Results

By type

          2023-02-01 04:07:22,351 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2023-02-01 04:07:24,001 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2023-02-01 04:07:24.850  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Feb 01, 2023 4:07:27 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Feb 01, 2023 4:07:27 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Feb 01, 2023 4:07:27 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Feb 01, 2023 4:07:27 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2023-02-01 04:07:27.978 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2023-02-01 04:07:28.351  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2023-02-01 04:07:28.584  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2023-02-01 04:07:29.491 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2023-02-01 04:07:29.494 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
2023-02-01 04:07:29.496 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2023-02-01 04:07:29.501 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2023-02-01 04:07:29.581 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2023-02-01 04:07:29.595 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/docs]}: redirectToUi(HttpServletRequest)
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
2023-02-01 04:07:29.805 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2023-02-01 04:07:30.585 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Feb 01, 2023 4:07:31 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2023-02-01 04:07:31.854  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 10.63 seconds (JVM running for 12.782)
Feb 01, 2023 4:07:53 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2023-02-01 04:11:04.353  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-02-01 04:11:04.371 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-02-01 04:11:04.435 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2023-02-01 04:11:04.440 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-02-01 04:11:04.472  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2023-02-01 04:11:04.474  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-02-01 04:11:04.475  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-02-01 04:11:04.477 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-02-01 04:11:04.477 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-02-01 04:11:04.482 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-02-01 04:11:04.494 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-02-01 04:11:04.499 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-02-01 04:11:04.569 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-02-01 04:11:04.576 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-02-01 04:11:04.577 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-02-01 04:11:04.581 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-02-01 04:11:05.570  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-02-01 04:11:05.574  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-02-01 04:11:05.575 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-02-01 04:11:05.576 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-02-01 04:11:05.591  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-02-01 04:11:05.592  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-02-01 04:11:05.593 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-02-01 04:11:05.594 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-02-01 04:11:05.595 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-02-01 04:11:05.619 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-02-01 04:11:05.620 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-02-01 04:11:05.620 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-02-01 04:11:05.628 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-02-01 04:11:05.628 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-02-01 04:11:05.629 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-02-01 04:11:05.630 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-02-01 04:11:05.670 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 651246309612768282516409980821745220662113903279
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Feb 01 04:04:26 UTC 2023
           Final Date: Mon Jan 31 04:04:25 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [72:34:8b:81:77:cc:08:3d:e4:c3:8c:0a:50:99:a0:76:02:91:c8:67],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 27763a5d5bc119bef7f86d781887a3341e76a3db
                       533ae6dced05e6dc7e5e10e16366d390fab669c1
                       348ef971273d1d112928eb53b7456dccbe275427
                       c64557be44ff175cfc5bfb1301a718613dfa5787
                       73f822284613f4ccbc5b1d673f56ff355addf739
                       52ee20b9d2cf7aeb4f0a70a165995295b97bb40a
                       12df014e2d1d86b88a462fd7806564c385185ff5
                       ad8c82c0a03b994fd787a7c72881930186f14f4a
                       d0c64798e621004e18780d37432d9bbf2d19dbeb
                       d5c0021cc97ae47fcfbcb7288a1f6238dbf3ffe5
                       6eb4594288538104a21e5451e80194315b766fe2
                       55d09a5fb02e138747b9c41e3b8f2e7a3056d4ce
                       d6ccad6aec59224e2a8d5b7665942e21db94a394
                       288ce7426296b3d4698b040d4b2626e35c347510
                       84d8bb7f283dcb93e6e3c8d54bfe9e96aafeb7b7
                       d2b4fe01c03f989d2cabf85d9e2e8c763eaa5ecc
                       d8ece4d1f5dc0043593ac7724154f67e4073011e
                       3b8030f5d2a5a13bcc4e419757a645795ae4373e
                       153f9ea9cd0610efc806ec392fff0fadfa85b907
                       635720d3
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [a8:06:2c:24:39:16:f4:86:ce:cc:fa:1e:00:97:46:7b:fa:2c:2f:13],[56:66:d1:a4]
        modulus: c60d1bcf0b6a751cbae0f22d6303fd7f4bdd044c4e61625e57555a0239b46fede3857916f743174a87cfec7f8e9601afeae3cb29ed1ca2b44d83ba22acc37cab8d7ed94f211c54a8def35fac3d13c9accdfc1895969f1069006ed32c1e3dd468d1987727c5a96bc2a83d6aebfd07cdbe80bedcd2306e517978a9c1c55de05b00f67c7184e622b058a1e89626f1f58ed19d49e247a5d945f83e1cf43b66d145c448c87ebc512a8b577c0064b9c1f90b9b6b8b29e0d91795efb3db93a1438e22b9aef36d3f3cb9bfffcca7732505195f0553be7f254d94b3c51397c5c8410d389b66f84c3b68cba2bda1f61b2650c94f6f3f553908031397a96c4ac94b5eb557a1
public exponent: 10001

] 
