Results

By type

          2023-01-24 03:20:30,238 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2023-01-24 03:20:31,316 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2023-01-24 03:20:32.010  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Jan 24, 2023 3:20:33 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Jan 24, 2023 3:20:33 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Jan 24, 2023 3:20:33 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Jan 24, 2023 3:20:33 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2023-01-24 03:20:34.408 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2023-01-24 03:20:34.674  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2023-01-24 03:20:34.829  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2023-01-24 03:20:35.528 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2023-01-24 03:20:35.531 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
2023-01-24 03:20:35.532 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2023-01-24 03:20:35.535 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2023-01-24 03:20:35.573 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
2023-01-24 03:20:35.576 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/docs]}: redirectToUi(HttpServletRequest)
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
2023-01-24 03:20:35.696 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2023-01-24 03:20:36.248 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Jan 24, 2023 3:20:36 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2023-01-24 03:20:37.101  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 7.827 seconds (JVM running for 9.49)
Jan 24, 2023 3:21:00 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2023-01-24 03:21:19.616  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-24 03:21:19.624 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-24 03:21:19.663 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2023-01-24 03:21:19.666 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-24 03:21:19.682  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2023-01-24 03:21:19.685  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-24 03:21:19.686  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-24 03:21:19.688 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-24 03:21:19.689 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-24 03:21:19.693 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-24 03:21:19.705 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-24 03:21:19.709 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-24 03:21:19.765 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-24 03:21:19.773 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-24 03:21:19.774 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-24 03:21:19.777 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-24 03:21:21.049  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-24 03:21:21.052  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-24 03:21:21.053 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-24 03:21:21.058 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-24 03:21:21.071  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-24 03:21:21.072  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-24 03:21:21.073 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-24 03:21:21.074 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-24 03:21:21.076 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-24 03:21:21.101 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-24 03:21:21.102 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-24 03:21:21.102 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-24 03:21:21.113 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-24 03:21:21.114 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-24 03:21:21.114 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-24 03:21:21.116 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-24 03:21:21.161 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 615363494371566137961964144469137417779234395126
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jan 24 03:14:36 UTC 2023
           Final Date: Sun Jan 23 03:14:35 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [1d:70:05:89:cc:1c:36:b3:c3:db:c3:24:6a:82:f0:8e:82:8c:42:30],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7e8218ba45fcbcb5784e2722623e087ec88c13ea
                       5b694c376a2dd27b1c548b068da6549403764180
                       654cbf69b1fc050e3ddb415cf337752a4da5d391
                       82b4126b8d9143e66d31305e48ce65857cc016e4
                       01ea6af928f922e990f1ce96b95c8522c7ad7da4
                       969649c91949046d9b853870bd7f3fdf35ef5118
                       48c1dffb21fd528fb7f4e4956fc9a342f947d726
                       4625cde5ac69932979a758efdcc72845d462440d
                       f4dbb18c1fe1779ccbd4b7a35a2fe47668b3232b
                       748db0a0644d59b1b32a5253bb57868ae18ece05
                       79c63f8722056f990f46fbb6694fdaddb8e65e8a
                       d912d3a540dde19b4c9605f1e395d16da19d3a1e
                       912bfe649edd7895204939c0f72304dc3d728792
                       5e30702541c8852b8d124f3966e46a7c99ae7941
                       8e929f3b96718456e60a56ce2ab10190e30a3bd5
                       ceab0cdfa5db320312a87ce598c36865e538c054
                       32361951ab81b6cfa5188ef8b9e0c6e248ae452d
                       5af71685bb20554fd7ccaef830ec2e259b94dcc0
                       cb6ad91125473d51fa9aae96a7697ab35c976000
                       c7ad1e04
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [1f:fe:b4:9c:eb:97:b1:cd:fd:1a:3e:e6:07:53:22:32:65:7b:60:05],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-24 05:09:25.948  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-24 05:09:25.952 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-24 05:09:25.960 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-24 05:09:25.962 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-24 05:09:25.963  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-24 05:09:25.966  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-24 05:09:25.967  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-24 05:09:25.968 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-24 05:09:25.970 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-24 05:09:25.971 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-24 05:09:25.976 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-24 05:09:25.977 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-24 05:09:25.977 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-24 05:09:25.978 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-24 05:09:26.486  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-24 05:09:26.487  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-24 05:09:26.488 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-24 05:09:26.488 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-24 05:09:26.492  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-24 05:09:26.493  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-24 05:09:26.494 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-24 05:09:26.494 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-24 05:09:26.495 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-24 05:09:26.496 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-24 05:09:26.497 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-24 05:09:26.497 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-24 05:09:26.498 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-24 05:09:26.499 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-24 05:09:26.499 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-24 05:09:26.500 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-24 05:09:26.505 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 615363494371566137961964144469137417779234395126
