Results

By type

          2022-04-16 05:13:05,337 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-04-16 05:13:06,392 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-04-16 05:13:07.244  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Apr 16, 2022 5:13:09 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Apr 16, 2022 5:13:09 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Apr 16, 2022 5:13:09 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Apr 16, 2022 5:13:09 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-04-16 05:13:10.254 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-04-16 05:13:10.609  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-04-16 05:13:10.791  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-04-16 05:13:11.731 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-04-16 05:13:11.734 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
2022-04-16 05:13:11.735 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-04-16 05:13:11.740 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-04-16 05:13:11.791 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2022-04-16 05:13:11.796 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
	{GET [/docs]}: redirectToUi(HttpServletRequest)
2022-04-16 05:13:11.940 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-04-16 05:13:12.681 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Apr 16, 2022 5:13:13 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-04-16 05:13:13.692  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 9.184 seconds (JVM running for 11.066)
Apr 16, 2022 5:13:39 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-04-16 05:14:04.988  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-16 05:14:04.996 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-16 05:14:05.040 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-04-16 05:14:05.044 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-16 05:14:05.062  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-04-16 05:14:05.065  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-16 05:14:05.066  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-16 05:14:05.068 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-16 05:14:05.068 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-16 05:14:05.073 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-16 05:14:05.080 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-16 05:14:05.085 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-16 05:14:05.130 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-16 05:14:05.135 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-16 05:14:05.136 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-16 05:14:05.140 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-16 05:14:05.827  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-16 05:14:05.830  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-16 05:14:05.830 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-16 05:14:05.832 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-16 05:14:05.843  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-16 05:14:05.844  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-16 05:14:05.845 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-16 05:14:05.846 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-16 05:14:05.846 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-16 05:14:05.863 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-16 05:14:05.864 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-16 05:14:05.864 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-16 05:14:05.875 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-16 05:14:05.876 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-16 05:14:05.876 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-16 05:14:05.881 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-16 05:14:05.918 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 93835245517316104807799299576411046520884244723
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Apr 16 05:10:49 UTC 2022
           Final Date: Thu Apr 15 05:10:48 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [38:d0:d8:e7:a2:65:7f:95:ec:9e:13:09:07:c4:0f:ef:9f:c9:a9:cc]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 9940872bdb58e14d8138456eb0c474157a92c686
                       099ff60e7fdd897d8267d66a1fdc3b49b36c77b2
                       a837111122b908b991818b10354c89c502cf890a
                       7a7de583c13ff40af08721d75a5eb2596db61348
                       1351ea4023abe4ab2c6b1da46b0069089c4d5735
                       3b9f02f48c6ffdb86d0b90da41a4ad34dfcffc83
                       d9dc216495f08609983edb1e1572cc9468b40d47
                       1ff8af7f486facad4699576e64aca44ed355ecc8
                       bae0c48d39fe7c740ede03436bd2787b396e1996
                       b15b588aff53e5785640d8701fc2f0d4b2d58dc1
                       0d9554cf644b59a0e2e6b72d594adfc1c16527fc
                       63ce64e71b31d3266dbd12052247ae9ca02944b4
                       88e674980459894687d5f41364ee78dd1718c6e3
                       572bb4e2a22621ef55e2b3680045263d5efcfe54
                       9d754fa4085c69056db5a53820e502fbbeaae7d3
                       cb713af8875d91fb5ebe406098eab0c165b4ba33
                       85b2f9a4920513574428bc0056b162cb41340158
                       6a6e3f162c97b99f90b0ac3e4bd61b832b47cdbd
                       53a2ab938dbced63459bf41bef0c197c93632b6b
                       48ed6687
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [50:76:3f:c8:1f:d4:ed:b1:da:5d:db:e1:6c:b8:ee:df:f4:e5:07:60]
            modulus: ae180d86c426829abf1e1999b7cb1e42f64daf031d608e0fc622e10e96d352e89fb7269db2b0fe7532ce2ea7911dc334851879a0d1bf3636a8e694fdb6b552b737b053bfbcdf78fe163f011b9bf52728c4f13e668a0718e76013ac6ede90207156e26addb94f080338314293e1d56dc71b4a28d86d1b81b6e0b50e4ed67c5e328b526db754d42a7bf0b18c7bf356125fd261385f8fde1ec01d225ae072acba4671d06be05a9aa323c7aa74ef8c9ef833dc54f38fa6390ae9c767faf35714e4cf14acbbf637578bfbe686e8af66841302245fe179d4de3f08aec1ad9ad91607f50a729abbf1933a8c940a1751970d1e1250abe0a9798bb3694f86345bd15ca9fb
    public exponent: 10001

] 