2023-02-01 06:47:07.230  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-02-01 06:47:07.240 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-02-01 06:47:07.244 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-02-01 06:47:07.246 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-02-01 06:47:07.247  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-02-01 06:47:07.248  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-02-01 06:47:07.251  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-02-01 06:47:07.253 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-02-01 06:47:07.254 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-02-01 06:47:07.255 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-02-01 06:47:07.260 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-02-01 06:47:07.267 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-02-01 06:47:07.268 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-02-01 06:47:07.268 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-02-01 06:47:07.536  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-02-01 06:47:07.537  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-02-01 06:47:07.537 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-02-01 06:47:07.538 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-02-01 06:47:07.541  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-02-01 06:47:07.542  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-02-01 06:47:07.542 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-02-01 06:47:07.543 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-02-01 06:47:07.543 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-02-01 06:47:07.545 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-02-01 06:47:07.546 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-02-01 06:47:07.546 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-02-01 06:47:07.547 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-02-01 06:47:07.547 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-02-01 06:47:07.548 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-02-01 06:47:07.549 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-02-01 06:47:07.554 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 651246309612768282516409980821745220662113903279
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Feb 01 04:04:26 UTC 2023
           Final Date: Mon Jan 31 04:04:25 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [72:34:8b:81:77:cc:08:3d:e4:c3:8c:0a:50:99:a0:76:02:91:c8:67],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 27763a5d5bc119bef7f86d781887a3341e76a3db
                       533ae6dced05e6dc7e5e10e16366d390fab669c1
                       348ef971273d1d112928eb53b7456dccbe275427
                       c64557be44ff175cfc5bfb1301a718613dfa5787
                       73f822284613f4ccbc5b1d673f56ff355addf739
                       52ee20b9d2cf7aeb4f0a70a165995295b97bb40a
                       12df014e2d1d86b88a462fd7806564c385185ff5
                       ad8c82c0a03b994fd787a7c72881930186f14f4a
                       d0c64798e621004e18780d37432d9bbf2d19dbeb
                       d5c0021cc97ae47fcfbcb7288a1f6238dbf3ffe5
                       6eb4594288538104a21e5451e80194315b766fe2
                       55d09a5fb02e138747b9c41e3b8f2e7a3056d4ce
                       d6ccad6aec59224e2a8d5b7665942e21db94a394
                       288ce7426296b3d4698b040d4b2626e35c347510
                       84d8bb7f283dcb93e6e3c8d54bfe9e96aafeb7b7
                       d2b4fe01c03f989d2cabf85d9e2e8c763eaa5ecc
                       d8ece4d1f5dc0043593ac7724154f67e4073011e
                       3b8030f5d2a5a13bcc4e419757a645795ae4373e
                       153f9ea9cd0610efc806ec392fff0fadfa85b907
                       635720d3
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [18:16:0c:84:0f:ab:0c:f2:fa:4b:2c:e3:9a:66:82:ef:95:de:8e:31],[56:66:d1:a4]
        modulus: c18a77a5f18882d679321de94d5cf718967e5d2eac42f7e41085b94ae0a73620312c25aaf4fdbaf15c6794860f017d971082990b7ce8828d88c2481aace846d1a432f02f67efda6f285759a301d491079c75818c28ee506e93b45b2f790c689a1f26a712db3e80021c7e7975922344f70c2a854b33d62826689d709393b6a788909f9a25f36e6e3b524f331c67dd7dc120273141e7d7dc9c73bf3731ff69692349fced0d559f14c711074798af40baede733341b3a3713dcd46a749461f5c36c7d0f676d8babc84388f889f360176add9952770363ed1e2bb65eec969150652acc635ff6ff8b42f9380be1de508e7782c5239b07a72b6cdc6fdda190d7e73477
public exponent: 10001

] 
2023-02-01 06:59:11.667  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-02-01 06:59:11.673 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-02-01 06:59:11.677 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-02-01 06:59:11.679 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-02-01 06:59:11.680  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-02-01 06:59:11.681  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-02-01 06:59:11.681  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-02-01 06:59:11.682 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-02-01 06:59:11.682 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-02-01 06:59:11.684 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-02-01 06:59:11.691 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-02-01 06:59:11.692 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-02-01 06:59:11.692 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-02-01 06:59:11.693 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-02-01 06:59:11.926  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-02-01 06:59:11.927  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-02-01 06:59:11.927 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-02-01 06:59:11.928 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-02-01 06:59:11.930  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-02-01 06:59:11.931  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-02-01 06:59:11.932 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-02-01 06:59:11.933 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-02-01 06:59:11.933 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-02-01 06:59:11.935 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-02-01 06:59:11.936 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-02-01 06:59:11.936 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-02-01 06:59:11.937 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-02-01 06:59:11.938 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-02-01 06:59:11.938 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-02-01 06:59:11.939 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-02-01 06:59:11.942 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 651246309612768282516409980821745220662113903279
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Feb 01 04:04:26 UTC 2023
           Final Date: Mon Jan 31 04:04:25 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [72:34:8b:81:77:cc:08:3d:e4:c3:8c:0a:50:99:a0:76:02:91:c8:67],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 27763a5d5bc119bef7f86d781887a3341e76a3db
                       533ae6dced05e6dc7e5e10e16366d390fab669c1
                       348ef971273d1d112928eb53b7456dccbe275427
                       c64557be44ff175cfc5bfb1301a718613dfa5787
                       73f822284613f4ccbc5b1d673f56ff355addf739
                       52ee20b9d2cf7aeb4f0a70a165995295b97bb40a
                       12df014e2d1d86b88a462fd7806564c385185ff5
                       ad8c82c0a03b994fd787a7c72881930186f14f4a
                       d0c64798e621004e18780d37432d9bbf2d19dbeb
                       d5c0021cc97ae47fcfbcb7288a1f6238dbf3ffe5
                       6eb4594288538104a21e5451e80194315b766fe2
                       55d09a5fb02e138747b9c41e3b8f2e7a3056d4ce
                       d6ccad6aec59224e2a8d5b7665942e21db94a394
                       288ce7426296b3d4698b040d4b2626e35c347510
                       84d8bb7f283dcb93e6e3c8d54bfe9e96aafeb7b7
                       d2b4fe01c03f989d2cabf85d9e2e8c763eaa5ecc
                       d8ece4d1f5dc0043593ac7724154f67e4073011e
