Results

By type

          2023-01-31 04:14:03,617 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2023-01-31 04:14:04,579 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2023-01-31 04:14:05.368  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Jan 31, 2023 4:14:07 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Jan 31, 2023 4:14:07 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Jan 31, 2023 4:14:07 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Jan 31, 2023 4:14:07 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2023-01-31 04:14:07.835 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2023-01-31 04:14:08.124  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2023-01-31 04:14:08.314  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2023-01-31 04:14:09.043 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2023-01-31 04:14:09.047 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
2023-01-31 04:14:09.050 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2023-01-31 04:14:09.054 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2023-01-31 04:14:09.105 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2023-01-31 04:14:09.110 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/docs]}: redirectToUi(HttpServletRequest)
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
2023-01-31 04:14:09.240 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2023-01-31 04:14:09.950 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Jan 31, 2023 4:14:10 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2023-01-31 04:14:10.861  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 8.175 seconds (JVM running for 10.076)
Jan 31, 2023 4:14:31 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2023-01-31 04:15:24.548  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-31 04:15:24.555 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-31 04:15:24.598 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2023-01-31 04:15:24.601 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-31 04:15:24.620  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2023-01-31 04:15:24.622  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-31 04:15:24.623  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-31 04:15:24.624 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-31 04:15:24.624 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-31 04:15:24.628 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-31 04:15:24.636 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-31 04:15:24.640 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-31 04:15:24.688 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-31 04:15:24.694 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-31 04:15:24.694 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-31 04:15:24.697 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-31 04:15:25.683  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-31 04:15:25.685  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-31 04:15:25.686 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-31 04:15:25.687 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-31 04:15:25.699  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-31 04:15:25.701  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-31 04:15:25.701 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-31 04:15:25.702 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-31 04:15:25.702 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-31 04:15:25.717 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-31 04:15:25.718 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-31 04:15:25.718 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-31 04:15:25.723 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-31 04:15:25.724 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-31 04:15:25.724 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-31 04:15:25.726 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-31 04:15:25.758 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 347581487814459325473079440296624212067175048515
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jan 31 04:05:27 UTC 2023
           Final Date: Sun Jan 30 04:05:26 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [1a:80:cf:5a:e7:a7:98:31:25:c1:ab:6a:c1:eb:21:ff:ba:3a:3a:9b],[56:66:d1:a4]
        modulus: d3627ba0f88392649fd7f3cc976ae1d3a00e9185567c2d55a0214776f677387d55176a92ff73054c4081b6db463378cde606dc2f31ff78dea451e1268c1f1e9e68e670198d027fbb3ba358f96480f8adcf342cffbafe3d71d4aec2e58c7d1b3d76b2ee2c4ffca546aa5998c08f56fa27fabdc41e93228d06b9b1c40cd5a57e54d4edeb05b69b354757bfb630cd80679d3f2e796ccfecfe8d7e67c5f5595327668ddccda52ec14541e1451ec32e17db0b714d44ed8282350bed13f80c77518e20b8eebf3c80f4e1d65b47c881e267c81abc2e0891a8fdcd4495fc22444ba8c814d75d6239045845dabce11328ca4dd9cc87f8d8cbdb21c95af08fc15ecc8a0a967cf38e78966d662fcdc63676f01aaded1615f47e77ccc3beee93a94dafb7599a49d08d2ba026ecfcc20a28074ea1507c1e2bb5bedac2ab76ca9743efc2d6c59a812d243d837b69aec5a850a7d1f02e7c93bf1499daea71ff0500892acc10e42401d53d4e89ccb0a4f6add4897f1863156372e81ded8d2c6e8c4c8494e0730731
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8cdb288cfd7c5f3d9b403448e3c2c07ec7a059f6
                       57686c08febb62628f3f2c0c29fac9f5f0d6b642
                       b42e6120851fd270d28f6b1930c4fdf1be98c967
                       c888083f103bf629cb1422e8158ea3d793c9d116
                       a410b2db30b4384a33df1b3f18a2f6f83582dc8e
                       8cba17d3cbceb8cfad9f4565cd056076d03440fe
                       60c5f5a3ea67eeeaa410b899166303a51d3537bd
                       a17ea124c57f4e1a1d9ffece1d58f9bcb6b60054
                       cd42ac1593c0725e926ac0e23eec05d95d63aa4d
                       94417d340a42b48ad8e0ca5bd3e51a013e783843
                       e7dc53f5b5c4aaf808f07f3b0a3c527457060aa2