2022-04-16 06:29:51.216  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-16 06:29:51.218 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-16 06:29:51.221 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-04-16 06:29:51.222 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-16 06:29:51.223  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-04-16 06:29:51.224  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-16 06:29:51.225  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-16 06:29:51.225 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-16 06:29:51.226 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-16 06:29:51.226 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-16 06:29:51.234 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-16 06:29:51.236 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-16 06:29:51.236 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-16 06:29:51.237 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-16 06:29:51.474  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-16 06:29:51.475  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-16 06:29:51.475 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-16 06:29:51.475 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-16 06:29:51.478  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-16 06:29:51.479  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-16 06:29:51.480 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-16 06:29:51.480 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-16 06:29:51.481 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-16 06:29:51.482 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-16 06:29:51.482 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-16 06:29:51.482 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-16 06:29:51.483 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-16 06:29:51.484 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-16 06:29:51.484 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-16 06:29:51.485 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-16 06:29:51.490 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 93835245517316104807799299576411046520884244723
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Apr 16 05:10:49 UTC 2022
           Final Date: Thu Apr 15 05:10:48 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [38:d0:d8:e7:a2:65:7f:95:ec:9e:13:09:07:c4:0f:ef:9f:c9:a9:cc]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 9940872bdb58e14d8138456eb0c474157a92c686
                       099ff60e7fdd897d8267d66a1fdc3b49b36c77b2
                       a837111122b908b991818b10354c89c502cf890a
                       7a7de583c13ff40af08721d75a5eb2596db61348
                       1351ea4023abe4ab2c6b1da46b0069089c4d5735
                       3b9f02f48c6ffdb86d0b90da41a4ad34dfcffc83
                       d9dc216495f08609983edb1e1572cc9468b40d47
                       1ff8af7f486facad4699576e64aca44ed355ecc8
                       bae0c48d39fe7c740ede03436bd2787b396e1996
                       b15b588aff53e5785640d8701fc2f0d4b2d58dc1
                       0d9554cf644b59a0e2e6b72d594adfc1c16527fc
                       63ce64e71b31d3266dbd12052247ae9ca02944b4
                       88e674980459894687d5f41364ee78dd1718c6e3
                       572bb4e2a22621ef55e2b3680045263d5efcfe54
                       9d754fa4085c69056db5a53820e502fbbeaae7d3
                       cb713af8875d91fb5ebe406098eab0c165b4ba33
                       85b2f9a4920513574428bc0056b162cb41340158
                       6a6e3f162c97b99f90b0ac3e4bd61b832b47cdbd
                       53a2ab938dbced63459bf41bef0c197c93632b6b
                       48ed6687
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [35:09:af:6e:da:a1:3f:0e:58:a3:ef:02:11:cc:5d:dc:34:fa:b6:4f]
            modulus: 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
    public exponent: 10001

] 
2022-04-16 06:30:08.735  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-16 06:30:08.736 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-16 06:30:08.741 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-16 06:30:08.743 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-16 06:30:08.743  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-16 06:30:08.745  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-16 06:30:08.746  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-16 06:30:08.746 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-16 06:30:08.747 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-16 06:30:08.748 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-16 06:30:08.758 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-16 06:30:08.760 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-16 06:30:08.760 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-16 06:30:08.761 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-16 06:30:08.916  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-16 06:30:08.917  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-16 06:30:08.918 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-16 06:30:08.918 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-16 06:30:08.921  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-16 06:30:08.921  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-16 06:30:08.922 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-16 06:30:08.922 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-16 06:30:08.922 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-16 06:30:08.924 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-16 06:30:08.924 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-16 06:30:08.924 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-16 06:30:08.925 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-16 06:30:08.926 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-16 06:30:08.926 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-16 06:30:08.927 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-16 06:30:08.935 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 93835245517316104807799299576411046520884244723
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Apr 16 05:10:49 UTC 2022
           Final Date: Thu Apr 15 05:10:48 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [38:d0:d8:e7:a2:65:7f:95:ec:9e:13:09:07:c4:0f:ef:9f:c9:a9:cc]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 9940872bdb58e14d8138456eb0c474157a92c686
                       099ff60e7fdd897d8267d66a1fdc3b49b36c77b2
                       a837111122b908b991818b10354c89c502cf890a