                       3b8030f5d2a5a13bcc4e419757a645795ae4373e
                       153f9ea9cd0610efc806ec392fff0fadfa85b907
                       635720d3
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [85:36:29:4a:5e:b5:b3:39:6d:f2:7d:85:7a:39:c8:5a:98:7e:7b:56],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-02-01 07:01:01.211  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-02-01 07:01:01.213 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-02-01 07:01:01.215 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2023-02-01 07:01:01.216 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-02-01 07:01:01.217  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2023-02-01 07:01:01.218  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-02-01 07:01:01.218  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-02-01 07:01:01.219 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-02-01 07:01:01.220 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-02-01 07:01:01.220 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-02-01 07:01:01.225 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-02-01 07:01:01.226 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-02-01 07:01:01.226 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-02-01 07:01:01.227 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-02-01 07:01:01.411  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-02-01 07:01:01.412  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-02-01 07:01:01.412 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-02-01 07:01:01.413 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-02-01 07:01:01.414  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-02-01 07:01:01.415  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-02-01 07:01:01.415 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-02-01 07:01:01.416 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-02-01 07:01:01.416 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-02-01 07:01:01.417 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-02-01 07:01:01.417 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-02-01 07:01:01.417 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-02-01 07:01:01.418 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-02-01 07:01:01.419 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-02-01 07:01:01.419 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-02-01 07:01:01.420 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-02-01 07:01:01.424 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 651246309612768282516409980821745220662113903279
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Feb 01 04:04:26 UTC 2023
           Final Date: Mon Jan 31 04:04:25 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [72:34:8b:81:77:cc:08:3d:e4:c3:8c:0a:50:99:a0:76:02:91:c8:67],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 27763a5d5bc119bef7f86d781887a3341e76a3db
                       533ae6dced05e6dc7e5e10e16366d390fab669c1
                       348ef971273d1d112928eb53b7456dccbe275427
                       c64557be44ff175cfc5bfb1301a718613dfa5787
                       73f822284613f4ccbc5b1d673f56ff355addf739
                       52ee20b9d2cf7aeb4f0a70a165995295b97bb40a
                       12df014e2d1d86b88a462fd7806564c385185ff5
                       ad8c82c0a03b994fd787a7c72881930186f14f4a
                       d0c64798e621004e18780d37432d9bbf2d19dbeb
                       d5c0021cc97ae47fcfbcb7288a1f6238dbf3ffe5
                       6eb4594288538104a21e5451e80194315b766fe2
                       55d09a5fb02e138747b9c41e3b8f2e7a3056d4ce
                       d6ccad6aec59224e2a8d5b7665942e21db94a394
                       288ce7426296b3d4698b040d4b2626e35c347510
                       84d8bb7f283dcb93e6e3c8d54bfe9e96aafeb7b7
                       d2b4fe01c03f989d2cabf85d9e2e8c763eaa5ecc
                       d8ece4d1f5dc0043593ac7724154f67e4073011e
                       3b8030f5d2a5a13bcc4e419757a645795ae4373e
                       153f9ea9cd0610efc806ec392fff0fadfa85b907
                       635720d3
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [e0:dd:be:ff:8b:f8:75:66:da:56:f2:e8:f1:cc:f0:cb:80:ba:c3:13],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-02-01 07:04:03.109  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-02-01 07:04:03.115 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-02-01 07:04:03.120 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2023-02-01 07:04:03.122 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-02-01 07:04:03.123  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2023-02-01 07:04:03.125  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-02-01 07:04:03.127  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-02-01 07:04:03.127 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-02-01 07:04:03.128 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-02-01 07:04:03.129 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-02-01 07:04:03.135 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-02-01 07:04:03.137 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-02-01 07:04:03.138 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-02-01 07:04:03.138 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-02-01 07:04:03.290  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-02-01 07:04:03.292  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-02-01 07:04:03.292 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-02-01 07:04:03.292 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-02-01 07:04:03.294  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-02-01 07:04:03.294  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-02-01 07:04:03.295 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-02-01 07:04:03.295 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-02-01 07:04:03.295 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-02-01 07:04:03.298 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-02-01 07:04:03.298 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-02-01 07:04:03.299 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-02-01 07:04:03.302 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-02-01 07:04:03.303 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-02-01 07:04:03.303 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-02-01 07:04:03.304 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-02-01 07:04:03.311 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 651246309612768282516409980821745220662113903279
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Feb 01 04:04:26 UTC 2023
           Final Date: Mon Jan 31 04:04:25 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [72:34:8b:81:77:cc:08:3d:e4:c3:8c:0a:50:99:a0:76:02:91:c8:67],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 27763a5d5bc119bef7f86d781887a3341e76a3db
                       533ae6dced05e6dc7e5e10e16366d390fab669c1
                       348ef971273d1d112928eb53b7456dccbe275427
                       c64557be44ff175cfc5bfb1301a718613dfa5787
                       73f822284613f4ccbc5b1d673f56ff355addf739
                       52ee20b9d2cf7aeb4f0a70a165995295b97bb40a