                       890487d31a0b65ac2d041c48f68fde7475c0e55b
                       3cc966a69a532d797cae34a0958f719aea49310a
                       d239e814e0518d526a5485ab0e021a4871be9576
                       9d1f09bd0c08cddc6a20026d722ab6b224b06b2c
                       e60f0cef1f6376f9d3160efdb4d0b7cba1c68183
                       dda4443ae4abc32321beb480e0a94f480735dbe2
                       8c13e1b35f09256587e80112b578e7355f07576b
                       616b4e2d44ab0c225e679dde24afadd13360b041
                       8ba8b965
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [b7:8f:81:53:de:ed:8c:c5:76:81:1a:7d:09:0c:43:05:dc:46:50:d1],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-31 08:14:25.475  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-31 08:14:25.479 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-31 08:14:25.483 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-31 08:14:25.484 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-31 08:14:25.485  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-31 08:14:25.487  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-31 08:14:25.488  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-31 08:14:25.488 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-31 08:14:25.489 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-31 08:14:25.490 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-31 08:14:25.497 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-31 08:14:25.498 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-31 08:14:25.499 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-31 08:14:25.499 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-31 08:14:26.132  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-31 08:14:26.133  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-31 08:14:26.134 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-31 08:14:26.134 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-31 08:14:26.137  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-31 08:14:26.138  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-31 08:14:26.139 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-31 08:14:26.139 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-31 08:14:26.140 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-31 08:14:26.141 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-31 08:14:26.141 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-31 08:14:26.142 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-31 08:14:26.143 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-31 08:14:26.143 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-31 08:14:26.144 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-31 08:14:26.145 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-31 08:14:26.150 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 347581487814459325473079440296624212067175048515
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jan 31 04:05:27 UTC 2023
           Final Date: Sun Jan 30 04:05:26 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [1a:80:cf:5a:e7:a7:98:31:25:c1:ab:6a:c1:eb:21:ff:ba:3a:3a:9b],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8cdb288cfd7c5f3d9b403448e3c2c07ec7a059f6
                       57686c08febb62628f3f2c0c29fac9f5f0d6b642
                       b42e6120851fd270d28f6b1930c4fdf1be98c967
                       c888083f103bf629cb1422e8158ea3d793c9d116
                       a410b2db30b4384a33df1b3f18a2f6f83582dc8e
                       8cba17d3cbceb8cfad9f4565cd056076d03440fe
                       60c5f5a3ea67eeeaa410b899166303a51d3537bd
                       a17ea124c57f4e1a1d9ffece1d58f9bcb6b60054
                       cd42ac1593c0725e926ac0e23eec05d95d63aa4d
                       94417d340a42b48ad8e0ca5bd3e51a013e783843
                       e7dc53f5b5c4aaf808f07f3b0a3c527457060aa2
                       890487d31a0b65ac2d041c48f68fde7475c0e55b
                       3cc966a69a532d797cae34a0958f719aea49310a
                       d239e814e0518d526a5485ab0e021a4871be9576
                       9d1f09bd0c08cddc6a20026d722ab6b224b06b2c
                       e60f0cef1f6376f9d3160efdb4d0b7cba1c68183
                       dda4443ae4abc32321beb480e0a94f480735dbe2
                       8c13e1b35f09256587e80112b578e7355f07576b
                       616b4e2d44ab0c225e679dde24afadd13360b041
                       8ba8b965
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [2c:9b:0a:d8:88:50:65:f5:34:8d:72:71:6b:84:5f:c1:ec:1d:bd:62],[56:66:d1:a4]
        modulus: a9086ce27f9a3295f3c9ccaf361c0004b710b4e718c9719efa77767d535b9a230012684aa90d07b23098ae1c4b1281f0cc3183161c938a8cec4edf1efb7af7cbda5f67435b6caa1a82209ead4b7cdf418ac276488612a28346f79d46a6a399ff4ac50c0cd2b75060fb4c906aab4149395681eb0f5be1dd279dd7b83f7aefd4da4df8ad745100643626881f57ba33e7f77ae5950158b8590f549d71b4b33f5d8ec71d2cab2304df7a32e039325af6aaf759f3b3272b66390b145f7bd9fd71d13f989c8c82523fafe1facc66e118a6f6bbcda9885efed469292882003144314132bfcaf186092c3a0ccb9d46127241291c8c1ac38ed6e549085e009c2bb3b7c685
public exponent: 10001

] 