                       7a7de583c13ff40af08721d75a5eb2596db61348
                       1351ea4023abe4ab2c6b1da46b0069089c4d5735
                       3b9f02f48c6ffdb86d0b90da41a4ad34dfcffc83
                       d9dc216495f08609983edb1e1572cc9468b40d47
                       1ff8af7f486facad4699576e64aca44ed355ecc8
                       bae0c48d39fe7c740ede03436bd2787b396e1996
                       b15b588aff53e5785640d8701fc2f0d4b2d58dc1
                       0d9554cf644b59a0e2e6b72d594adfc1c16527fc
                       63ce64e71b31d3266dbd12052247ae9ca02944b4
                       88e674980459894687d5f41364ee78dd1718c6e3
                       572bb4e2a22621ef55e2b3680045263d5efcfe54
                       9d754fa4085c69056db5a53820e502fbbeaae7d3
                       cb713af8875d91fb5ebe406098eab0c165b4ba33
                       85b2f9a4920513574428bc0056b162cb41340158
                       6a6e3f162c97b99f90b0ac3e4bd61b832b47cdbd
                       53a2ab938dbced63459bf41bef0c197c93632b6b
                       48ed6687
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [c0:c7:4f:f1:c5:2d:34:02:e1:cf:e6:dc:eb:0f:02:f9:2b:e7:70:f7]
            modulus: a070b30db6ba2f9a4bfaad081564957b50f170d51362da42f3b3cfcabb56e77443593f2cfeedb483a65811982af8a5a447358171ada8e94805da4e035d5a9346d78cbbac5dc92bc6b51858aeff6440a17625a72db7d1a3ed8869059710d09c9863b4ae2d8d511471549caaa581a8ceb66ed68989f6b94400cc3cfd0acddcb0be21d46b6aa53345ae98e632c8f51b6e04324d23c7e36596283b2c302d304df1ce2595e75bea2d50d9bd6c55582c48405fa635ecfae3c88a384ba09693f7792fba90e606e3bfd7363696f080e85215b6fe0f31c18155b97369122570c500dbc77df826621585eee3f5694930467029549840cc6d22117d02f72b3dfcf4a8880f87
    public exponent: 10001

] 
2022-04-16 06:33:13.250  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-16 06:33:13.252 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-16 06:33:13.255 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-16 06:33:13.255 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-16 06:33:13.256  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-16 06:33:13.257  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-16 06:33:13.258  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-16 06:33:13.258 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-16 06:33:13.259 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-16 06:33:13.259 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-16 06:33:13.265 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-16 06:33:13.266 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-16 06:33:13.266 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-16 06:33:13.267 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-16 06:33:13.460  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-16 06:33:13.461  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-16 06:33:13.462 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-16 06:33:13.463 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-16 06:33:13.465  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-16 06:33:13.466  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-16 06:33:13.467 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-16 06:33:13.468 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-16 06:33:13.468 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-16 06:33:13.469 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-16 06:33:13.469 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-16 06:33:13.470 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-16 06:33:13.471 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-16 06:33:13.471 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-16 06:33:13.472 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-16 06:33:13.473 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-16 06:33:13.482 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 93835245517316104807799299576411046520884244723
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Apr 16 05:10:49 UTC 2022
           Final Date: Thu Apr 15 05:10:48 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [38:d0:d8:e7:a2:65:7f:95:ec:9e:13:09:07:c4:0f:ef:9f:c9:a9:cc]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 9940872bdb58e14d8138456eb0c474157a92c686
                       099ff60e7fdd897d8267d66a1fdc3b49b36c77b2
                       a837111122b908b991818b10354c89c502cf890a
                       7a7de583c13ff40af08721d75a5eb2596db61348
                       1351ea4023abe4ab2c6b1da46b0069089c4d5735
                       3b9f02f48c6ffdb86d0b90da41a4ad34dfcffc83
                       d9dc216495f08609983edb1e1572cc9468b40d47
                       1ff8af7f486facad4699576e64aca44ed355ecc8
                       bae0c48d39fe7c740ede03436bd2787b396e1996
                       b15b588aff53e5785640d8701fc2f0d4b2d58dc1
                       0d9554cf644b59a0e2e6b72d594adfc1c16527fc
                       63ce64e71b31d3266dbd12052247ae9ca02944b4
                       88e674980459894687d5f41364ee78dd1718c6e3
                       572bb4e2a22621ef55e2b3680045263d5efcfe54
                       9d754fa4085c69056db5a53820e502fbbeaae7d3
                       cb713af8875d91fb5ebe406098eab0c165b4ba33
                       85b2f9a4920513574428bc0056b162cb41340158
                       6a6e3f162c97b99f90b0ac3e4bd61b832b47cdbd
                       53a2ab938dbced63459bf41bef0c197c93632b6b
                       48ed6687
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [79:84:9e:3a:8a:0e:0c:a8:de:71:64:a4:77:3e:1e:be:5f:4b:cf:59]
            modulus: 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
    public exponent: 10001

] 