                       12df014e2d1d86b88a462fd7806564c385185ff5
                       ad8c82c0a03b994fd787a7c72881930186f14f4a
                       d0c64798e621004e18780d37432d9bbf2d19dbeb
                       d5c0021cc97ae47fcfbcb7288a1f6238dbf3ffe5
                       6eb4594288538104a21e5451e80194315b766fe2
                       55d09a5fb02e138747b9c41e3b8f2e7a3056d4ce
                       d6ccad6aec59224e2a8d5b7665942e21db94a394
                       288ce7426296b3d4698b040d4b2626e35c347510
                       84d8bb7f283dcb93e6e3c8d54bfe9e96aafeb7b7
                       d2b4fe01c03f989d2cabf85d9e2e8c763eaa5ecc
                       d8ece4d1f5dc0043593ac7724154f67e4073011e
                       3b8030f5d2a5a13bcc4e419757a645795ae4373e
                       153f9ea9cd0610efc806ec392fff0fadfa85b907
                       635720d3
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [68:f8:2d:40:f0:a1:2d:92:3d:47:99:88:8d:30:52:6f:79:7a:06:0e],[56:66:d1:a4]
        modulus: d1185273db6038cc51d7eb2a38825aa22eb2b2c7317038bb5b88f2187b7207a53b5d3c7cf340b5d361ac337c355399186897704e2a42d7ce8ab75f72c28784f46d8028c0712f847a8d00052030a212ac6c5a754e503e50fb94f7cc4a0888044db73f171d7e1b7fba6ca624cdfaf1628dbab73d4632e1e9bf386a3d026449f4bce181f83f7ca13812cc9b7341fb48f1193a5cb12933a8dd8c4e3fffdc92ceb36e50b1fa7150f9d9e86ecb468f73d82f3b7db1e127c1477d86e7cd7d61cad8ba0433e146ec6fe0d48ffd995083914833f578303a41cc7782b368157467a1439cba9ecf7abbdeaa6ee5e886d26bd4ca639c8d428d6e45dab39f447e416011d00e0b
public exponent: 10001

] 
2023-02-01 07:09:46.143  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-02-01 07:09:46.152 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-02-01 07:09:46.156 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-02-01 07:09:46.157 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-02-01 07:09:46.158  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-02-01 07:09:46.161  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-02-01 07:09:46.163  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-02-01 07:09:46.165 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-02-01 07:09:46.165 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-02-01 07:09:46.167 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-02-01 07:09:46.172 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-02-01 07:09:46.173 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-02-01 07:09:46.173 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-02-01 07:09:46.174 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-02-01 07:09:46.425  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-02-01 07:09:46.426  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-02-01 07:09:46.427 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-02-01 07:09:46.427 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-02-01 07:09:46.428  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-02-01 07:09:46.429  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-02-01 07:09:46.429 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-02-01 07:09:46.430 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-02-01 07:09:46.430 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-02-01 07:09:46.431 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-02-01 07:09:46.431 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-02-01 07:09:46.431 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-02-01 07:09:46.432 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-02-01 07:09:46.432 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-02-01 07:09:46.433 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-02-01 07:09:46.433 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-02-01 07:09:46.437 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 651246309612768282516409980821745220662113903279
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Feb 01 04:04:26 UTC 2023
           Final Date: Mon Jan 31 04:04:25 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [72:34:8b:81:77:cc:08:3d:e4:c3:8c:0a:50:99:a0:76:02:91:c8:67],[56:66:d1:a4]
        modulus: c5000f8e1589d67ba22f3a0900e4b43af2cb6d371764025dc5e8dec68f47a2b530b72abcb1b29bd64dc0d106a2d7ad0418df1dd2428b1988bbcc17971cf64d9cde955a26dee242ed79f5c59bd6c60f17f194f48e9e66d69a5b12810df8e7bcd57fc830b00683ca65fb61a5038a927934f2c4daa117e32ec8dfb7f5656fcbab37d810e82cfe02533cceb48b77129166832d9fe49c6c79fc2923c451c94e4373f5f02b8f6022f58e2a2ebcb8f5daf6728ed197c8fe871f9978381b5bf41556e009c817b26653d255ad4574f0d7513a5ec332a08a656bc44e9719e0e1e3f32a5f16c2398da0b6ba1d2ac6189519deede27828bc84877bcfc89a26bf9b782d1fc9bfce18db6cb974bf6f9c6d85db3b898c2d39fd64faea8215e151fd47e455932e405f277992d9718f7c79650a9bef7640e51e4b9ac4d13309291ac14b4daf147477b12c4e89e0e383f2f094be0e407846a67a323f7f080f92a4f3b38cb656bfbd2a0490559636e6e7d3da8725b714f1d7a71b66c06923822ceaefe0f592525ba499
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 27763a5d5bc119bef7f86d781887a3341e76a3db
                       533ae6dced05e6dc7e5e10e16366d390fab669c1
                       348ef971273d1d112928eb53b7456dccbe275427
                       c64557be44ff175cfc5bfb1301a718613dfa5787
                       73f822284613f4ccbc5b1d673f56ff355addf739
                       52ee20b9d2cf7aeb4f0a70a165995295b97bb40a
                       12df014e2d1d86b88a462fd7806564c385185ff5
                       ad8c82c0a03b994fd787a7c72881930186f14f4a
                       d0c64798e621004e18780d37432d9bbf2d19dbeb
                       d5c0021cc97ae47fcfbcb7288a1f6238dbf3ffe5
                       6eb4594288538104a21e5451e80194315b766fe2
                       55d09a5fb02e138747b9c41e3b8f2e7a3056d4ce
                       d6ccad6aec59224e2a8d5b7665942e21db94a394
                       288ce7426296b3d4698b040d4b2626e35c347510
                       84d8bb7f283dcb93e6e3c8d54bfe9e96aafeb7b7
                       d2b4fe01c03f989d2cabf85d9e2e8c763eaa5ecc
                       d8ece4d1f5dc0043593ac7724154f67e4073011e
                       3b8030f5d2a5a13bcc4e419757a645795ae4373e
                       153f9ea9cd0610efc806ec392fff0fadfa85b907
                       635720d3
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [b6:9f:96:6e:e3:04:80:36:4c:4a:a0:00:e3:6a:4c:cf:6d:fe:f6:90],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-02-01 07:23:08.214  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-02-01 07:23:08.220 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-02-01 07:23:08.225 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-02-01 07:23:08.227 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-02-01 07:23:08.228  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-02-01 07:23:08.229  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-02-01 07:23:08.229  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-02-01 07:23:08.230 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-02-01 07:23:08.230 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-02-01 07:23:08.231 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-02-01 07:23:08.237 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-02-01 07:23:08.239 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-02-01 07:23:08.240 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-02-01 