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jan 24 03:14:36 UTC 2023
           Final Date: Sun Jan 23 03:14:35 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [1d:70:05:89:cc:1c:36:b3:c3:db:c3:24:6a:82:f0:8e:82:8c:42:30],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7e8218ba45fcbcb5784e2722623e087ec88c13ea
                       5b694c376a2dd27b1c548b068da6549403764180
                       654cbf69b1fc050e3ddb415cf337752a4da5d391
                       82b4126b8d9143e66d31305e48ce65857cc016e4
                       01ea6af928f922e990f1ce96b95c8522c7ad7da4
                       969649c91949046d9b853870bd7f3fdf35ef5118
                       48c1dffb21fd528fb7f4e4956fc9a342f947d726
                       4625cde5ac69932979a758efdcc72845d462440d
                       f4dbb18c1fe1779ccbd4b7a35a2fe47668b3232b
                       748db0a0644d59b1b32a5253bb57868ae18ece05
                       79c63f8722056f990f46fbb6694fdaddb8e65e8a
                       d912d3a540dde19b4c9605f1e395d16da19d3a1e
                       912bfe649edd7895204939c0f72304dc3d728792
                       5e30702541c8852b8d124f3966e46a7c99ae7941
                       8e929f3b96718456e60a56ce2ab10190e30a3bd5
                       ceab0cdfa5db320312a87ce598c36865e538c054
                       32361951ab81b6cfa5188ef8b9e0c6e248ae452d
                       5af71685bb20554fd7ccaef830ec2e259b94dcc0
                       cb6ad91125473d51fa9aae96a7697ab35c976000
                       c7ad1e04
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [d2:6d:13:9b:be:36:3b:66:e0:47:f8:f8:92:c4:13:e5:26:c6:1d:df],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-24 05:11:11.763  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-24 05:11:11.765 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-24 05:11:11.767 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2023-01-24 05:11:11.769 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-24 05:11:11.769  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2023-01-24 05:11:11.771  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-24 05:11:11.772  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-24 05:11:11.773 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-24 05:11:11.773 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-24 05:11:11.775 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-24 05:11:11.782 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-24 05:11:11.783 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-24 05:11:11.784 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-24 05:11:11.785 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-24 05:11:11.979  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-24 05:11:11.980  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-24 05:11:11.985 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-24 05:11:11.986 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-24 05:11:11.988  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-24 05:11:11.989  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-24 05:11:11.990 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-24 05:11:11.990 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-24 05:11:11.990 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-24 05:11:11.991 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-24 05:11:11.992 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-24 05:11:11.992 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-24 05:11:11.993 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-24 05:11:11.993 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-24 05:11:12.000 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-24 05:11:12.004 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-24 05:11:12.010 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 615363494371566137961964144469137417779234395126
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jan 24 03:14:36 UTC 2023
           Final Date: Sun Jan 23 03:14:35 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [1d:70:05:89:cc:1c:36:b3:c3:db:c3:24:6a:82:f0:8e:82:8c:42:30],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7e8218ba45fcbcb5784e2722623e087ec88c13ea
                       5b694c376a2dd27b1c548b068da6549403764180
                       654cbf69b1fc050e3ddb415cf337752a4da5d391
                       82b4126b8d9143e66d31305e48ce65857cc016e4
                       01ea6af928f922e990f1ce96b95c8522c7ad7da4
                       969649c91949046d9b853870bd7f3fdf35ef5118
                       48c1dffb21fd528fb7f4e4956fc9a342f947d726
                       4625cde5ac69932979a758efdcc72845d462440d
                       f4dbb18c1fe1779ccbd4b7a35a2fe47668b3232b
                       748db0a0644d59b1b32a5253bb57868ae18ece05
                       79c63f8722056f990f46fbb6694fdaddb8e65e8a
                       d912d3a540dde19b4c9605f1e395d16da19d3a1e
                       912bfe649edd7895204939c0f72304dc3d728792
                       5e30702541c8852b8d124f3966e46a7c99ae7941
                       8e929f3b96718456e60a56ce2ab10190e30a3bd5
                       ceab0cdfa5db320312a87ce598c36865e538c054
                       32361951ab81b6cfa5188ef8b9e0c6e248ae452d
                       5af71685bb20554fd7ccaef830ec2e259b94dcc0
                       cb6ad91125473d51fa9aae96a7697ab35c976000
                       c7ad1e04
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [39:0e:8c:81:0e:d8:d0:a4:47:bd:0f:93:26:20:82:74:e1:39:41:10],[56:66:d1:a4]
        modulus: c3646786b7cac84127032bd0b13c9e4e1040ed470ca907ed26d470f610d40f92b8ccddf5d71083cf45d400b4b64649b89c43eb33b455445f15022f7e98f412db5b10576e1733b58b49559ee11a628aa7267f31d39c02670ba000e455fbff97eaa5cfc9ab74c0600776b70ba8cd1d6da147e8648c569578d8369a223f6bf69d7c3d1d5fe79980161611cf1878f68e76b94b92bf57934a9ea1dc6bafe1ae8df8d92edf338caae74e9945a0250229d89c0ad39c66446d1ae73152095c8f9649a0e69814b0592083e989677590629b4cbf8fc80e7b3059c2fd5a2811376c8ea85c4d75264b519d1f887f8d3472df6ac2bd86aec8ae3268ac3d6dad1fe7ee7d08aa79
public exponent: 10001

] 