2022-04-16 06:34:30.120  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-16 06:34:30.122 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-16 06:34:30.124 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-04-16 06:34:30.125 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-16 06:34:30.126  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-04-16 06:34:30.126  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-16 06:34:30.127  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-16 06:34:30.127 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-16 06:34:30.128 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-16 06:34:30.128 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-16 06:34:30.136 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-16 06:34:30.137 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-16 06:34:30.138 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-16 06:34:30.138 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-16 06:34:30.311  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-16 06:34:30.312  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-16 06:34:30.313 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-16 06:34:30.313 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-16 06:34:30.315  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-16 06:34:30.315  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-16 06:34:30.316 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-16 06:34:30.316 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-16 06:34:30.317 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-16 06:34:30.318 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-16 06:34:30.318 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-16 06:34:30.318 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-16 06:34:30.319 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-16 06:34:30.319 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-16 06:34:30.320 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-16 06:34:30.321 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-16 06:34:30.326 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 93835245517316104807799299576411046520884244723
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Apr 16 05:10:49 UTC 2022
           Final Date: Thu Apr 15 05:10:48 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [38:d0:d8:e7:a2:65:7f:95:ec:9e:13:09:07:c4:0f:ef:9f:c9:a9:cc]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 9940872bdb58e14d8138456eb0c474157a92c686
                       099ff60e7fdd897d8267d66a1fdc3b49b36c77b2
                       a837111122b908b991818b10354c89c502cf890a
                       7a7de583c13ff40af08721d75a5eb2596db61348
                       1351ea4023abe4ab2c6b1da46b0069089c4d5735
                       3b9f02f48c6ffdb86d0b90da41a4ad34dfcffc83
                       d9dc216495f08609983edb1e1572cc9468b40d47
                       1ff8af7f486facad4699576e64aca44ed355ecc8
                       bae0c48d39fe7c740ede03436bd2787b396e1996
                       b15b588aff53e5785640d8701fc2f0d4b2d58dc1
                       0d9554cf644b59a0e2e6b72d594adfc1c16527fc
                       63ce64e71b31d3266dbd12052247ae9ca02944b4
                       88e674980459894687d5f41364ee78dd1718c6e3
                       572bb4e2a22621ef55e2b3680045263d5efcfe54
                       9d754fa4085c69056db5a53820e502fbbeaae7d3
                       cb713af8875d91fb5ebe406098eab0c165b4ba33
                       85b2f9a4920513574428bc0056b162cb41340158
                       6a6e3f162c97b99f90b0ac3e4bd61b832b47cdbd
                       53a2ab938dbced63459bf41bef0c197c93632b6b
                       48ed6687
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [83:bd:7f:3e:a4:c4:11:98:4a:9d:b6:eb:f4:89:bc:9b:7d:a0:ca:f2]
            modulus: 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
    public exponent: 10001

] 
2022-04-16 06:35:50.306  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-16 06:35:50.308 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-16 06:35:50.310 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-04-16 06:35:50.310 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-16 06:35:50.311  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-04-16 06:35:50.312  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-16 06:35:50.312  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-16 06:35:50.313 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-16 06:35:50.313 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-16 06:35:50.313 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-16 06:35:50.321 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-16 06:35:50.322 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-16 06:35:50.323 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-16 06:35:50.324 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-16 06:35:50.516  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-16 06:35:50.517  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-16 06:35:50.518 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-16 06:35:50.518 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-16 06:35:50.520  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-16 06:35:50.520  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-16 06:35:50.521 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-16 06:35:50.521 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-16 06:35:50.522 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-16 06:35:50.523 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-16 06:35:50.523 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-16 06:35:50.523 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-16 06:35:50.524 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-16 06:35:50.524 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-16 06:35:50.525 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-16 06:35:50.526 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-16 06:35:50.530 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 93835245517316104807799299576411046520884244723
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Apr 16 05:10:49 UTC 2022
           Final Date: Thu Apr 15 05:10:48 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [38:d0:d8:e7:a2:65:7f:95:ec:9e:13:09:07:c4:0f:ef:9f:c9:a9:cc]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 9940872bdb58e14d8138456eb0c474157a92c686
                       099ff60e7fdd897d8267d66a1fdc3b49b36c77b2
                       a837111122b908b991818b10354c89c502cf890a
                       7a7de583c13ff40af08721d75a5eb2596db61348
                       1351ea4023abe4ab2c6b1da46b0069089c4d5735
                       3b9f02f48c6ffdb86d0b90da41a4ad34dfcffc83
                       d9dc216495f08609983edb1e1572cc9468b40d47
                       1ff8af7f486facad4699576e64aca44ed355ecc8
                       bae0c48d39fe7c740ede03436bd2787b396e1996
                       b15b588aff53e5785640d8701fc2f0d4b2d58dc1
                       0d9554cf644b59a0e2e6b72d594adfc1c16527fc