07:23:08.240 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-02-01 07:23:08.617  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-02-01 07:23:08.617  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-02-01 07:23:08.618 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-02-01 07:23:08.619 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-02-01 07:23:08.621  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-02-01 07:23:08.622  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-02-01 07:23:08.623 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-02-01 07:23:08.623 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-02-01 07:23:08.624 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-02-01 07:23:08.625 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-02-01 07:23:08.626 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-02-01 07:23:08.627 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-02-01 07:23:08.628 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-02-01 07:23:08.628 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-02-01 07:23:08.629 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-02-01 07:23:08.630 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-02-01 07:23:08.635 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 651246309612768282516409980821745220662113903279
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Feb 01 04:04:26 UTC 2023
           Final Date: Mon Jan 31 04:04:25 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [72:34:8b:81:77:cc:08:3d:e4:c3:8c:0a:50:99:a0:76:02:91:c8:67],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 27763a5d5bc119bef7f86d781887a3341e76a3db
                       533ae6dced05e6dc7e5e10e16366d390fab669c1
                       348ef971273d1d112928eb53b7456dccbe275427
                       c64557be44ff175cfc5bfb1301a718613dfa5787
                       73f822284613f4ccbc5b1d673f56ff355addf739
                       52ee20b9d2cf7aeb4f0a70a165995295b97bb40a
                       12df014e2d1d86b88a462fd7806564c385185ff5
                       ad8c82c0a03b994fd787a7c72881930186f14f4a
                       d0c64798e621004e18780d37432d9bbf2d19dbeb
                       d5c0021cc97ae47fcfbcb7288a1f6238dbf3ffe5
                       6eb4594288538104a21e5451e80194315b766fe2
                       55d09a5fb02e138747b9c41e3b8f2e7a3056d4ce
                       d6ccad6aec59224e2a8d5b7665942e21db94a394
                       288ce7426296b3d4698b040d4b2626e35c347510
                       84d8bb7f283dcb93e6e3c8d54bfe9e96aafeb7b7
                       d2b4fe01c03f989d2cabf85d9e2e8c763eaa5ecc
                       d8ece4d1f5dc0043593ac7724154f67e4073011e
                       3b8030f5d2a5a13bcc4e419757a645795ae4373e
                       153f9ea9cd0610efc806ec392fff0fadfa85b907
                       635720d3
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [12:9a:b7:a2:32:b7:22:52:6c:b4:58:26:24:6e:66:49:6f:eb:3f:66],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-02-01 07:31:40.575  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-02-01 07:31:40.578 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-02-01 07:31:40.581 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-02-01 07:31:40.582 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-02-01 07:31:40.582  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-02-01 07:31:40.583  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-02-01 07:31:40.583  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-02-01 07:31:40.583 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-02-01 07:31:40.584 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-02-01 07:31:40.584 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-02-01 07:31:40.588 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-02-01 07:31:40.589 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-02-01 07:31:40.590 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-02-01 07:31:40.590 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-02-01 07:31:40.792  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-02-01 07:31:40.793  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-02-01 07:31:40.793 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-02-01 07:31:40.794 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-02-01 07:31:40.795  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-02-01 07:31:40.796  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-02-01 07:31:40.797 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-02-01 07:31:40.797 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-02-01 07:31:40.798 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-02-01 07:31:40.799 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-02-01 07:31:40.800 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-02-01 07:31:40.800 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-02-01 07:31:40.801 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-02-01 07:31:40.801 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-02-01 07:31:40.801 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-02-01 07:31:40.803 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-02-01 07:31:40.808 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 651246309612768282516409980821745220662113903279
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Feb 01 04:04:26 UTC 2023
           Final Date: Mon Jan 31 04:04:25 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [72:34:8b:81:77:cc:08:3d:e4:c3:8c:0a:50:99:a0:76:02:91:c8:67],[56:66:d1:a4]
        modulus: c5000f8e1589d67ba22f3a0900e4b43af2cb6d371764025dc5e8dec68f47a2b530b72abcb1b29bd64dc0d106a2d7ad0418df1dd2428b1988bbcc17971cf64d9cde955a26dee242ed79f5c59bd6c60f17f194f48e9e66d69a5b12810df8e7bcd57fc830b00683ca65fb61a5038a927934f2c4daa117e32ec8dfb7f5656fcbab37d810e82cfe02533cceb48b77129166832d9fe49c6c79fc2923c451c94e4373f5f02b8f6022f58e2a2ebcb8f5daf6728ed197c8fe871f9978381b5bf41556e009c817b26653d255ad4574f0d7513a5ec332a08a656bc44e9719e0e1e3f32a5f16c2398da0b6ba1d2ac6189519deede27828bc84877bcfc89a26bf9b782d1fc9bfce18db6cb974bf6f9c6d85db3b898c2d39fd64faea8215e151fd47e455932e405f277992d9718f7c79650a9bef7640e51e4b9ac4d13309291ac14b4daf147477b12c4e89e0e383f2f094be0e407846a67a323f7f080f92a4f3b38cb656bfbd2a0490559636e6e7d3da8725b714f1d7a71b66c06923822ceaefe0f592525ba499
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 27763a5d5bc119bef7f86d781887a3341e76a3db
                       533ae6dced05e6dc7e5e10e16366d390fab669c1
                       348ef971273d1d112928eb53b7456dccbe275427
                       c64557be44ff175cfc5bfb1301a718613dfa5787
                       73f822284613f4ccbc5b1d673f56ff355addf739
                       52ee20b9d2cf7aeb4f0a70a165995295b97bb40a
                       12df014e2d1d86b88a462fd7806564c385185ff5
                       ad8c82c0a03b994fd787a7c72881930186f14f4a
                       d0c64798e621004e18780d37432d9bbf2d19dbeb
                       d5c0021cc97ae47fcfbcb7288a1f6238dbf3ffe5
                       6eb4594288538104a21e5451e80194315b766fe2
                       55d09a5fb02e138747b9c41e3b8f2e7a3056d4ce
                       d6ccad6aec59224e2a8d5b7665942e21db94a394