2023-01-24 05:13:54.411  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-24 05:13:54.412 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-24 05:13:54.414 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2023-01-24 05:13:54.414 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-24 05:13:54.415  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2023-01-24 05:13:54.415  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-24 05:13:54.416  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-24 05:13:54.416 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-24 05:13:54.416 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-24 05:13:54.417 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-24 05:13:54.421 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-24 05:13:54.421 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-24 05:13:54.422 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-24 05:13:54.422 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-24 05:13:54.699  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-24 05:13:54.699  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-24 05:13:54.700 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-24 05:13:54.700 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-24 05:13:54.702  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-24 05:13:54.702  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-24 05:13:54.703 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-24 05:13:54.703 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-24 05:13:54.704 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-24 05:13:54.704 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-24 05:13:54.705 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-24 05:13:54.705 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-24 05:13:54.706 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-24 05:13:54.706 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-24 05:13:54.707 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-24 05:13:54.707 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-24 05:13:54.712 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 615363494371566137961964144469137417779234395126
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jan 24 03:14:36 UTC 2023
           Final Date: Sun Jan 23 03:14:35 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [1d:70:05:89:cc:1c:36:b3:c3:db:c3:24:6a:82:f0:8e:82:8c:42:30],[56:66:d1:a4]
        modulus: 9e869a1c115bbe7ef5a9329d00fe50ef1bb1a2a1c66e89b88ac870953993c03711502d75b653cf8e51aa037ee6409b8ffbf490473d24137c20a3c36ab8943d7b5a9b9d9623d1d354108c6891f7c73743cec809869ff2e686dfdbad23b5367cdf9c71c75341fca4bf939822977dd3cd182a2acec35900ab2493cd13b91091a6fb5a2a166c13ed610ceecfb5461734dc4bc60eb8145c057ad69574c40a4a958a12fc2396082b8a874cba60d7b13212010870695f066a40394f35b8499cb85699b5887efd682b6cb9f99654e2255949e1e09f9b5b1a86e99544e909b4aac9504a769d02bc2fe8932823f767b077d5c232b167c3d69c88bdb49501ab5fa7663b50c95bb4fa08caab05272886dc8827479ee3a6bdf653bbfa44ba875d3bf50218eca728cf6edc184469209c5fd603c6c3ccf4506567fe8c6596d52eaab1d75c995f5e2d58da0b483d30a09e8c7ed15032095ae589ddc0958c8b54f0d0bd98e43431573fef0b8d587d0724a0daafdd149c7ffb315c1954b5bf5e3d058e058016d72a37
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7e8218ba45fcbcb5784e2722623e087ec88c13ea
                       5b694c376a2dd27b1c548b068da6549403764180
                       654cbf69b1fc050e3ddb415cf337752a4da5d391
                       82b4126b8d9143e66d31305e48ce65857cc016e4
                       01ea6af928f922e990f1ce96b95c8522c7ad7da4
                       969649c91949046d9b853870bd7f3fdf35ef5118
                       48c1dffb21fd528fb7f4e4956fc9a342f947d726
                       4625cde5ac69932979a758efdcc72845d462440d
                       f4dbb18c1fe1779ccbd4b7a35a2fe47668b3232b
                       748db0a0644d59b1b32a5253bb57868ae18ece05
                       79c63f8722056f990f46fbb6694fdaddb8e65e8a
                       d912d3a540dde19b4c9605f1e395d16da19d3a1e
                       912bfe649edd7895204939c0f72304dc3d728792
                       5e30702541c8852b8d124f3966e46a7c99ae7941
                       8e929f3b96718456e60a56ce2ab10190e30a3bd5
                       ceab0cdfa5db320312a87ce598c36865e538c054
                       32361951ab81b6cfa5188ef8b9e0c6e248ae452d
                       5af71685bb20554fd7ccaef830ec2e259b94dcc0
                       cb6ad91125473d51fa9aae96a7697ab35c976000
                       c7ad1e04
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [85:6d:01:f1:8f:2d:b8:4e:40:f5:b1:b7:71:f4:eb:a0:35:e3:e6:05],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-24 05:16:55.018  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-24 05:16:55.021 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-24 05:16:55.024 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-24 05:16:55.025 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-24 05:16:55.026  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-24 05:16:55.027  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-24 05:16:55.028  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-24 05:16:55.028 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-24 05:16:55.029 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-24 05:16:55.029 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-24 05:16:55.035 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-24 05:16:55.036 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-24 05:16:55.036 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-24 05:16:55.037 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-24 05:16:55.310  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-24 05:16:55.313  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-24 05:16:55.314 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-24 05:16:55.315 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-24 05:16:55.319  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-24 05:16:55.323  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-24 05:16:55.327 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-24 05:16:55.329 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-24 05:16:55.330 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-24 05:16:55.331 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-24 05:16:55.332 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-24 05:16:55.332 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-24 05:16:55.333 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-24 05:16:55.333 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-24 05:16:55.334 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-24 05:16:55.335 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-24 05:16:55.338 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 615363494371566137961964144469137417779234395126
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jan 24 03:14:36 UTC 2023
           Final Date: Sun Jan 23 03:14:35 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [1d:70:05:89:cc:1c:36:b3:c3:db:c3:24:6a:82:f0:8e:82:8c:42:30],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7e8218ba45fcbcb5784e2722623e087ec88c13ea
                       5b694c376a2dd27b1c548b068da6549403764180
                       654cbf69b1fc050e3ddb415cf337752a4da5d391
                       82b4126b8d9143e66d31305e48ce65857cc016e4
                       01ea6af928f922e990f1ce96b95c8522c7ad7da4
                       969649c91949046d9b853870bd7f3fdf35ef5118
                       48c1dffb21fd528fb7f4e4956fc9a342f947d726
                       4625cde5ac69932979a758efdcc72845d462440d
                       f4dbb18c1fe1779ccbd4b7a35a2fe47668b3232b
                       748db0a0644d59b1b32a5253bb57868ae18ece05
                       79c63f8722056f990f46fbb6694fdaddb8e65e8a
                       d912d3a540dde19b4c9605f1e395d16da19d3a1e
                       912bfe649edd7895204939c0f72304dc3d728792
                       5e30702541c8852b8d124f3966e46a7c99ae7941
                       8e929f3b96718456e60a56ce2ab10190e30a3bd5
                       ceab0cdfa5db320312a87ce598c36865e538c054
                       32361951ab81b6cfa5188ef8b9e0c6e248ae452d
                       5af71685bb20554fd7ccaef830ec2e259b94dcc0