                       63ce64e71b31d3266dbd12052247ae9ca02944b4
                       88e674980459894687d5f41364ee78dd1718c6e3
                       572bb4e2a22621ef55e2b3680045263d5efcfe54
                       9d754fa4085c69056db5a53820e502fbbeaae7d3
                       cb713af8875d91fb5ebe406098eab0c165b4ba33
                       85b2f9a4920513574428bc0056b162cb41340158
                       6a6e3f162c97b99f90b0ac3e4bd61b832b47cdbd
                       53a2ab938dbced63459bf41bef0c197c93632b6b
                       48ed6687
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ae:3e:45:c9:2b:2a:ed:71:1d:02:35:91:9c:58:da:8c:ea:b8:ce:28]
            modulus: ba4106ced42e42ede61766e3336acaf518e2c9d93f6a7d208cacf460408aa4a1749971f8e92db593bd04e86df596c6f03636782afe6229d0b4cb46d37cd7d25b0cc88e61d5a7a12b3167b3cbc5ee7951cfeb566eaa06b16ae109769c8bc692ab07e238f4fea5d058d54fa50e339f8038bf9128ddb95cf2948d39279c8d4c931a0815be6710e52d1b4b947177e60331d4f81ed0d6376140b2c1ef9a54b7ded7e62437116a51d5ffa8733959f94bb52f7020506989403ffc14471e6fc0d0a1240b5cb8336f46023e5f011ae233c3ddc7b75bf3f839041f91d2ff757e68dcf9faa8c75acec29cc933fa1b587e093a8cc2013f4520e76cf197e2d3a82c2690b6ee2b
    public exponent: 10001

] 
2022-04-16 06:36:11.826  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-16 06:36:11.828 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-16 06:36:11.830 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-04-16 06:36:11.831 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-16 06:36:11.831  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-04-16 06:36:11.832  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-16 06:36:11.832  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-16 06:36:11.833 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-16 06:36:11.833 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-16 06:36:11.834 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-16 06:36:11.844 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-16 06:36:11.849 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-16 06:36:11.849 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-16 06:36:11.850 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-16 06:36:12.005  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-16 06:36:12.006  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-16 06:36:12.007 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-16 06:36:12.007 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-16 06:36:12.009  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-16 06:36:12.010  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-16 06:36:12.011 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-16 06:36:12.012 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-16 06:36:12.012 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-16 06:36:12.013 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-16 06:36:12.014 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-16 06:36:12.015 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-16 06:36:12.015 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-16 06:36:12.016 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-16 06:36:12.016 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-16 06:36:12.017 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-16 06:36:12.021 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 93835245517316104807799299576411046520884244723
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Apr 16 05:10:49 UTC 2022
           Final Date: Thu Apr 15 05:10:48 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [38:d0:d8:e7:a2:65:7f:95:ec:9e:13:09:07:c4:0f:ef:9f:c9:a9:cc]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 9940872bdb58e14d8138456eb0c474157a92c686
                       099ff60e7fdd897d8267d66a1fdc3b49b36c77b2
                       a837111122b908b991818b10354c89c502cf890a
                       7a7de583c13ff40af08721d75a5eb2596db61348
                       1351ea4023abe4ab2c6b1da46b0069089c4d5735
                       3b9f02f48c6ffdb86d0b90da41a4ad34dfcffc83
                       d9dc216495f08609983edb1e1572cc9468b40d47
                       1ff8af7f486facad4699576e64aca44ed355ecc8
                       bae0c48d39fe7c740ede03436bd2787b396e1996
                       b15b588aff53e5785640d8701fc2f0d4b2d58dc1
                       0d9554cf644b59a0e2e6b72d594adfc1c16527fc
                       63ce64e71b31d3266dbd12052247ae9ca02944b4
                       88e674980459894687d5f41364ee78dd1718c6e3
                       572bb4e2a22621ef55e2b3680045263d5efcfe54
                       9d754fa4085c69056db5a53820e502fbbeaae7d3
                       cb713af8875d91fb5ebe406098eab0c165b4ba33
                       85b2f9a4920513574428bc0056b162cb41340158
                       6a6e3f162c97b99f90b0ac3e4bd61b832b47cdbd
                       53a2ab938dbced63459bf41bef0c197c93632b6b
                       48ed6687
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [7d:3a:fe:da:4e:88:fd:af:dc:aa:67:a6:b0:e5:e8:cf:dd:f5:4c:47]
            modulus: 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
    public exponent: 10001

] 
2022-04-16 06:36:12.087  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-16 06:36:12.088 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-16 06:36:12.090 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-04-16 06:36:12.091 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-16 06:36:12.091  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-04-16 06:36:12.092  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-16 06:36:12.092  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-16 06:36:12.093 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-16 06:36:12.093 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-16 06:36:12.094 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-16 06:36:12.098 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-16 06:36:12.099 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-16 06:36:12.099 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-16 06:36:12.099 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-16 06:36:12.192  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-16 06:36:12.194  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-16 06:36:12.194 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-16 06:36:12.194 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-16 06:36:12.196  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-16 06:36:12.197  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-16 06:36:12.198 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-16 06:36:12.198 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-16 06:36:12.199 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-16 06:36:12.200 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-16 06:36:12.200 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-16 06:36:12.200 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-16 06:36:12.201 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-16 06:36:12.201 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-16 06:36:12.202 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-16 06:36:12.202 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-16 06:36:12.209 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 93835245517316104807799299576411046520884244723