2023-01-31 08:26:06.295  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-31 08:26:06.299 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-31 08:26:06.303 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-31 08:26:06.304 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-31 08:26:06.305  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-31 08:26:06.306  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-31 08:26:06.307  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-31 08:26:06.308 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-31 08:26:06.309 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-31 08:26:06.310 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-31 08:26:06.316 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-31 08:26:06.317 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-31 08:26:06.318 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-31 08:26:06.318 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-31 08:26:06.547  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-31 08:26:06.548  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-31 08:26:06.549 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-31 08:26:06.550 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-31 08:26:06.552  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-31 08:26:06.553  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-31 08:26:06.553 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-31 08:26:06.554 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-31 08:26:06.554 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-31 08:26:06.556 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-31 08:26:06.556 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-31 08:26:06.557 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-31 08:26:06.558 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-31 08:26:06.558 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-31 08:26:06.559 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-31 08:26:06.560 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-31 08:26:06.565 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 347581487814459325473079440296624212067175048515
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jan 31 04:05:27 UTC 2023
           Final Date: Sun Jan 30 04:05:26 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [1a:80:cf:5a:e7:a7:98:31:25:c1:ab:6a:c1:eb:21:ff:ba:3a:3a:9b],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8cdb288cfd7c5f3d9b403448e3c2c07ec7a059f6
                       57686c08febb62628f3f2c0c29fac9f5f0d6b642
                       b42e6120851fd270d28f6b1930c4fdf1be98c967
                       c888083f103bf629cb1422e8158ea3d793c9d116
                       a410b2db30b4384a33df1b3f18a2f6f83582dc8e
                       8cba17d3cbceb8cfad9f4565cd056076d03440fe
                       60c5f5a3ea67eeeaa410b899166303a51d3537bd
                       a17ea124c57f4e1a1d9ffece1d58f9bcb6b60054
                       cd42ac1593c0725e926ac0e23eec05d95d63aa4d
                       94417d340a42b48ad8e0ca5bd3e51a013e783843
                       e7dc53f5b5c4aaf808f07f3b0a3c527457060aa2
                       890487d31a0b65ac2d041c48f68fde7475c0e55b
                       3cc966a69a532d797cae34a0958f719aea49310a
                       d239e814e0518d526a5485ab0e021a4871be9576
                       9d1f09bd0c08cddc6a20026d722ab6b224b06b2c
                       e60f0cef1f6376f9d3160efdb4d0b7cba1c68183
                       dda4443ae4abc32321beb480e0a94f480735dbe2
                       8c13e1b35f09256587e80112b578e7355f07576b
                       616b4e2d44ab0c225e679dde24afadd13360b041
                       8ba8b965
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [f0:ad:a4:7b:60:b1:de:87:6c:dd:de:5a:de:91:29:e5:49:a3:7c:cd],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-31 08:27:27.304  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-31 08:27:27.305 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-31 08:27:27.307 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2023-01-31 08:27:27.319 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-31 08:27:27.320  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2023-01-31 08:27:27.320  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-31 08:27:27.321  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-31 08:27:27.321 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-31 08:27:27.321 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-31 08:27:27.322 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-31 08:27:27.327 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-31 08:27:27.328 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-31 08:27:27.328 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-31 08:27:27.329 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-31 08:27:27.598  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-31 08:27:27.598  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-31 08:27:27.599 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-31 08:27:27.599 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-31 08:27:27.601  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-31 08:27:27.602  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-31 08:27:27.602 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-31 08:27:27.603 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-31 08:27:27.603 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-31 08:27:27.604 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-31 08:27:27.604 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-31 08:27:27.604 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-31 08:27:27.605 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-31 08:27:27.605 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-31 08:27:27.606 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-31 08:27:27.607 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-31 08:27:27.612 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 347581487814459325473079440296624212067175048515
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jan 31 04:05:27 UTC 2023
           Final Date: Sun Jan 30 04:05:26 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [1a:80:cf:5a:e7:a7:98:31:25:c1:ab:6a:c1:eb:21:ff:ba:3a:3a:9b],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8cdb288cfd7c5f3d9b403448e3c2c07ec7a059f6
                       57686c08febb62628f3f2c0c29fac9f5f0d6b642
                       b42e6120851fd270d28f6b1930c4fdf1be98c967
                       c888083f103bf629cb1422e8158ea3d793c9d116