                       cb6ad91125473d51fa9aae96a7697ab35c976000
                       c7ad1e04
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [a3:e0:a8:dc:49:31:a3:88:51:f6:80:7e:1b:f2:ee:66:18:16:95:17],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-24 05:24:11.556  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-24 05:24:11.559 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-24 05:24:11.561 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-24 05:24:11.562 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-24 05:24:11.563  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-24 05:24:11.564  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-24 05:24:11.564  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-24 05:24:11.565 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-24 05:24:11.570 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-24 05:24:11.570 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-24 05:24:11.578 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-24 05:24:11.580 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-24 05:24:11.581 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-24 05:24:11.581 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-24 05:24:11.923  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-24 05:24:11.924  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-24 05:24:11.924 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-24 05:24:11.925 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-24 05:24:11.926  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-24 05:24:11.926  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-24 05:24:11.927 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-24 05:24:11.927 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-24 05:24:11.927 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-24 05:24:11.928 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-24 05:24:11.928 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-24 05:24:11.929 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-24 05:24:11.930 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-24 05:24:11.930 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-24 05:24:11.930 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-24 05:24:11.932 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-24 05:24:11.935 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 615363494371566137961964144469137417779234395126
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jan 24 03:14:36 UTC 2023
           Final Date: Sun Jan 23 03:14:35 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [1d:70:05:89:cc:1c:36:b3:c3:db:c3:24:6a:82:f0:8e:82:8c:42:30],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7e8218ba45fcbcb5784e2722623e087ec88c13ea
                       5b694c376a2dd27b1c548b068da6549403764180
                       654cbf69b1fc050e3ddb415cf337752a4da5d391
                       82b4126b8d9143e66d31305e48ce65857cc016e4
                       01ea6af928f922e990f1ce96b95c8522c7ad7da4
                       969649c91949046d9b853870bd7f3fdf35ef5118
                       48c1dffb21fd528fb7f4e4956fc9a342f947d726
                       4625cde5ac69932979a758efdcc72845d462440d
                       f4dbb18c1fe1779ccbd4b7a35a2fe47668b3232b
                       748db0a0644d59b1b32a5253bb57868ae18ece05
                       79c63f8722056f990f46fbb6694fdaddb8e65e8a
                       d912d3a540dde19b4c9605f1e395d16da19d3a1e
                       912bfe649edd7895204939c0f72304dc3d728792
                       5e30702541c8852b8d124f3966e46a7c99ae7941
                       8e929f3b96718456e60a56ce2ab10190e30a3bd5
                       ceab0cdfa5db320312a87ce598c36865e538c054
                       32361951ab81b6cfa5188ef8b9e0c6e248ae452d
                       5af71685bb20554fd7ccaef830ec2e259b94dcc0
                       cb6ad91125473d51fa9aae96a7697ab35c976000
                       c7ad1e04
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [21:2c:fd:1c:4b:7d:0e:12:91:39:2a:8f:9f:7d:e9:8e:9a:33:3b:4a],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-24 05:32:09.887  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-24 05:32:09.896 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-24 05:32:09.898 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-24 05:32:09.898 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-24 05:32:09.899  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-24 05:32:09.899  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-24 05:32:09.901  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-24 05:32:09.902 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-24 05:32:09.902 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-24 05:32:09.903 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-24 05:32:09.907 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-24 05:32:09.907 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-24 05:32:09.908 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-24 05:32:09.908 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-24 05:32:10.162  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-24 05:32:10.163  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-24 05:32:10.164 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-24 05:32:10.164 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-24 05:32:10.165  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-24 05:32:10.166  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-24 05:32:10.166 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-24 05:32:10.166 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-24 05:32:10.167 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-24 05:32:10.167 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-24 05:32:10.168 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-24 05:32:10.168 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-24 05:32:10.169 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-24 05:32:10.170 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-24 05:32:10.170 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-24 05:32:10.171 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-24 05:32:10.174 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 615363494371566137961964144469137417779234395126
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jan 24 03:14:36 UTC 2023
           Final Date: Sun Jan 23 03:14:35 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [1d:70:05:89:cc:1c:36:b3:c3:db:c3:24:6a:82:f0:8e:82:8c:42:30],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7e8218ba45fcbcb5784e2722623e087ec88c13ea
                       5b694c376a2dd27b1c548b068da6549403764180
                       654cbf69b1fc050e3ddb415cf337752a4da5d391
                       82b4126b8d9143e66d31305e48ce65857cc016e4
                       01ea6af928f922e990f1ce96b95c8522c7ad7da4
                       969649c91949046d9b853870bd7f3fdf35ef5118
                       48c1dffb21fd528fb7f4e4956fc9a342f947d726
                       4625cde5ac69932979a758efdcc72845d462440d
                       f4dbb18c1fe1779ccbd4b7a35a2fe47668b3232b
                       748db0a0644d59b1b32a5253bb57868ae18ece05
                       79c63f8722056f990f46fbb6694fdaddb8e65e8a
                       d912d3a540dde19b4c9605f1e395d16da19d3a1e
                       912bfe649edd7895204939c0f72304dc3d728792
                       5e30702541c8852b8d124f3966e46a7c99ae7941