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Apr 16 05:10:49 UTC 2022
           Final Date: Thu Apr 15 05:10:48 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [38:d0:d8:e7:a2:65:7f:95:ec:9e:13:09:07:c4:0f:ef:9f:c9:a9:cc]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 9940872bdb58e14d8138456eb0c474157a92c686
                       099ff60e7fdd897d8267d66a1fdc3b49b36c77b2
                       a837111122b908b991818b10354c89c502cf890a
                       7a7de583c13ff40af08721d75a5eb2596db61348
                       1351ea4023abe4ab2c6b1da46b0069089c4d5735
                       3b9f02f48c6ffdb86d0b90da41a4ad34dfcffc83
                       d9dc216495f08609983edb1e1572cc9468b40d47
                       1ff8af7f486facad4699576e64aca44ed355ecc8
                       bae0c48d39fe7c740ede03436bd2787b396e1996
                       b15b588aff53e5785640d8701fc2f0d4b2d58dc1
                       0d9554cf644b59a0e2e6b72d594adfc1c16527fc
                       63ce64e71b31d3266dbd12052247ae9ca02944b4
                       88e674980459894687d5f41364ee78dd1718c6e3
                       572bb4e2a22621ef55e2b3680045263d5efcfe54
                       9d754fa4085c69056db5a53820e502fbbeaae7d3
                       cb713af8875d91fb5ebe406098eab0c165b4ba33
                       85b2f9a4920513574428bc0056b162cb41340158
                       6a6e3f162c97b99f90b0ac3e4bd61b832b47cdbd
                       53a2ab938dbced63459bf41bef0c197c93632b6b
                       48ed6687
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [86:f8:cc:90:f4:10:28:4e:90:84:8d:bc:7b:85:57:d8:6a:61:4a:30]
            modulus: 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
    public exponent: 10001

] 
2022-04-16 06:38:33.990  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-16 06:38:33.993 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-16 06:38:33.995 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-16 06:38:33.996 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-16 06:38:33.997  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-16 06:38:33.998  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-16 06:38:33.999  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-16 06:38:33.999 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-16 06:38:34.000 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-16 06:38:34.000 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-16 06:38:34.009 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-16 06:38:34.010 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-16 06:38:34.011 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-16 06:38:34.011 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-16 06:38:34.181  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-16 06:38:34.182  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-16 06:38:34.183 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-16 06:38:34.184 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-16 06:38:34.185  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-16 06:38:34.186  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-16 06:38:34.187 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-16 06:38:34.187 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-16 06:38:34.187 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-16 06:38:34.188 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-16 06:38:34.189 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-16 06:38:34.189 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-16 06:38:34.190 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-16 06:38:34.191 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-16 06:38:34.192 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-16 06:38:34.193 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-16 06:38:34.199 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 93835245517316104807799299576411046520884244723
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Apr 16 05:10:49 UTC 2022
           Final Date: Thu Apr 15 05:10:48 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [38:d0:d8:e7:a2:65:7f:95:ec:9e:13:09:07:c4:0f:ef:9f:c9:a9:cc]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 9940872bdb58e14d8138456eb0c474157a92c686
                       099ff60e7fdd897d8267d66a1fdc3b49b36c77b2
                       a837111122b908b991818b10354c89c502cf890a
                       7a7de583c13ff40af08721d75a5eb2596db61348
                       1351ea4023abe4ab2c6b1da46b0069089c4d5735
                       3b9f02f48c6ffdb86d0b90da41a4ad34dfcffc83
                       d9dc216495f08609983edb1e1572cc9468b40d47
                       1ff8af7f486facad4699576e64aca44ed355ecc8
                       bae0c48d39fe7c740ede03436bd2787b396e1996
                       b15b588aff53e5785640d8701fc2f0d4b2d58dc1
                       0d9554cf644b59a0e2e6b72d594adfc1c16527fc
                       63ce64e71b31d3266dbd12052247ae9ca02944b4
                       88e674980459894687d5f41364ee78dd1718c6e3
                       572bb4e2a22621ef55e2b3680045263d5efcfe54
                       9d754fa4085c69056db5a53820e502fbbeaae7d3
                       cb713af8875d91fb5ebe406098eab0c165b4ba33
                       85b2f9a4920513574428bc0056b162cb41340158
                       6a6e3f162c97b99f90b0ac3e4bd61b832b47cdbd
                       53a2ab938dbced63459bf41bef0c197c93632b6b
                       48ed6687