                       288ce7426296b3d4698b040d4b2626e35c347510
                       84d8bb7f283dcb93e6e3c8d54bfe9e96aafeb7b7
                       d2b4fe01c03f989d2cabf85d9e2e8c763eaa5ecc
                       d8ece4d1f5dc0043593ac7724154f67e4073011e
                       3b8030f5d2a5a13bcc4e419757a645795ae4373e
                       153f9ea9cd0610efc806ec392fff0fadfa85b907
                       635720d3
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [d4:f7:33:3d:ac:a4:67:b1:ee:0e:9a:2a:4e:e2:cf:d4:1d:10:04:c2],[56:66:d1:a4]
        modulus: a94bbd1399b23ebab12783e26dabd4df13696c24693a85313ac8cc81a8a86edb3858559674f7fab73a0b757dd76b64587eb9c76df688957f767fef8ee551a0a2dc5d09f809ea264844e40f4e778e0b67f486911452c4e1231e01c95005c4a35b2078045a2fbeb3fd0075a93342c93ee28bfdd51fc8827f594a0cb0263949a7c9ed6b2e2e706b3c14158543daad00c4905918485094fb003e8ac1c43348fa2f281f8dcf9565ae9d5d803af495548bb413933548a10f2c19f41e6e5e3f9160b2eeb1f24e54891ab0883b5fb91f25e8999717d745d728e9504c77f74c5f3d28d85a6cef9ccf4a5f39696f414f805b076ed7c129074771ac4350d60105cdb3f105c5
public exponent: 10001

] 
2023-02-01 07:39:33.286  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-02-01 07:39:33.288 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-02-01 07:39:33.290 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2023-02-01 07:39:33.291 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-02-01 07:39:33.292  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2023-02-01 07:39:33.292  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-02-01 07:39:33.292  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-02-01 07:39:33.293 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-02-01 07:39:33.293 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-02-01 07:39:33.293 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-02-01 07:39:33.297 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-02-01 07:39:33.297 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-02-01 07:39:33.298 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-02-01 07:39:33.298 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-02-01 07:39:33.570  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-02-01 07:39:33.570  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-02-01 07:39:33.571 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-02-01 07:39:33.571 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-02-01 07:39:33.572  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-02-01 07:39:33.572  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-02-01 07:39:33.573 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-02-01 07:39:33.573 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-02-01 07:39:33.573 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-02-01 07:39:33.574 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-02-01 07:39:33.574 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-02-01 07:39:33.574 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-02-01 07:39:33.575 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-02-01 07:39:33.575 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-02-01 07:39:33.576 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-02-01 07:39:33.576 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-02-01 07:39:33.579 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 651246309612768282516409980821745220662113903279
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Feb 01 04:04:26 UTC 2023
           Final Date: Mon Jan 31 04:04:25 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [72:34:8b:81:77:cc:08:3d:e4:c3:8c:0a:50:99:a0:76:02:91:c8:67],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 27763a5d5bc119bef7f86d781887a3341e76a3db
                       533ae6dced05e6dc7e5e10e16366d390fab669c1
                       348ef971273d1d112928eb53b7456dccbe275427
                       c64557be44ff175cfc5bfb1301a718613dfa5787
                       73f822284613f4ccbc5b1d673f56ff355addf739
                       52ee20b9d2cf7aeb4f0a70a165995295b97bb40a
                       12df014e2d1d86b88a462fd7806564c385185ff5
                       ad8c82c0a03b994fd787a7c72881930186f14f4a
                       d0c64798e621004e18780d37432d9bbf2d19dbeb
                       d5c0021cc97ae47fcfbcb7288a1f6238dbf3ffe5
                       6eb4594288538104a21e5451e80194315b766fe2
                       55d09a5fb02e138747b9c41e3b8f2e7a3056d4ce
                       d6ccad6aec59224e2a8d5b7665942e21db94a394
                       288ce7426296b3d4698b040d4b2626e35c347510
                       84d8bb7f283dcb93e6e3c8d54bfe9e96aafeb7b7
                       d2b4fe01c03f989d2cabf85d9e2e8c763eaa5ecc
                       d8ece4d1f5dc0043593ac7724154f67e4073011e
                       3b8030f5d2a5a13bcc4e419757a645795ae4373e
                       153f9ea9cd0610efc806ec392fff0fadfa85b907
                       635720d3
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [b2:2d:8f:99:d4:16:14:3c:b4:d5:d4:cd:fa:3b:f5:58:29:ba:1e:8e],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-02-01 08:05:52.837  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-02-01 08:05:52.841 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-02-01 08:05:52.844 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2023-02-01 08:05:52.845 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-02-01 08:05:52.845  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2023-02-01 08:05:52.846  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-02-01 08:05:52.846  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-02-01 08:05:52.847 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-02-01 08:05:52.847 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-02-01 08:05:52.848 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-02-01 08:05:52.854 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-02-01 08:05:52.856 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-02-01 08:05:52.857 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-02-01 08:05:52.857 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-02-01 08:05:53.099  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-02-01 08:05:53.100  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-02-01 08:05:53.100 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-02-01 08:05:53.100 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-02-01 08:05:53.102  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-02-01 08:05:53.102  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-02-01 08:05:53.103 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-02-01 08:05:53.103 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-02-01 08:05:53.103 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-02-01 08:05:53.104 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-02-01 08:05:53.105 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-02-01 08:05:53.105 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-02-01 08:05:53.105 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-02-01 08:05:53.106 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-02-01 08:05:53.106 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-02-01 08:05:53.106 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-02-01 08:05:53.110 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 651246309612768282516409980821745220662113903279