                       a410b2db30b4384a33df1b3f18a2f6f83582dc8e
                       8cba17d3cbceb8cfad9f4565cd056076d03440fe
                       60c5f5a3ea67eeeaa410b899166303a51d3537bd
                       a17ea124c57f4e1a1d9ffece1d58f9bcb6b60054
                       cd42ac1593c0725e926ac0e23eec05d95d63aa4d
                       94417d340a42b48ad8e0ca5bd3e51a013e783843
                       e7dc53f5b5c4aaf808f07f3b0a3c527457060aa2
                       890487d31a0b65ac2d041c48f68fde7475c0e55b
                       3cc966a69a532d797cae34a0958f719aea49310a
                       d239e814e0518d526a5485ab0e021a4871be9576
                       9d1f09bd0c08cddc6a20026d722ab6b224b06b2c
                       e60f0cef1f6376f9d3160efdb4d0b7cba1c68183
                       dda4443ae4abc32321beb480e0a94f480735dbe2
                       8c13e1b35f09256587e80112b578e7355f07576b
                       616b4e2d44ab0c225e679dde24afadd13360b041
                       8ba8b965
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [e1:3c:cf:cf:16:a6:7b:29:73:87:ba:49:04:c0:c8:90:3c:70:77:f8],[56:66:d1:a4]
        modulus: 920d02c91069c0f0146e2b10a45feee16687cbeac6ec4cb48bf7033825f2a9b854def56f0b94066a04286743a38c46ad49f38d4ed8af49848a7d1642975066d350a596c2f073718eb86a908a852ac9443c78b49770e6a3294de0be6b4c2457f031668e4c1531e50f4d6351a356291968d92263d742743f42a872dd053ac23e405605a18ede79bbeb1303b859d9d088f03728bf2ea75d0339259970b7f98a039b13a79b823c43e473cff2931e357fe72d11089d4c55c28681f5b76225dcefe0f89a8dc0bb06bf7956d898f1910380a71b63bfb142414791407c993f0824fa226958d955aadcb9855adf8ec48c039f5afaf829e922908f907dafd4a9815b1ac111
public exponent: 10001

] 
2023-01-31 08:31:27.479  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-31 08:31:27.481 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-31 08:31:27.482 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2023-01-31 08:31:27.483 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-31 08:31:27.483  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2023-01-31 08:31:27.483  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-31 08:31:27.484  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-31 08:31:27.484 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-31 08:31:27.485 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-31 08:31:27.485 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-31 08:31:27.489 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-31 08:31:27.489 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-31 08:31:27.490 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-31 08:31:27.490 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-31 08:31:27.876  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-31 08:31:27.876  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-31 08:31:27.877 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-31 08:31:27.877 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-31 08:31:27.878  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-31 08:31:27.879  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-31 08:31:27.879 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-31 08:31:27.880 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-31 08:31:27.880 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-31 08:31:27.881 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-31 08:31:27.881 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-31 08:31:27.881 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-31 08:31:27.882 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-31 08:31:27.882 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-31 08:31:27.883 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-31 08:31:27.883 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-31 08:31:27.886 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 347581487814459325473079440296624212067175048515
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jan 31 04:05:27 UTC 2023
           Final Date: Sun Jan 30 04:05:26 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [1a:80:cf:5a:e7:a7:98:31:25:c1:ab:6a:c1:eb:21:ff:ba:3a:3a:9b],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8cdb288cfd7c5f3d9b403448e3c2c07ec7a059f6
                       57686c08febb62628f3f2c0c29fac9f5f0d6b642
                       b42e6120851fd270d28f6b1930c4fdf1be98c967
                       c888083f103bf629cb1422e8158ea3d793c9d116
                       a410b2db30b4384a33df1b3f18a2f6f83582dc8e
                       8cba17d3cbceb8cfad9f4565cd056076d03440fe
                       60c5f5a3ea67eeeaa410b899166303a51d3537bd
                       a17ea124c57f4e1a1d9ffece1d58f9bcb6b60054
                       cd42ac1593c0725e926ac0e23eec05d95d63aa4d
                       94417d340a42b48ad8e0ca5bd3e51a013e783843
                       e7dc53f5b5c4aaf808f07f3b0a3c527457060aa2
                       890487d31a0b65ac2d041c48f68fde7475c0e55b
                       3cc966a69a532d797cae34a0958f719aea49310a
                       d239e814e0518d526a5485ab0e021a4871be9576
                       9d1f09bd0c08cddc6a20026d722ab6b224b06b2c
                       e60f0cef1f6376f9d3160efdb4d0b7cba1c68183
                       dda4443ae4abc32321beb480e0a94f480735dbe2
                       8c13e1b35f09256587e80112b578e7355f07576b
                       616b4e2d44ab0c225e679dde24afadd13360b041
                       8ba8b965
