a8616d
                       d2e899b0eaaff79df8d8850310fe6680dc9eb451
                       e6565b078e98d41ab35cb41b459b4d32bc6f2363
                       4bc5b56bae672963dae7614479dad5e9cbc0a7f8
                       e5b1ed84c718b72d414fb4dc32ec6d66ba93f1a1
                       2240c226eb74d879998d17fbe11496db9127ebc0
                       483e0d3f2d74c135ef6b3ae1a4ba18ccda9c7ae2
                       b728b6c720fc48c25e13d70fc76185a7f8b9a717
                       354f2a396a896b5ddc6c9467366f4ef6d21f3d7e
                       0645e65db99418775bb5375918345f207b92f273
                       1354b24acd3e01965ca8e804b42ad69a38c9e43d
                       b7dcfdfad0590aeaba081c25004309b5843fdf28
                       9f6a4a35d81374a3654305591457209b227efa25
                       6515834a
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [a3:a9:31:ca:98:8f:81:f2:0b:77:71:9e:40:5d:65:b0:97:d7:69:cd],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-17 05:34:12.011  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-17 05:34:12.013 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-17 05:34:12.017 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2023-01-17 05:34:12.018 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-17 05:34:12.019  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2023-01-17 05:34:12.019  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-17 05:34:12.020  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-17 05:34:12.020 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-17 05:34:12.021 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-17 05:34:12.023 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-17 05:34:12.030 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-17 05:34:12.031 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-17 05:34:12.032 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-17 05:34:12.033 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-17 05:34:12.205  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-17 05:34:12.206  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-17 05:34:12.206 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-17 05:34:12.206 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-17 05:34:12.207  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-17 05:34:12.208  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-17 05:34:12.208 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-17 05:34:12.208 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-17 05:34:12.209 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-17 05:34:12.209 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-17 05:34:12.210 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-17 05:34:12.211 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-17 05:34:12.212 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-17 05:34:12.213 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-17 05:34:12.213 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-17 05:34:12.215 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-17 05:34:12.222 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 531494411584569409526722408551663954771970500609
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jan 17 03:06:12 UTC 2023
           Final Date: Sun Jan 16 03:06:11 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [8d:3d:72:90:dd:fa:d8:5c:35:5f:b8:66:64:39:dc:11:a9:42:d2:8e],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 2b53a0e51a78bb3691324fcb7692cee10f298122
                       beec5497c3032623bbf7e3108c6d100254fb62b2
                       50e04ca9bbffef2b7c7d211ea4aa917b41b330c6
                       3a3815030819de66272e6f287290f44b04c014d2
                       d9717404d3b7ca6eabe80489ea5e7007703c7b63
                       6f23521744172c5110cc1112fc4982a3941f567f
                       fd4eba0da5bcc5c5d483f8d1f65ae38274a8616d
                       d2e899b0eaaff79df8d8850310fe6680dc9eb451
                       e6565b078e98d41ab35cb41b459b4d32bc6f2363
                       4bc5b56bae672963dae7614479dad5e9cbc0a7f8
                       e5b1ed84c718b72d414fb4dc32ec6d66ba93f1a1
                       2240c226eb74d879998d17fbe11496db9127ebc0
                       483e0d3f2d74c135ef6b3ae1a4ba18ccda9c7ae2
                       b728b6c720fc48c25e13d70fc76185a7f8b9a717
                       354f2a396a896b5ddc6c9467366f4ef6d21f3d7e
                       0645e65db99418775bb5375918345f207b92f273
                       1354b24acd3e01965ca8e804b42ad69a38c9e43d
                       b7dcfdfad0590aeaba081c25004309b5843fdf28
                       9f6a4a35d81374a3654305591457209b227efa25
                       6515834a