                       8e929f3b96718456e60a56ce2ab10190e30a3bd5
                       ceab0cdfa5db320312a87ce598c36865e538c054
                       32361951ab81b6cfa5188ef8b9e0c6e248ae452d
                       5af71685bb20554fd7ccaef830ec2e259b94dcc0
                       cb6ad91125473d51fa9aae96a7697ab35c976000
                       c7ad1e04
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [b6:f3:4b:4d:0f:1a:bc:80:a7:53:8a:37:af:e4:4e:5e:5b:02:50:b0],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-24 05:39:30.260  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-24 05:39:30.262 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-24 05:39:30.264 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-24 05:39:30.265 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-24 05:39:30.266  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-24 05:39:30.266  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-24 05:39:30.267  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-24 05:39:30.267 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-24 05:39:30.268 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-24 05:39:30.268 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-24 05:39:30.273 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-24 05:39:30.274 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-24 05:39:30.274 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-24 05:39:30.275 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-24 05:39:30.612  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-24 05:39:30.613  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-24 05:39:30.613 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-24 05:39:30.614 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-24 05:39:30.615  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-24 05:39:30.616  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-24 05:39:30.616 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-24 05:39:30.616 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-24 05:39:30.617 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-24 05:39:30.618 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-24 05:39:30.618 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-24 05:39:30.618 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-24 05:39:30.619 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-24 05:39:30.619 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-24 05:39:30.620 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-24 05:39:30.620 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-24 05:39:30.624 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 615363494371566137961964144469137417779234395126
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jan 24 03:14:36 UTC 2023
           Final Date: Sun Jan 23 03:14:35 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [1d:70:05:89:cc:1c:36:b3:c3:db:c3:24:6a:82:f0:8e:82:8c:42:30],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7e8218ba45fcbcb5784e2722623e087ec88c13ea
                       5b694c376a2dd27b1c548b068da6549403764180
                       654cbf69b1fc050e3ddb415cf337752a4da5d391
                       82b4126b8d9143e66d31305e48ce65857cc016e4
                       01ea6af928f922e990f1ce96b95c8522c7ad7da4
                       969649c91949046d9b853870bd7f3fdf35ef5118
                       48c1dffb21fd528fb7f4e4956fc9a342f947d726
                       4625cde5ac69932979a758efdcc72845d462440d
                       f4dbb18c1fe1779ccbd4b7a35a2fe47668b3232b
                       748db0a0644d59b1b32a5253bb57868ae18ece05
                       79c63f8722056f990f46fbb6694fdaddb8e65e8a
                       d912d3a540dde19b4c9605f1e395d16da19d3a1e
                       912bfe649edd7895204939c0f72304dc3d728792
                       5e30702541c8852b8d124f3966e46a7c99ae7941
                       8e929f3b96718456e60a56ce2ab10190e30a3bd5
                       ceab0cdfa5db320312a87ce598c36865e538c054
                       32361951ab81b6cfa5188ef8b9e0c6e248ae452d
                       5af71685bb20554fd7ccaef830ec2e259b94dcc0
                       cb6ad91125473d51fa9aae96a7697ab35c976000
                       c7ad1e04
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [2a:cf:a9:28:85:b8:f3:39:04:0f:52:5d:68:3a:ac:60:0a:8e:52:4d],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-24 05:47:07.234  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-24 05:47:07.236 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-24 05:47:07.239 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-24 05:47:07.240 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-24 05:47:07.240  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-24 05:47:07.241  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-24 05:47:07.241  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-24 05:47:07.242 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-24 05:47:07.242 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-24 05:47:07.242 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-24 05:47:07.246 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-24 05:47:07.247 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-24 05:47:07.247 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-24 05:47:07.248 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-24 05:47:07.492  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-24 05:47:07.493  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-24 05:47:07.493 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-24 05:47:07.494 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-24 05:47:07.496  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-24 05:47:07.496  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-24 05:47:07.497 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-24 05:47:07.497 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-24 05:47:07.498 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-24 05:47:07.499 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-24 05:47:07.500 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-24 05:47:07.500 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-24 05:47:07.501 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-24 05:47:07.501 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-24 05:47:07.502 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-24 05:47:07.503 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-24 05:47:07.507 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 615363494371566137961964144469137417779234395126
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jan 24 03:14:36 UTC 2023
           Final Date: Sun Jan 23 03:14:35 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [1d:70:05:89:cc:1c:36:b3:c3:db:c3:24:6a:82:f0:8e:82:8c:42:30],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7e8218ba45fcbcb5784e2722623e087ec88c13ea
                       5b694c376a2dd27b1c548b068da6549403764180
                       654cbf69b1fc050e3ddb415cf337752a4da5d391
                       82b4126b8d9143e66d31305e48ce65857cc016e4
                       01ea6af928f922e990f1ce96b95c8522c7ad7da4
                       969649c91949046d9b853870bd7f3fdf35ef5118
                       48c1dffb21fd528fb7f4e4956fc9a342f947d726
                       4625cde5ac69932979a758efdcc72845d462440d
                       f4dbb18c1fe1779ccbd4b7a35a2fe47668b3232b