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [01:ef:d1:7a:54:25:94:87:7c:87:f2:01:bf:14:72:15:bc:9f:f6:03],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-31 08:35:00.518  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-31 08:35:00.520 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-31 08:35:00.523 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-31 08:35:00.524 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-31 08:35:00.524  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-31 08:35:00.525  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-31 08:35:00.525  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-31 08:35:00.526 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-31 08:35:00.527 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-31 08:35:00.527 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-31 08:35:00.532 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-31 08:35:00.534 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-31 08:35:00.534 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-31 08:35:00.536 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-31 08:35:00.776  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-31 08:35:00.777  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-31 08:35:00.777 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-31 08:35:00.777 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-31 08:35:00.779  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-31 08:35:00.779  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-31 08:35:00.779 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-31 08:35:00.780 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-31 08:35:00.780 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-31 08:35:00.781 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-31 08:35:00.781 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-31 08:35:00.781 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-31 08:35:00.782 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-31 08:35:00.782 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-31 08:35:00.782 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-31 08:35:00.783 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-31 08:35:00.786 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 347581487814459325473079440296624212067175048515
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jan 31 04:05:27 UTC 2023
           Final Date: Sun Jan 30 04:05:26 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [1a:80:cf:5a:e7:a7:98:31:25:c1:ab:6a:c1:eb:21:ff:ba:3a:3a:9b],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8cdb288cfd7c5f3d9b403448e3c2c07ec7a059f6
                       57686c08febb62628f3f2c0c29fac9f5f0d6b642
                       b42e6120851fd270d28f6b1930c4fdf1be98c967
                       c888083f103bf629cb1422e8158ea3d793c9d116
                       a410b2db30b4384a33df1b3f18a2f6f83582dc8e
                       8cba17d3cbceb8cfad9f4565cd056076d03440fe
                       60c5f5a3ea67eeeaa410b899166303a51d3537bd
                       a17ea124c57f4e1a1d9ffece1d58f9bcb6b60054
                       cd42ac1593c0725e926ac0e23eec05d95d63aa4d
                       94417d340a42b48ad8e0ca5bd3e51a013e783843
                       e7dc53f5b5c4aaf808f07f3b0a3c527457060aa2
                       890487d31a0b65ac2d041c48f68fde7475c0e55b
                       3cc966a69a532d797cae34a0958f719aea49310a
                       d239e814e0518d526a5485ab0e021a4871be9576
                       9d1f09bd0c08cddc6a20026d722ab6b224b06b2c
                       e60f0cef1f6376f9d3160efdb4d0b7cba1c68183
                       dda4443ae4abc32321beb480e0a94f480735dbe2
                       8c13e1b35f09256587e80112b578e7355f07576b
                       616b4e2d44ab0c225e679dde24afadd13360b041
                       8ba8b965
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [82:b0:ec:b0:c3:d7:dd:55:af:5c:ea:a0:6c:17:06:85:1d:43:06:bd],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-31 08:46:30.925  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-31 08:46:30.930 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-31 08:46:30.934 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-31 08:46:30.936 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-31 08:46:30.937  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-31 08:46:30.938  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-31 08:46:30.939  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-31 08:46:30.939 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-31 08:46:30.940 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-31 08:46:30.940 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-31 08:46:30.945 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-31 08:46:30.947 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-31 08:46:30.948 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-31 08:46:30.948 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-31 08:46:31.160  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-31 08:46:31.161  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-31 08:46:31.161 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-31 08:46:31.162 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-31 08:46:31.163  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-31 08:46:31.164  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-31 08:46:31.164 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-31 08:46:31.165 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-31 08:46:31.165 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-31 08:46:31.166 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-31 08:46:31.166 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-31 08:46:31.167 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-31 08:46:31.168 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-31 08:46:31.168 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-31 08:46:31.169 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-31 08:46:31.169 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-31 08:46:31.173 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 347581487814459325473079440296624212067175048515
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jan 31 04:05:27 UTC 2023