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [9f:92:41:a9:b2:2b:39:6d:b4:b8:a1:29:e8:6e:51:40:aa:6f:a7:5f],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-17 05:42:01.642  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-17 05:42:01.645 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-17 05:42:01.649 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2023-01-17 05:42:01.649 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-17 05:42:01.650  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2023-01-17 05:42:01.651  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-17 05:42:01.651  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-17 05:42:01.651 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-17 05:42:01.652 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-17 05:42:01.652 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-17 05:42:01.661 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-17 05:42:01.663 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-17 05:42:01.664 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-17 05:42:01.664 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-17 05:42:01.821  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-17 05:42:01.821  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-17 05:42:01.821 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-17 05:42:01.822 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-17 05:42:01.823  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-17 05:42:01.823  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-17 05:42:01.824 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-17 05:42:01.825 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-17 05:42:01.825 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-17 05:42:01.826 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-17 05:42:01.826 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-17 05:42:01.826 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-17 05:42:01.827 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-17 05:42:01.827 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-17 05:42:01.827 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-17 05:42:01.829 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-17 05:42:01.832 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 531494411584569409526722408551663954771970500609
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jan 17 03:06:12 UTC 2023
           Final Date: Sun Jan 16 03:06:11 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [8d:3d:72:90:dd:fa:d8:5c:35:5f:b8:66:64:39:dc:11:a9:42:d2:8e],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 2b53a0e51a78bb3691324fcb7692cee10f298122
                       beec5497c3032623bbf7e3108c6d100254fb62b2
                       50e04ca9bbffef2b7c7d211ea4aa917b41b330c6
                       3a3815030819de66272e6f287290f44b04c014d2
                       d9717404d3b7ca6eabe80489ea5e7007703c7b63
                       6f23521744172c5110cc1112fc4982a3941f567f
                       fd4eba0da5bcc5c5d483f8d1f65ae38274a8616d
                       d2e899b0eaaff79df8d8850310fe6680dc9eb451
                       e6565b078e98d41ab35cb41b459b4d32bc6f2363
                       4bc5b56bae672963dae7614479dad5e9cbc0a7f8
                       e5b1ed84c718b72d414fb4dc32ec6d66ba93f1a1
                       2240c226eb74d879998d17fbe11496db9127ebc0
                       483e0d3f2d74c135ef6b3ae1a4ba18ccda9c7ae2
                       b728b6c720fc48c25e13d70fc76185a7f8b9a717
                       354f2a396a896b5ddc6c9467366f4ef6d21f3d7e
                       0645e65db99418775bb5375918345f207b92f273
                       1354b24acd3e01965ca8e804b42ad69a38c9e43d
                       b7dcfdfad0590aeaba081c25004309b5843fdf28
                       9f6a4a35d81374a3654305591457209b227efa25
                       6515834a
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [73:25:67:7d:9d:67:f9:83:87:d0:5f:6c:bf:4f:90:81:f8:4b:57:b6],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-17 05:42:19.427  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-17 05:42:19.428 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-17 05:42:19.431 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2023-01-17 05:42:19.431 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-17 05:42:19.432  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2023-01-17 05:42:19.432  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-17 05:42:19.433  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-17 05:42:19.433 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-17 05:42:19.433 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-17 05:42:19.434 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-17 05:42:19.437 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-17 05:42:19.438 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-17 05:42:19.438 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-17 05:42:19.438 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-17 05:42:19.531  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-17 05:42:19.532  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-17 05:42:19.532 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-17 05:42:19.533 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-17 05:42:19.534  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-17 05:42:19.535  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-17 05:42:19.535 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-17 05:42:19.535 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-17 05:42:19.536 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-17 05:42:19.536 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-17 05:42:19.537 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-17 05:42:19.537 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-17 05:42:19.537 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-17 05:42:19.538 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-17 05:42:19.538 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-17 05:42:19.539 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-17 05:42:19.541 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 531494411584569409526722408551663954771970500609