                       748db0a0644d59b1b32a5253bb57868ae18ece05
                       79c63f8722056f990f46fbb6694fdaddb8e65e8a
                       d912d3a540dde19b4c9605f1e395d16da19d3a1e
                       912bfe649edd7895204939c0f72304dc3d728792
                       5e30702541c8852b8d124f3966e46a7c99ae7941
                       8e929f3b96718456e60a56ce2ab10190e30a3bd5
                       ceab0cdfa5db320312a87ce598c36865e538c054
                       32361951ab81b6cfa5188ef8b9e0c6e248ae452d
                       5af71685bb20554fd7ccaef830ec2e259b94dcc0
                       cb6ad91125473d51fa9aae96a7697ab35c976000
                       c7ad1e04
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [e1:98:6a:36:60:ab:50:ab:df:f9:07:59:a0:fb:af:6c:f5:47:1e:ce],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-24 05:54:20.803  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-24 05:54:20.804 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-24 05:54:20.806 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2023-01-24 05:54:20.807 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-24 05:54:20.807  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2023-01-24 05:54:20.808  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-24 05:54:20.808  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-24 05:54:20.808 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-24 05:54:20.809 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-24 05:54:20.809 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-24 05:54:20.813 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-24 05:54:20.813 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-24 05:54:20.814 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-24 05:54:20.814 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-24 05:54:21.102  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-24 05:54:21.102  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-24 05:54:21.103 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-24 05:54:21.103 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-24 05:54:21.104  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-24 05:54:21.104  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-24 05:54:21.105 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-24 05:54:21.106 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-24 05:54:21.106 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-24 05:54:21.108 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-24 05:54:21.108 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-24 05:54:21.108 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-24 05:54:21.109 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-24 05:54:21.109 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-24 05:54:21.110 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-24 05:54:21.110 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-24 05:54:21.113 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 615363494371566137961964144469137417779234395126
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jan 24 03:14:36 UTC 2023
           Final Date: Sun Jan 23 03:14:35 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [1d:70:05:89:cc:1c:36:b3:c3:db:c3:24:6a:82:f0:8e:82:8c:42:30],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7e8218ba45fcbcb5784e2722623e087ec88c13ea
                       5b694c376a2dd27b1c548b068da6549403764180
                       654cbf69b1fc050e3ddb415cf337752a4da5d391
                       82b4126b8d9143e66d31305e48ce65857cc016e4
                       01ea6af928f922e990f1ce96b95c8522c7ad7da4
                       969649c91949046d9b853870bd7f3fdf35ef5118
                       48c1dffb21fd528fb7f4e4956fc9a342f947d726
                       4625cde5ac69932979a758efdcc72845d462440d
                       f4dbb18c1fe1779ccbd4b7a35a2fe47668b3232b
                       748db0a0644d59b1b32a5253bb57868ae18ece05
                       79c63f8722056f990f46fbb6694fdaddb8e65e8a
                       d912d3a540dde19b4c9605f1e395d16da19d3a1e
                       912bfe649edd7895204939c0f72304dc3d728792
                       5e30702541c8852b8d124f3966e46a7c99ae7941
                       8e929f3b96718456e60a56ce2ab10190e30a3bd5
                       ceab0cdfa5db320312a87ce598c36865e538c054
                       32361951ab81b6cfa5188ef8b9e0c6e248ae452d
                       5af71685bb20554fd7ccaef830ec2e259b94dcc0
                       cb6ad91125473d51fa9aae96a7697ab35c976000
                       c7ad1e04
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ad:5f:66:81:a4:18:f1:46:bb:e9:0d:10:4c:a8:1c:e7:5a:ee:19:2a],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-24 06:02:15.598  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-24 06:02:15.602 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-24 06:02:15.606 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2023-01-24 06:02:15.607 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-24 06:02:15.607  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2023-01-24 06:02:15.608  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-24 06:02:15.609  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-24 06:02:15.609 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-24 06:02:15.610 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-24 06:02:15.611 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-24 06:02:15.624 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-24 06:02:15.625 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-24 06:02:15.625 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-24 06:02:15.626 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-24 06:02:16.100  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-24 06:02:16.101  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-24 06:02:16.101 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-24 06:02:16.102 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-24 06:02:16.103  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-24 06:02:16.103  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-24 06:02:16.104 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-24 06:02:16.104 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-24 06:02:16.104 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-24 06:02:16.105 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-24 06:02:16.105 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-24 06:02:16.106 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-24 06:02:16.106 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-24 06:02:16.107 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-24 06:02:16.107 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-24 06:02:16.108 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-24 06:02:16.111 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 615363494371566137961964144469137417779234395126
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jan 24 03:14:36 UTC 2023
           Final Date: Sun Jan 23 03:14:35 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [1d:70:05:89:cc:1c:36:b3:c3:db:c3:24:6a:82:f0:8e:82:8c:42:30],[56:66:d1:a4]