           Final Date: Sun Jan 30 04:05:26 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [1a:80:cf:5a:e7:a7:98:31:25:c1:ab:6a:c1:eb:21:ff:ba:3a:3a:9b],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8cdb288cfd7c5f3d9b403448e3c2c07ec7a059f6
                       57686c08febb62628f3f2c0c29fac9f5f0d6b642
                       b42e6120851fd270d28f6b1930c4fdf1be98c967
                       c888083f103bf629cb1422e8158ea3d793c9d116
                       a410b2db30b4384a33df1b3f18a2f6f83582dc8e
                       8cba17d3cbceb8cfad9f4565cd056076d03440fe
                       60c5f5a3ea67eeeaa410b899166303a51d3537bd
                       a17ea124c57f4e1a1d9ffece1d58f9bcb6b60054
                       cd42ac1593c0725e926ac0e23eec05d95d63aa4d
                       94417d340a42b48ad8e0ca5bd3e51a013e783843
                       e7dc53f5b5c4aaf808f07f3b0a3c527457060aa2
                       890487d31a0b65ac2d041c48f68fde7475c0e55b
                       3cc966a69a532d797cae34a0958f719aea49310a
                       d239e814e0518d526a5485ab0e021a4871be9576
                       9d1f09bd0c08cddc6a20026d722ab6b224b06b2c
                       e60f0cef1f6376f9d3160efdb4d0b7cba1c68183
                       dda4443ae4abc32321beb480e0a94f480735dbe2
                       8c13e1b35f09256587e80112b578e7355f07576b
                       616b4e2d44ab0c225e679dde24afadd13360b041
                       8ba8b965
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [a2:78:e0:43:30:e7:bc:29:84:44:98:ad:3c:ac:94:6b:5a:8d:fc:02],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-31 08:53:56.695  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-31 08:53:56.697 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-31 08:53:56.700 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-31 08:53:56.701 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-31 08:53:56.702  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-31 08:53:56.702  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-31 08:53:56.703  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-31 08:53:56.703 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-31 08:53:56.704 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-31 08:53:56.704 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-31 08:53:56.709 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-31 08:53:56.710 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-31 08:53:56.710 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-31 08:53:56.710 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-31 08:53:56.979  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-31 08:53:56.980  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-31 08:53:56.980 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-31 08:53:56.980 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-31 08:53:56.982  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-31 08:53:56.982  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-31 08:53:56.982 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-31 08:53:56.983 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-31 08:53:56.983 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-31 08:53:56.984 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-31 08:53:56.984 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-31 08:53:56.984 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-31 08:53:56.985 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-31 08:53:56.985 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-31 08:53:56.986 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-31 08:53:56.986 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-31 08:53:56.990 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 347581487814459325473079440296624212067175048515
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jan 31 04:05:27 UTC 2023
           Final Date: Sun Jan 30 04:05:26 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [1a:80:cf:5a:e7:a7:98:31:25:c1:ab:6a:c1:eb:21:ff:ba:3a:3a:9b],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8cdb288cfd7c5f3d9b403448e3c2c07ec7a059f6
                       57686c08febb62628f3f2c0c29fac9f5f0d6b642
                       b42e6120851fd270d28f6b1930c4fdf1be98c967
                       c888083f103bf629cb1422e8158ea3d793c9d116
                       a410b2db30b4384a33df1b3f18a2f6f83582dc8e
                       8cba17d3cbceb8cfad9f4565cd056076d03440fe
                       60c5f5a3ea67eeeaa410b899166303a51d3537bd
                       a17ea124c57f4e1a1d9ffece1d58f9bcb6b60054
                       cd42ac1593c0725e926ac0e23eec05d95d63aa4d
                       94417d340a42b48ad8e0ca5bd3e51a013e783843
                       e7dc53f5b5c4aaf808f07f3b0a3c527457060aa2
                       890487d31a0b65ac2d041c48f68fde7475c0e55b
                       3cc966a69a532d797cae34a0958f719aea49310a
                       d239e814e0518d526a5485ab0e021a4871be9576
                       9d1f09bd0c08cddc6a20026d722ab6b224b06b2c
                       e60f0cef1f6376f9d3160efdb4d0b7cba1c68183
                       dda4443ae4abc32321beb480e0a94f480735dbe2
                       8c13e1b35f09256587e80112b578e7355f07576b
                       616b4e2d44ab0c225e679dde24afadd13360b041
                       8ba8b965
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [49:ae:86:6c:d4:92:a3:86:0f:10:fe:fa:06:2f:ec:b7:e9:95:ad:14],[56:66:d1:a4]
        modulus: e8e5024d8540ecddafe5be9ce8558fe759d57d4e37d560b25700f57b6de3cfaf56d6218f2445dd696ac33180b61f5546b4a664b2784ad806d99af3dc1d62267ba6018987e7980481afcedcadf0f5d5f76af57e359d28c6d12c0e8016c183ddb677f235d67a311f3f450b36d04c5312b157d9d11b6a55e7d479326cd31b1c0fb55b6fe8476eb24c2032132c254c1ef486f8ee167f297a7b362a6bb4e0b69517a2435bb2ad28c3c6f05d30a63eeb55e4c3e8f8c6601d11bd78702fd9732b68e16e3aa8cb4929d2d628f27941fc8be7dc0d5cdc2d875ccd00912434ba258358428ee87626f7c7b0f7dd4f163887432ba08e874efed08f0aea358a77730f37abaed7