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [c6:e5:01:1f:c8:a4:54:86:8b:a3:41:17:eb:15:d4:f6:15:bf:09:a2]
            modulus: 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
    public exponent: 10001

] 
2022-04-16 06:43:05.887  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-16 06:43:05.889 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-16 06:43:05.890 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-16 06:43:05.891 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-16 06:43:05.891  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-16 06:43:05.892  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-16 06:43:05.892  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-16 06:43:05.892 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-16 06:43:05.893 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-16 06:43:05.893 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-16 06:43:05.898 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-16 06:43:05.898 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-16 06:43:05.898 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-16 06:43:05.899 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-16 06:43:06.073  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-16 06:43:06.074  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-16 06:43:06.074 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-16 06:43:06.074 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-16 06:43:06.076  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-16 06:43:06.076  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-16 06:43:06.076 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-16 06:43:06.076 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-16 06:43:06.077 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-16 06:43:06.078 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-16 06:43:06.078 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-16 06:43:06.078 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-16 06:43:06.078 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-16 06:43:06.079 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-16 06:43:06.079 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-16 06:43:06.080 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-16 06:43:06.083 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 93835245517316104807799299576411046520884244723
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Apr 16 05:10:49 UTC 2022
           Final Date: Thu Apr 15 05:10:48 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [38:d0:d8:e7:a2:65:7f:95:ec:9e:13:09:07:c4:0f:ef:9f:c9:a9:cc]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 9940872bdb58e14d8138456eb0c474157a92c686
                       099ff60e7fdd897d8267d66a1fdc3b49b36c77b2
                       a837111122b908b991818b10354c89c502cf890a
                       7a7de583c13ff40af08721d75a5eb2596db61348
                       1351ea4023abe4ab2c6b1da46b0069089c4d5735
                       3b9f02f48c6ffdb86d0b90da41a4ad34dfcffc83
                       d9dc216495f08609983edb1e1572cc9468b40d47
                       1ff8af7f486facad4699576e64aca44ed355ecc8
                       bae0c48d39fe7c740ede03436bd2787b396e1996
                       b15b588aff53e5785640d8701fc2f0d4b2d58dc1
                       0d9554cf644b59a0e2e6b72d594adfc1c16527fc
                       63ce64e71b31d3266dbd12052247ae9ca02944b4
                       88e674980459894687d5f41364ee78dd1718c6e3
                       572bb4e2a22621ef55e2b3680045263d5efcfe54
                       9d754fa4085c69056db5a53820e502fbbeaae7d3
                       cb713af8875d91fb5ebe406098eab0c165b4ba33
                       85b2f9a4920513574428bc0056b162cb41340158
                       6a6e3f162c97b99f90b0ac3e4bd61b832b47cdbd
                       53a2ab938dbced63459bf41bef0c197c93632b6b
                       48ed6687
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [02:f9:5e:a1:e9:b3:b3:cf:08:c0:26:0c:38:a6:74:78:8e:d1:06:bc]
            modulus: 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
    public exponent: 10001

] 
2022-04-16 06:57:08.588  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-16 06:57:08.591 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-16 06:57:08.593 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-04-16 06:57:08.594 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-16 06:57:08.595  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-04-16 06:57:08.595  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-16 06:57:08.596  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-16 06:57:08.596 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-16 06:57:08.597 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-16 06:57:08.597 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-16 06:57:08.602 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-16 06:57:08.603 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-16 06:57:08.604 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-16 06:57:08.604 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-16 06:57:08.757  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-16 06:57:08.759  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-16 06:57:08.759 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-16 06:57:08.759 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-16 06:57:08.761  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-16 06:57:08.762  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-16 06:57:08.762 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-16 06:57:08.762 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-16 06:57:08.763 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-16 06:57:08.764 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-16 06:57:08.764 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-16 06:57:08.764 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-16 06:57:08.765 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-16 06:57:08.765 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-16 06:57:08.765 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-16 06:57:08.766 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-16 06:57:08.770 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 93835245517316104807799299576411046520884244723
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Apr 16 05:10:49 UTC 2022