        modulus: 9e869a1c115bbe7ef5a9329d00fe50ef1bb1a2a1c66e89b88ac870953993c03711502d75b653cf8e51aa037ee6409b8ffbf490473d24137c20a3c36ab8943d7b5a9b9d9623d1d354108c6891f7c73743cec809869ff2e686dfdbad23b5367cdf9c71c75341fca4bf939822977dd3cd182a2acec35900ab2493cd13b91091a6fb5a2a166c13ed610ceecfb5461734dc4bc60eb8145c057ad69574c40a4a958a12fc2396082b8a874cba60d7b13212010870695f066a40394f35b8499cb85699b5887efd682b6cb9f99654e2255949e1e09f9b5b1a86e99544e909b4aac9504a769d02bc2fe8932823f767b077d5c232b167c3d69c88bdb49501ab5fa7663b50c95bb4fa08caab05272886dc8827479ee3a6bdf653bbfa44ba875d3bf50218eca728cf6edc184469209c5fd603c6c3ccf4506567fe8c6596d52eaab1d75c995f5e2d58da0b483d30a09e8c7ed15032095ae589ddc0958c8b54f0d0bd98e43431573fef0b8d587d0724a0daafdd149c7ffb315c1954b5bf5e3d058e058016d72a37
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7e8218ba45fcbcb5784e2722623e087ec88c13ea
                       5b694c376a2dd27b1c548b068da6549403764180
                       654cbf69b1fc050e3ddb415cf337752a4da5d391
                       82b4126b8d9143e66d31305e48ce65857cc016e4
                       01ea6af928f922e990f1ce96b95c8522c7ad7da4
                       969649c91949046d9b853870bd7f3fdf35ef5118
                       48c1dffb21fd528fb7f4e4956fc9a342f947d726
                       4625cde5ac69932979a758efdcc72845d462440d
                       f4dbb18c1fe1779ccbd4b7a35a2fe47668b3232b
                       748db0a0644d59b1b32a5253bb57868ae18ece05
                       79c63f8722056f990f46fbb6694fdaddb8e65e8a
                       d912d3a540dde19b4c9605f1e395d16da19d3a1e
                       912bfe649edd7895204939c0f72304dc3d728792
                       5e30702541c8852b8d124f3966e46a7c99ae7941
                       8e929f3b96718456e60a56ce2ab10190e30a3bd5
                       ceab0cdfa5db320312a87ce598c36865e538c054
                       32361951ab81b6cfa5188ef8b9e0c6e248ae452d
                       5af71685bb20554fd7ccaef830ec2e259b94dcc0
                       cb6ad91125473d51fa9aae96a7697ab35c976000
                       c7ad1e04
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [88:b2:6f:82:40:f7:1e:63:b8:c1:61:10:72:b0:7e:00:32:48:9f:e3],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-24 06:02:48.801  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-24 06:02:48.802 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-24 06:02:48.804 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2023-01-24 06:02:48.804 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-24 06:02:48.805  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2023-01-24 06:02:48.806  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-24 06:02:48.806  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-24 06:02:48.807 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-24 06:02:48.807 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-24 06:02:48.807 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-24 06:02:48.811 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-24 06:02:48.812 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-24 06:02:48.812 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-24 06:02:48.812 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-24 06:02:49.052  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-24 06:02:49.052  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-24 06:02:49.052 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-24 06:02:49.053 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-24 06:02:49.054  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-24 06:02:49.054  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-24 06:02:49.054 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-24 06:02:49.055 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-24 06:02:49.055 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-24 06:02:49.056 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-24 06:02:49.056 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-24 06:02:49.056 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-24 06:02:49.057 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-24 06:02:49.057 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-24 06:02:49.057 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-24 06:02:49.058 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-24 06:02:49.060 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 615363494371566137961964144469137417779234395126
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jan 24 03:14:36 UTC 2023
           Final Date: Sun Jan 23 03:14:35 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [1d:70:05:89:cc:1c:36:b3:c3:db:c3:24:6a:82:f0:8e:82:8c:42:30],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7e8218ba45fcbcb5784e2722623e087ec88c13ea
                       5b694c376a2dd27b1c548b068da6549403764180
                       654cbf69b1fc050e3ddb415cf337752a4da5d391
                       82b4126b8d9143e66d31305e48ce65857cc016e4
                       01ea6af928f922e990f1ce96b95c8522c7ad7da4
                       969649c91949046d9b853870bd7f3fdf35ef5118
                       48c1dffb21fd528fb7f4e4956fc9a342f947d726
                       4625cde5ac69932979a758efdcc72845d462440d
                       f4dbb18c1fe1779ccbd4b7a35a2fe47668b3232b
                       748db0a0644d59b1b32a5253bb57868ae18ece05
                       79c63f8722056f990f46fbb6694fdaddb8e65e8a
                       d912d3a540dde19b4c9605f1e395d16da19d3a1e
                       912bfe649edd7895204939c0f72304dc3d728792
                       5e30702541c8852b8d124f3966e46a7c99ae7941
                       8e929f3b96718456e60a56ce2ab10190e30a3bd5
                       ceab0cdfa5db320312a87ce598c36865e538c054
                       32361951ab81b6cfa5188ef8b9e0c6e248ae452d
                       5af71685bb20554fd7ccaef830ec2e259b94dcc0
                       cb6ad91125473d51fa9aae96a7697ab35c976000
                       c7ad1e04
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [aa:6a:10:c1:3c:5e:4e:b4:17:73:76:34:e4:ba:ed:1a:0f:c7:cb:76],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-24 06:31:36.812  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-24 06:31:36.815 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-24 06:31:36.818 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2023-01-24 06:31:36.819 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-24 06:31:36.819  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2023-01-24 06:31:36.820  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-24 06:31:36.821  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-24 06:31:36.821 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-24 06:31:36.822 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-24 06:31:36.822 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-24 06:31:36.826 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-24 06:31:36.827 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-24 06:31:36.828 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-24 06:31:36.828 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-24 06:31:37.211  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-24 06:31:37.212  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-24 06:31:37.212 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-24 06:31:37.213 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-24 06:31:37.214  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-24 06:31:37.214  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-24 06:31:37.214 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-24 06:31:37.215 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-24 06:31:37.215 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-24 06:31:37.216 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-24 06:31:37.216 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-24 06:31:37.216 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-24 06:31:37.217 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-24 06:31:37.217 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-24 06:31:37.217 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-24 06:31:37.218 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-24 06:31:37.221 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 615363494371566137961964144469137417779234395126