public exponent: 10001

] 
2023-01-31 09:02:12.019  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-31 09:02:12.022 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-31 09:02:12.025 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2023-01-31 09:02:12.026 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-31 09:02:12.027  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2023-01-31 09:02:12.027  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-31 09:02:12.028  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-31 09:02:12.028 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-31 09:02:12.029 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-31 09:02:12.029 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-31 09:02:12.033 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-31 09:02:12.034 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-31 09:02:12.035 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-31 09:02:12.035 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-31 09:02:12.315  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-31 09:02:12.316  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-31 09:02:12.316 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-31 09:02:12.316 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-31 09:02:12.320  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-31 09:02:12.321  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-31 09:02:12.330 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-31 09:02:12.330 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-31 09:02:12.331 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-31 09:02:12.332 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-31 09:02:12.333 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-31 09:02:12.333 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-31 09:02:12.334 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-31 09:02:12.335 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-31 09:02:12.335 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-31 09:02:12.336 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-31 09:02:12.341 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 347581487814459325473079440296624212067175048515
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jan 31 04:05:27 UTC 2023
           Final Date: Sun Jan 30 04:05:26 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [1a:80:cf:5a:e7:a7:98:31:25:c1:ab:6a:c1:eb:21:ff:ba:3a:3a:9b],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8cdb288cfd7c5f3d9b403448e3c2c07ec7a059f6
                       57686c08febb62628f3f2c0c29fac9f5f0d6b642
                       b42e6120851fd270d28f6b1930c4fdf1be98c967
                       c888083f103bf629cb1422e8158ea3d793c9d116
                       a410b2db30b4384a33df1b3f18a2f6f83582dc8e
                       8cba17d3cbceb8cfad9f4565cd056076d03440fe
                       60c5f5a3ea67eeeaa410b899166303a51d3537bd
                       a17ea124c57f4e1a1d9ffece1d58f9bcb6b60054
                       cd42ac1593c0725e926ac0e23eec05d95d63aa4d
                       94417d340a42b48ad8e0ca5bd3e51a013e783843
                       e7dc53f5b5c4aaf808f07f3b0a3c527457060aa2
                       890487d31a0b65ac2d041c48f68fde7475c0e55b
                       3cc966a69a532d797cae34a0958f719aea49310a
                       d239e814e0518d526a5485ab0e021a4871be9576
                       9d1f09bd0c08cddc6a20026d722ab6b224b06b2c
                       e60f0cef1f6376f9d3160efdb4d0b7cba1c68183
                       dda4443ae4abc32321beb480e0a94f480735dbe2
                       8c13e1b35f09256587e80112b578e7355f07576b
                       616b4e2d44ab0c225e679dde24afadd13360b041
                       8ba8b965
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [c1:a9:dc:b8:72:2b:49:4c:bb:56:f1:c4:8c:46:be:e7:ee:3b:22:52],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-31 09:34:03.263  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-31 09:34:03.266 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-31 09:34:03.268 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2023-01-31 09:34:03.269 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-31 09:34:03.269  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2023-01-31 09:34:03.270  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-31 09:34:03.270  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-31 09:34:03.271 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-31 09:34:03.271 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-31 09:34:03.272 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-31 09:34:03.276 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-31 09:34:03.277 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-31 09:34:03.277 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-31 09:34:03.277 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-31 09:34:03.548  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-31 09:34:03.548  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-31 09:34:03.549 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-31 09:34:03.549 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-31 09:34:03.551  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-31 09:34:03.551  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-31 09:34:03.552 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-31 09:34:03.552 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-31 09:34:03.552 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-31 09:34:03.553 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-31 09:34:03.554 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-31 09:34:03.554 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-31 09:34:03.555 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-31 09:34:03.555 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-31 09:34:03.555 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-31 09:34:03.556 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-31 09:34:03.559 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 347581487814459325473079440296624212067175048515