           Final Date: Thu Apr 15 05:10:48 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [38:d0:d8:e7:a2:65:7f:95:ec:9e:13:09:07:c4:0f:ef:9f:c9:a9:cc]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 9940872bdb58e14d8138456eb0c474157a92c686
                       099ff60e7fdd897d8267d66a1fdc3b49b36c77b2
                       a837111122b908b991818b10354c89c502cf890a
                       7a7de583c13ff40af08721d75a5eb2596db61348
                       1351ea4023abe4ab2c6b1da46b0069089c4d5735
                       3b9f02f48c6ffdb86d0b90da41a4ad34dfcffc83
                       d9dc216495f08609983edb1e1572cc9468b40d47
                       1ff8af7f486facad4699576e64aca44ed355ecc8
                       bae0c48d39fe7c740ede03436bd2787b396e1996
                       b15b588aff53e5785640d8701fc2f0d4b2d58dc1
                       0d9554cf644b59a0e2e6b72d594adfc1c16527fc
                       63ce64e71b31d3266dbd12052247ae9ca02944b4
                       88e674980459894687d5f41364ee78dd1718c6e3
                       572bb4e2a22621ef55e2b3680045263d5efcfe54
                       9d754fa4085c69056db5a53820e502fbbeaae7d3
                       cb713af8875d91fb5ebe406098eab0c165b4ba33
                       85b2f9a4920513574428bc0056b162cb41340158
                       6a6e3f162c97b99f90b0ac3e4bd61b832b47cdbd
                       53a2ab938dbced63459bf41bef0c197c93632b6b
                       48ed6687
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [0a:66:c8:a5:5c:ac:33:b6:99:d2:12:ae:3e:ad:79:9d:e4:10:a7:61]
            modulus: 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
    public exponent: 10001

] 
2022-04-16 06:57:26.813  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-16 06:57:26.814 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-16 06:57:26.816 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-04-16 06:57:26.816 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-16 06:57:26.817  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-04-16 06:57:26.817  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-16 06:57:26.817  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-16 06:57:26.818 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-16 06:57:26.818 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-16 06:57:26.818 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-16 06:57:26.823 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-16 06:57:26.823 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-16 06:57:26.824 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-16 06:57:26.824 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-16 06:57:26.922  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-16 06:57:26.923  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-16 06:57:26.923 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-16 06:57:26.924 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-16 06:57:26.925  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-16 06:57:26.926  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-16 06:57:26.926 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-16 06:57:26.926 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-16 06:57:26.926 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-16 06:57:26.927 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-16 06:57:26.927 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-16 06:57:26.928 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-16 06:57:26.928 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-16 06:57:26.929 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-16 06:57:26.929 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-16 06:57:26.930 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-16 06:57:26.934 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 93835245517316104807799299576411046520884244723
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Apr 16 05:10:49 UTC 2022
           Final Date: Thu Apr 15 05:10:48 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [38:d0:d8:e7:a2:65:7f:95:ec:9e:13:09:07:c4:0f:ef:9f:c9:a9:cc]
            modulus: b1b4079b2fc11ca436c20b2abf80151decddd083c1369fddccc475dffb4751bb48084c4463a39ca0c6ac6aa9cf671a5f2d5117b3f327648e9493543ffccd7ca7977b093e8f7b9de64580f76e868d82d9a9c6aa42eba5f12bef4436e66c1004c36d5666a51994dc2ea55d6e96dd783d86f0b3655ed3f27d3cf6879a5567853ba049d13114c5dab32763fed3cb5d8f6fffcf1c6960fb64dbe07591723c0bf3cfe35cd87b290de60268a40cb2358ec11f4ba4a0df0fc57eea03428acf52d706d380a638a3394a49efc3fb03b70aca7f6f69dfae067ae574a33605b87300e1360ae4bce3f85565e5f32091c46268943d5d293b24d7637c5b28a2d80ddd1f51e7b2880a240112c9ac8002c739e657e26c1e01404de3c26bcd4862331d265463346725dcf53154037644397bfed8f249cf8d25dbf0d511e1375975c58a90839baa580b481387ed26c85397e91942f6660aa794c1bbfa6efee09372f27a52b9abfc87e2602bbc4805981b7b22ae91bad254b215e6ae67bd261ac5d322ab743b8ae369db
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 9940872bdb58e14d8138456eb0c474157a92c686
                       099ff60e7fdd897d8267d66a1fdc3b49b36c77b2
                       a837111122b908b991818b10354c89c502cf890a
                       7a7de583c13ff40af08721d75a5eb2596db61348
                       1351ea4023abe4ab2c6b1da46b0069089c4d5735
                       3b9f02f48c6ffdb86d0b90da41a4ad34dfcffc83
                       d9dc216495f08609983edb1e1572cc9468b40d47
                       1ff8af7f486facad4699576e64aca44ed355ecc8
                       bae0c48d39fe7c740ede03436bd2787b396e1996
                       b15b588aff53e5785640d8701fc2f0d4b2d58dc1
                       0d9554cf644b59a0e2e6b72d594adfc1c16527fc
                       63ce64e71b31d3266dbd12052247ae9ca02944b4
                       88e674980459894687d5f41364ee78dd1718c6e3
                       572bb4e2a22621ef55e2b3680045263d5efcfe54
                       9d754fa4085c69056db5a53820e502fbbeaae7d3
                       cb713af8875d91fb5ebe406098eab0c165b4ba33
                       85b2f9a4920513574428bc0056b162cb41340158
                       6a6e3f162c97b99f90b0ac3e4bd61b832b47cdbd
                       53a2ab938dbced63459bf41bef0c197c93632b6b
                       48ed6687
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [5e:7b:8c:6a:49:5d:79:4d:b7:92:5e:1a:b4:0f:8a:56:e7:57:5e:cc]
            modulus: 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
    public exponent: 10001

]