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jan 24 03:14:36 UTC 2023
           Final Date: Sun Jan 23 03:14:35 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [1d:70:05:89:cc:1c:36:b3:c3:db:c3:24:6a:82:f0:8e:82:8c:42:30],[56:66:d1:a4]
        modulus: 9e869a1c115bbe7ef5a9329d00fe50ef1bb1a2a1c66e89b88ac870953993c03711502d75b653cf8e51aa037ee6409b8ffbf490473d24137c20a3c36ab8943d7b5a9b9d9623d1d354108c6891f7c73743cec809869ff2e686dfdbad23b5367cdf9c71c75341fca4bf939822977dd3cd182a2acec35900ab2493cd13b91091a6fb5a2a166c13ed610ceecfb5461734dc4bc60eb8145c057ad69574c40a4a958a12fc2396082b8a874cba60d7b13212010870695f066a40394f35b8499cb85699b5887efd682b6cb9f99654e2255949e1e09f9b5b1a86e99544e909b4aac9504a769d02bc2fe8932823f767b077d5c232b167c3d69c88bdb49501ab5fa7663b50c95bb4fa08caab05272886dc8827479ee3a6bdf653bbfa44ba875d3bf50218eca728cf6edc184469209c5fd603c6c3ccf4506567fe8c6596d52eaab1d75c995f5e2d58da0b483d30a09e8c7ed15032095ae589ddc0958c8b54f0d0bd98e43431573fef0b8d587d0724a0daafdd149c7ffb315c1954b5bf5e3d058e058016d72a37
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7e8218ba45fcbcb5784e2722623e087ec88c13ea
                       5b694c376a2dd27b1c548b068da6549403764180
                       654cbf69b1fc050e3ddb415cf337752a4da5d391
                       82b4126b8d9143e66d31305e48ce65857cc016e4
                       01ea6af928f922e990f1ce96b95c8522c7ad7da4
                       969649c91949046d9b853870bd7f3fdf35ef5118
                       48c1dffb21fd528fb7f4e4956fc9a342f947d726
                       4625cde5ac69932979a758efdcc72845d462440d
                       f4dbb18c1fe1779ccbd4b7a35a2fe47668b3232b
                       748db0a0644d59b1b32a5253bb57868ae18ece05
                       79c63f8722056f990f46fbb6694fdaddb8e65e8a
                       d912d3a540dde19b4c9605f1e395d16da19d3a1e
                       912bfe649edd7895204939c0f72304dc3d728792
                       5e30702541c8852b8d124f3966e46a7c99ae7941
                       8e929f3b96718456e60a56ce2ab10190e30a3bd5
                       ceab0cdfa5db320312a87ce598c36865e538c054
                       32361951ab81b6cfa5188ef8b9e0c6e248ae452d
                       5af71685bb20554fd7ccaef830ec2e259b94dcc0
                       cb6ad91125473d51fa9aae96a7697ab35c976000
                       c7ad1e04
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [02:1a:fb:a9:6a:53:36:d9:11:28:46:04:45:6d:07:f8:eb:6b:e4:61],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-24 06:31:45.124  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-24 06:31:45.125 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-24 06:31:45.126 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2023-01-24 06:31:45.127 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-24 06:31:45.127  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2023-01-24 06:31:45.127  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-24 06:31:45.128  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-24 06:31:45.128 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-24 06:31:45.128 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-24 06:31:45.129 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-24 06:31:45.132 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-24 06:31:45.132 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-24 06:31:45.133 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-24 06:31:45.133 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-24 06:31:45.305  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-24 06:31:45.306  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-24 06:31:45.307 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-24 06:31:45.307 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-24 06:31:45.308  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-24 06:31:45.309  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-24 06:31:45.309 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-24 06:31:45.309 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-24 06:31:45.310 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-24 06:31:45.311 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-24 06:31:45.312 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-24 06:31:45.312 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-24 06:31:45.312 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-24 06:31:45.313 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-24 06:31:45.313 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-24 06:31:45.314 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-24 06:31:45.318 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 615363494371566137961964144469137417779234395126
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jan 24 03:14:36 UTC 2023
           Final Date: Sun Jan 23 03:14:35 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [1d:70:05:89:cc:1c:36:b3:c3:db:c3:24:6a:82:f0:8e:82:8c:42:30],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7e8218ba45fcbcb5784e2722623e087ec88c13ea
                       5b694c376a2dd27b1c548b068da6549403764180
                       654cbf69b1fc050e3ddb415cf337752a4da5d391
                       82b4126b8d9143e66d31305e48ce65857cc016e4
                       01ea6af928f922e990f1ce96b95c8522c7ad7da4
                       969649c91949046d9b853870bd7f3fdf35ef5118
                       48c1dffb21fd528fb7f4e4956fc9a342f947d726
                       4625cde5ac69932979a758efdcc72845d462440d
                       f4dbb18c1fe1779ccbd4b7a35a2fe47668b3232b
                       748db0a0644d59b1b32a5253bb57868ae18ece05
                       79c63f8722056f990f46fbb6694fdaddb8e65e8a
                       d912d3a540dde19b4c9605f1e395d16da19d3a1e
                       912bfe649edd7895204939c0f72304dc3d728792
                       5e30702541c8852b8d124f3966e46a7c99ae7941
                       8e929f3b96718456e60a56ce2ab10190e30a3bd5
                       ceab0cdfa5db320312a87ce598c36865e538c054
                       32361951ab81b6cfa5188ef8b9e0c6e248ae452d
                       5af71685bb20554fd7ccaef830ec2e259b94dcc0
                       cb6ad91125473d51fa9aae96a7697ab35c976000
                       c7ad1e04
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [d2:44:bd:50:30:4e:ab:c2:7f:fb:29:c8:0e:50:fb:1a:df:7f:52:e0],[56:66:d1:a4]
        modulus: b80d364529cb33b0dcc85a437108d0e0ba84558b5340f597371689d6aa9d8e1e0f9071c10ae46b28f5c59eb82a4dc6fb107166610a2985e764b14bad2ac6bf2ee1950eb11e9f3faa9345101f58e9e57fd49cba043bb482bfa3ab3af2e2da7444dde4183a2a7ea335709d2b3079507bef91fd5d3c32d22a0c53b7407901f179ac186e35ae0449b9ac6f64e4c09d19771f90815c9716a81fc802d4c8ade7b8f105affb28ca7c5d9592388618512cb8a7fd4b0fcc9b034050dfa78a2d584bcedff9fe397b464823d262528c3c06163ff8041fcc1ff97d468f1677391865ab3cefcb771d8ca036473dedfa59b31e7fe6454089d346e4988e8ba776b4efdc009d1f65
public exponent: 10001

]