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jan 31 04:05:27 UTC 2023
           Final Date: Sun Jan 30 04:05:26 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [1a:80:cf:5a:e7:a7:98:31:25:c1:ab:6a:c1:eb:21:ff:ba:3a:3a:9b],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8cdb288cfd7c5f3d9b403448e3c2c07ec7a059f6
                       57686c08febb62628f3f2c0c29fac9f5f0d6b642
                       b42e6120851fd270d28f6b1930c4fdf1be98c967
                       c888083f103bf629cb1422e8158ea3d793c9d116
                       a410b2db30b4384a33df1b3f18a2f6f83582dc8e
                       8cba17d3cbceb8cfad9f4565cd056076d03440fe
                       60c5f5a3ea67eeeaa410b899166303a51d3537bd
                       a17ea124c57f4e1a1d9ffece1d58f9bcb6b60054
                       cd42ac1593c0725e926ac0e23eec05d95d63aa4d
                       94417d340a42b48ad8e0ca5bd3e51a013e783843
                       e7dc53f5b5c4aaf808f07f3b0a3c527457060aa2
                       890487d31a0b65ac2d041c48f68fde7475c0e55b
                       3cc966a69a532d797cae34a0958f719aea49310a
                       d239e814e0518d526a5485ab0e021a4871be9576
                       9d1f09bd0c08cddc6a20026d722ab6b224b06b2c
                       e60f0cef1f6376f9d3160efdb4d0b7cba1c68183
                       dda4443ae4abc32321beb480e0a94f480735dbe2
                       8c13e1b35f09256587e80112b578e7355f07576b
                       616b4e2d44ab0c225e679dde24afadd13360b041
                       8ba8b965
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [4d:5e:fa:15:b7:db:d8:c7:57:3c:4f:68:62:ca:7d:32:f2:cd:41:6a],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-31 09:34:27.425  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-31 09:34:27.426 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-31 09:34:27.427 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2023-01-31 09:34:27.427 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-31 09:34:27.428  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2023-01-31 09:34:27.428  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-31 09:34:27.428  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-31 09:34:27.429 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-31 09:34:27.429 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-31 09:34:27.429 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-31 09:34:27.432 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-31 09:34:27.433 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-31 09:34:27.433 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-31 09:34:27.433 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-31 09:34:27.669  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-31 09:34:27.669  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-31 09:34:27.670 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-31 09:34:27.670 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-31 09:34:27.674  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-31 09:34:27.674  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-31 09:34:27.675 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-31 09:34:27.675 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-31 09:34:27.676 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-31 09:34:27.676 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-31 09:34:27.677 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-31 09:34:27.677 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-31 09:34:27.678 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-31 09:34:27.678 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-31 09:34:27.679 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-31 09:34:27.679 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-31 09:34:27.683 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 347581487814459325473079440296624212067175048515
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jan 31 04:05:27 UTC 2023
           Final Date: Sun Jan 30 04:05:26 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [1a:80:cf:5a:e7:a7:98:31:25:c1:ab:6a:c1:eb:21:ff:ba:3a:3a:9b],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8cdb288cfd7c5f3d9b403448e3c2c07ec7a059f6
                       57686c08febb62628f3f2c0c29fac9f5f0d6b642
                       b42e6120851fd270d28f6b1930c4fdf1be98c967
                       c888083f103bf629cb1422e8158ea3d793c9d116
                       a410b2db30b4384a33df1b3f18a2f6f83582dc8e
                       8cba17d3cbceb8cfad9f4565cd056076d03440fe
                       60c5f5a3ea67eeeaa410b899166303a51d3537bd
                       a17ea124c57f4e1a1d9ffece1d58f9bcb6b60054
                       cd42ac1593c0725e926ac0e23eec05d95d63aa4d
                       94417d340a42b48ad8e0ca5bd3e51a013e783843
                       e7dc53f5b5c4aaf808f07f3b0a3c527457060aa2
                       890487d31a0b65ac2d041c48f68fde7475c0e55b
                       3cc966a69a532d797cae34a0958f719aea49310a
                       d239e814e0518d526a5485ab0e021a4871be9576
                       9d1f09bd0c08cddc6a20026d722ab6b224b06b2c
                       e60f0cef1f6376f9d3160efdb4d0b7cba1c68183
                       dda4443ae4abc32321beb480e0a94f480735dbe2
                       8c13e1b35f09256587e80112b578e7355f07576b
                       616b4e2d44ab0c225e679dde24afadd13360b041
                       8ba8b965
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [28:d8:a1:d2:da:90:a9:71:31:43:0d:39:69:68:ee:f0:89:bd:3e:bc],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

]