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jan 17 03:06:12 UTC 2023
           Final Date: Sun Jan 16 03:06:11 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [8d:3d:72:90:dd:fa:d8:5c:35:5f:b8:66:64:39:dc:11:a9:42:d2:8e],[56:66:d1:a4]
        modulus: aea74a6a33676231d8c5950127d289f8c2399cb15bdc6c8c793f935412be9c5b8c0db5154a42809414d8cf03836f313c4489441eeeda211a83ea637ee9890b7f613e72bdc08b80e7b7c3365eb5c8b71583b1214ffd205a66fc5aa345ff7c03b3dcae57fedcc215aab3735b1b1258da8a73c56a108de632afe01b9296617fdfa8c1aa6f47a04c017c6656fc9b4edce4ccfaa1283998cace01a7dc54971694a4ae21c81b26df772f3c8736d52dfcf81560d38030987081e4d07f846bced30ea28281453e87813fbb92df3ff06d036b571f041dda662c151877810762522914ae5d8da487cf583ccc9200009ea6eb97fc6307ae81a45909a86ef12d8917614fcd93dfaf2f4da38373a31efadcc0e0139a666949bbc5a7ca1e7e4d73a4d7c50d239112d5893966dc4ec702f733654fc40c59fe0811ae68153cedcc5af6dbfc2cb8e84f302ab917652bae7caeb14cadef321ffc49731bf66f7a914f2771a625a0904a092c1d2e87c45f04c70ca542474e361db12ca3ab4bf7dcd806672319085dc1eb
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 2b53a0e51a78bb3691324fcb7692cee10f298122
                       beec5497c3032623bbf7e3108c6d100254fb62b2
                       50e04ca9bbffef2b7c7d211ea4aa917b41b330c6
                       3a3815030819de66272e6f287290f44b04c014d2
                       d9717404d3b7ca6eabe80489ea5e7007703c7b63
                       6f23521744172c5110cc1112fc4982a3941f567f
                       fd4eba0da5bcc5c5d483f8d1f65ae38274a8616d
                       d2e899b0eaaff79df8d8850310fe6680dc9eb451
                       e6565b078e98d41ab35cb41b459b4d32bc6f2363
                       4bc5b56bae672963dae7614479dad5e9cbc0a7f8
                       e5b1ed84c718b72d414fb4dc32ec6d66ba93f1a1
                       2240c226eb74d879998d17fbe11496db9127ebc0
                       483e0d3f2d74c135ef6b3ae1a4ba18ccda9c7ae2
                       b728b6c720fc48c25e13d70fc76185a7f8b9a717
                       354f2a396a896b5ddc6c9467366f4ef6d21f3d7e
                       0645e65db99418775bb5375918345f207b92f273
                       1354b24acd3e01965ca8e804b42ad69a38c9e43d
                       b7dcfdfad0590aeaba081c25004309b5843fdf28
                       9f6a4a35d81374a3654305591457209b227efa25
                       6515834a
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [5d:69:18:06:9a:e4:75:1c:1b:85:af:3a:0a:71:d1:20:a8:30:54:bf],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-17 06:07:20.897  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-17 06:07:20.900 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-17 06:07:20.903 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2023-01-17 06:07:20.904 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-17 06:07:20.904  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2023-01-17 06:07:20.905  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-17 06:07:20.905  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-17 06:07:20.906 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-17 06:07:20.906 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-17 06:07:20.907 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-17 06:07:20.912 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-17 06:07:20.913 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-17 06:07:20.913 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-17 06:07:20.913 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-17 06:07:21.084  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-17 06:07:21.085  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-17 06:07:21.085 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-17 06:07:21.086 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-17 06:07:21.088  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-17 06:07:21.089  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-17 06:07:21.089 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-17 06:07:21.090 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-17 06:07:21.090 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-17 06:07:21.091 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-17 06:07:21.091 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-17 06:07:21.091 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-17 06:07:21.092 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-17 06:07:21.092 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-17 06:07:21.093 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-17 06:07:21.093 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-17 06:07:21.096 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 531494411584569409526722408551663954771970500609
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jan 17 03:06:12 UTC 2023
           Final Date: Sun Jan 16 03:06:11 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [8d:3d:72:90:dd:fa:d8:5c:35:5f:b8:66:64:39:dc:11:a9:42:d2:8e],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 2b53a0e51a78bb3691324fcb7692cee10f298122