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Feb 01 04:04:26 UTC 2023
           Final Date: Mon Jan 31 04:04:25 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [72:34:8b:81:77:cc:08:3d:e4:c3:8c:0a:50:99:a0:76:02:91:c8:67],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 27763a5d5bc119bef7f86d781887a3341e76a3db
                       533ae6dced05e6dc7e5e10e16366d390fab669c1
                       348ef971273d1d112928eb53b7456dccbe275427
                       c64557be44ff175cfc5bfb1301a718613dfa5787
                       73f822284613f4ccbc5b1d673f56ff355addf739
                       52ee20b9d2cf7aeb4f0a70a165995295b97bb40a
                       12df014e2d1d86b88a462fd7806564c385185ff5
                       ad8c82c0a03b994fd787a7c72881930186f14f4a
                       d0c64798e621004e18780d37432d9bbf2d19dbeb
                       d5c0021cc97ae47fcfbcb7288a1f6238dbf3ffe5
                       6eb4594288538104a21e5451e80194315b766fe2
                       55d09a5fb02e138747b9c41e3b8f2e7a3056d4ce
                       d6ccad6aec59224e2a8d5b7665942e21db94a394
                       288ce7426296b3d4698b040d4b2626e35c347510
                       84d8bb7f283dcb93e6e3c8d54bfe9e96aafeb7b7
                       d2b4fe01c03f989d2cabf85d9e2e8c763eaa5ecc
                       d8ece4d1f5dc0043593ac7724154f67e4073011e
                       3b8030f5d2a5a13bcc4e419757a645795ae4373e
                       153f9ea9cd0610efc806ec392fff0fadfa85b907
                       635720d3
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [66:9c:65:a0:13:49:c5:cf:80:ab:89:7f:83:31:76:33:03:b5:83:85],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-02-01 08:06:27.986  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-02-01 08:06:27.987 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-02-01 08:06:27.989 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2023-02-01 08:06:27.990 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-02-01 08:06:27.990  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2023-02-01 08:06:27.991  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-02-01 08:06:27.991  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-02-01 08:06:27.992 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-02-01 08:06:27.992 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-02-01 08:06:27.992 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-02-01 08:06:27.996 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-02-01 08:06:27.997 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-02-01 08:06:27.997 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-02-01 08:06:27.997 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-02-01 08:06:28.332  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-02-01 08:06:28.333  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-02-01 08:06:28.334 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-02-01 08:06:28.334 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-02-01 08:06:28.335  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-02-01 08:06:28.335  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-02-01 08:06:28.336 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-02-01 08:06:28.337 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-02-01 08:06:28.337 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-02-01 08:06:28.338 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-02-01 08:06:28.338 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-02-01 08:06:28.338 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-02-01 08:06:28.339 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-02-01 08:06:28.339 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-02-01 08:06:28.339 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-02-01 08:06:28.340 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-02-01 08:06:28.344 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 651246309612768282516409980821745220662113903279
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Feb 01 04:04:26 UTC 2023
           Final Date: Mon Jan 31 04:04:25 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [72:34:8b:81:77:cc:08:3d:e4:c3:8c:0a:50:99:a0:76:02:91:c8:67],[56:66:d1:a4]
        modulus: c5000f8e1589d67ba22f3a0900e4b43af2cb6d371764025dc5e8dec68f47a2b530b72abcb1b29bd64dc0d106a2d7ad0418df1dd2428b1988bbcc17971cf64d9cde955a26dee242ed79f5c59bd6c60f17f194f48e9e66d69a5b12810df8e7bcd57fc830b00683ca65fb61a5038a927934f2c4daa117e32ec8dfb7f5656fcbab37d810e82cfe02533cceb48b77129166832d9fe49c6c79fc2923c451c94e4373f5f02b8f6022f58e2a2ebcb8f5daf6728ed197c8fe871f9978381b5bf41556e009c817b26653d255ad4574f0d7513a5ec332a08a656bc44e9719e0e1e3f32a5f16c2398da0b6ba1d2ac6189519deede27828bc84877bcfc89a26bf9b782d1fc9bfce18db6cb974bf6f9c6d85db3b898c2d39fd64faea8215e151fd47e455932e405f277992d9718f7c79650a9bef7640e51e4b9ac4d13309291ac14b4daf147477b12c4e89e0e383f2f094be0e407846a67a323f7f080f92a4f3b38cb656bfbd2a0490559636e6e7d3da8725b714f1d7a71b66c06923822ceaefe0f592525ba499
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 27763a5d5bc119bef7f86d781887a3341e76a3db
                       533ae6dced05e6dc7e5e10e16366d390fab669c1
                       348ef971273d1d112928eb53b7456dccbe275427
                       c64557be44ff175cfc5bfb1301a718613dfa5787
                       73f822284613f4ccbc5b1d673f56ff355addf739
                       52ee20b9d2cf7aeb4f0a70a165995295b97bb40a
                       12df014e2d1d86b88a462fd7806564c385185ff5
                       ad8c82c0a03b994fd787a7c72881930186f14f4a
                       d0c64798e621004e18780d37432d9bbf2d19dbeb
                       d5c0021cc97ae47fcfbcb7288a1f6238dbf3ffe5
                       6eb4594288538104a21e5451e80194315b766fe2
                       55d09a5fb02e138747b9c41e3b8f2e7a3056d4ce
                       d6ccad6aec59224e2a8d5b7665942e21db94a394
                       288ce7426296b3d4698b040d4b2626e35c347510
                       84d8bb7f283dcb93e6e3c8d54bfe9e96aafeb7b7
                       d2b4fe01c03f989d2cabf85d9e2e8c763eaa5ecc
                       d8ece4d1f5dc0043593ac7724154f67e4073011e
                       3b8030f5d2a5a13bcc4e419757a645795ae4373e
                       153f9ea9cd0610efc806ec392fff0fadfa85b907
                       635720d3