                       beec5497c3032623bbf7e3108c6d100254fb62b2
                       50e04ca9bbffef2b7c7d211ea4aa917b41b330c6
                       3a3815030819de66272e6f287290f44b04c014d2
                       d9717404d3b7ca6eabe80489ea5e7007703c7b63
                       6f23521744172c5110cc1112fc4982a3941f567f
                       fd4eba0da5bcc5c5d483f8d1f65ae38274a8616d
                       d2e899b0eaaff79df8d8850310fe6680dc9eb451
                       e6565b078e98d41ab35cb41b459b4d32bc6f2363
                       4bc5b56bae672963dae7614479dad5e9cbc0a7f8
                       e5b1ed84c718b72d414fb4dc32ec6d66ba93f1a1
                       2240c226eb74d879998d17fbe11496db9127ebc0
                       483e0d3f2d74c135ef6b3ae1a4ba18ccda9c7ae2
                       b728b6c720fc48c25e13d70fc76185a7f8b9a717
                       354f2a396a896b5ddc6c9467366f4ef6d21f3d7e
                       0645e65db99418775bb5375918345f207b92f273
                       1354b24acd3e01965ca8e804b42ad69a38c9e43d
                       b7dcfdfad0590aeaba081c25004309b5843fdf28
                       9f6a4a35d81374a3654305591457209b227efa25
                       6515834a
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [9e:2f:df:ee:8b:94:99:3b:fc:24:66:8a:6b:1f:49:d0:00:64:4c:b0],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-17 06:07:26.144  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-17 06:07:26.145 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-17 06:07:26.146 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2023-01-17 06:07:26.147 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-17 06:07:26.148  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2023-01-17 06:07:26.148  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-17 06:07:26.148  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-17 06:07:26.149 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-17 06:07:26.149 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-17 06:07:26.149 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-17 06:07:26.153 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-17 06:07:26.154 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-17 06:07:26.154 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-17 06:07:26.154 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-17 06:07:26.274  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-17 06:07:26.275  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-17 06:07:26.275 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-17 06:07:26.275 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-17 06:07:26.276  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-17 06:07:26.277  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-17 06:07:26.277 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-17 06:07:26.277 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-17 06:07:26.278 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-17 06:07:26.278 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-17 06:07:26.279 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-17 06:07:26.279 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-17 06:07:26.280 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-17 06:07:26.280 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-17 06:07:26.280 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-17 06:07:26.281 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-17 06:07:26.283 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 531494411584569409526722408551663954771970500609
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jan 17 03:06:12 UTC 2023
           Final Date: Sun Jan 16 03:06:11 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [8d:3d:72:90:dd:fa:d8:5c:35:5f:b8:66:64:39:dc:11:a9:42:d2:8e],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 2b53a0e51a78bb3691324fcb7692cee10f298122
                       beec5497c3032623bbf7e3108c6d100254fb62b2
                       50e04ca9bbffef2b7c7d211ea4aa917b41b330c6
                       3a3815030819de66272e6f287290f44b04c014d2
                       d9717404d3b7ca6eabe80489ea5e7007703c7b63
                       6f23521744172c5110cc1112fc4982a3941f567f
                       fd4eba0da5bcc5c5d483f8d1f65ae38274a8616d
                       d2e899b0eaaff79df8d8850310fe6680dc9eb451
                       e6565b078e98d41ab35cb41b459b4d32bc6f2363
                       4bc5b56bae672963dae7614479dad5e9cbc0a7f8
                       e5b1ed84c718b72d414fb4dc32ec6d66ba93f1a1
                       2240c226eb74d879998d17fbe11496db9127ebc0
                       483e0d3f2d74c135ef6b3ae1a4ba18ccda9c7ae2
                       b728b6c720fc48c25e13d70fc76185a7f8b9a717
                       354f2a396a896b5ddc6c9467366f4ef6d21f3d7e
                       0645e65db99418775bb5375918345f207b92f273
                       1354b24acd3e01965ca8e804b42ad69a38c9e43d
                       b7dcfdfad0590aeaba081c25004309b5843fdf28
                       9f6a4a35d81374a3654305591457209b227efa25
                       6515834a
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [df:90:dc:45:6f:e8:d7:5a:99:ae:55:91:8f:b8:b9:f7:10:54:22:61],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

]