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [6e:0e:49:8f:dc:b4:48:cd:db:83:6e:85:ed:2d:4b:4b:7c:7c:01:3c],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-02-01 08:26:14.758  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-02-01 08:26:14.763 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-02-01 08:26:14.767 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2023-02-01 08:26:14.768 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-02-01 08:26:14.769  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2023-02-01 08:26:14.770  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-02-01 08:26:14.770  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-02-01 08:26:14.771 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-02-01 08:26:14.771 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-02-01 08:26:14.772 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-02-01 08:26:14.778 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-02-01 08:26:14.780 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-02-01 08:26:14.781 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-02-01 08:26:14.781 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-02-01 08:26:15.048  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-02-01 08:26:15.049  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-02-01 08:26:15.049 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-02-01 08:26:15.050 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-02-01 08:26:15.051  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-02-01 08:26:15.052  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-02-01 08:26:15.052 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-02-01 08:26:15.053 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-02-01 08:26:15.053 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-02-01 08:26:15.054 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-02-01 08:26:15.055 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-02-01 08:26:15.055 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-02-01 08:26:15.056 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-02-01 08:26:15.057 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-02-01 08:26:15.057 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-02-01 08:26:15.058 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-02-01 08:26:15.063 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 651246309612768282516409980821745220662113903279
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Feb 01 04:04:26 UTC 2023
           Final Date: Mon Jan 31 04:04:25 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [72:34:8b:81:77:cc:08:3d:e4:c3:8c:0a:50:99:a0:76:02:91:c8:67],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 27763a5d5bc119bef7f86d781887a3341e76a3db
                       533ae6dced05e6dc7e5e10e16366d390fab669c1
                       348ef971273d1d112928eb53b7456dccbe275427
                       c64557be44ff175cfc5bfb1301a718613dfa5787
                       73f822284613f4ccbc5b1d673f56ff355addf739
                       52ee20b9d2cf7aeb4f0a70a165995295b97bb40a
                       12df014e2d1d86b88a462fd7806564c385185ff5
                       ad8c82c0a03b994fd787a7c72881930186f14f4a
                       d0c64798e621004e18780d37432d9bbf2d19dbeb
                       d5c0021cc97ae47fcfbcb7288a1f6238dbf3ffe5
                       6eb4594288538104a21e5451e80194315b766fe2
                       55d09a5fb02e138747b9c41e3b8f2e7a3056d4ce
                       d6ccad6aec59224e2a8d5b7665942e21db94a394
                       288ce7426296b3d4698b040d4b2626e35c347510
                       84d8bb7f283dcb93e6e3c8d54bfe9e96aafeb7b7
                       d2b4fe01c03f989d2cabf85d9e2e8c763eaa5ecc
                       d8ece4d1f5dc0043593ac7724154f67e4073011e
                       3b8030f5d2a5a13bcc4e419757a645795ae4373e
                       153f9ea9cd0610efc806ec392fff0fadfa85b907
                       635720d3
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [10:5f:20:8b:99:98:a0:89:9d:d6:eb:f7:6f:22:89:0b:49:e6:02:eb],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-02-01 08:26:27.852  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-02-01 08:26:27.853 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-02-01 08:26:27.854 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2023-02-01 08:26:27.855 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-02-01 08:26:27.855  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2023-02-01 08:26:27.856  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-02-01 08:26:27.856  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-02-01 08:26:27.857 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-02-01 08:26:27.857 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-02-01 08:26:27.858 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-02-01 08:26:27.864 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-02-01 08:26:27.866 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-02-01 08:26:27.866 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-02-01 08:26:27.867 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-02-01 08:26:28.087  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-02-01 08:26:28.088  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-02-01 08:26:28.088 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-02-01 08:26:28.088 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-02-01 08:26:28.091  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-02-01 08:26:28.091  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-02-01 08:26:28.091 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-02-01 08:26:28.092 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-02-01 08:26:28.092 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-02-01 08:26:28.093 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-02-01 08:26:28.093 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-02-01 08:26:28.093 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-02-01 08:26:28.094 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-02-01 08:26:28.094 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-02-01 08:26:28.095 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-02-01 08:26:28.095 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-02-01 08:26:28.099 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 651246309612768282516409980821745220662113903279
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Feb 01 04:04:26 UTC 2023
           Final Date: Mon Jan 31 04:04:25 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [72:34:8b:81:77:cc:08:3d:e4:c3:8c:0a:50:99:a0:76:02:91:c8:67],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 27763a5d5bc119bef7f86d781887a3341e76a3db
                       533ae6dced05e6dc7e5e10e16366d390fab669c1
                       348ef971273d1d112928eb53b7456dccbe275427
                       c64557be44ff175cfc5bfb1301a718613dfa5787
                       73f822284613f4ccbc5b1d673f56ff355addf739
                       52ee20b9d2cf7aeb4f0a70a165995295b97bb40a
                       12df014e2d1d86b88a462fd7806564c385185ff5
                       ad8c82c0a03b994fd787a7c72881930186f14f4a
                       d0c64798e621004e18780d37432d9bbf2d19dbeb
                       d5c0021cc97ae47fcfbcb7288a1f6238dbf3ffe5
                       6eb4594288538104a21e5451e80194315b766fe2
                       55d09a5fb02e138747b9c41e3b8f2e7a3056d4ce
                       d6ccad6aec59224e2a8d5b7665942e21db94a394
                       288ce7426296b3d4698b040d4b2626e35c347510
                       84d8bb7f283dcb93e6e3c8d54bfe9e96aafeb7b7
                       d2b4fe01c03f989d2cabf85d9e2e8c763eaa5ecc
                       d8ece4d1f5dc0043593ac7724154f67e4073011e
                       3b8030f5d2a5a13bcc4e419757a645795ae4373e
                       153f9ea9cd0610efc806ec392fff0fadfa85b907
                       635720d3
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [55:21:8b:3d:12:f2:ed:d0:f4:f8:22:bd:82:a7:c6:27:91:29:e5:e6],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

]