Results

By type

          2022-05-03 05:03:31,632 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-05-03 05:03:32,897 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-05-03 05:03:33.651  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
May 03, 2022 5:03:35 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
May 03, 2022 5:03:35 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
May 03, 2022 5:03:35 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
May 03, 2022 5:03:35 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-05-03 05:03:36.032 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-05-03 05:03:36.321  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-05-03 05:03:36.487  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-05-03 05:03:37.099 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-05-03 05:03:37.101 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
2022-05-03 05:03:37.102 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-05-03 05:03:37.106 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-05-03 05:03:37.143 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2022-05-03 05:03:37.146 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
	{GET [/docs]}: redirectToUi(HttpServletRequest)
2022-05-03 05:03:37.266 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-05-03 05:03:37.793 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
May 03, 2022 5:03:38 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-05-03 05:03:38.612  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 7.765 seconds (JVM running for 9.48)
May 03, 2022 5:04:01 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-05-03 05:04:33.710  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-03 05:04:33.718 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-03 05:04:33.758 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-05-03 05:04:33.762 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-03 05:04:33.778  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-05-03 05:04:33.780  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-03 05:04:33.780  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-03 05:04:33.781 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-03 05:04:33.782 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-03 05:04:33.785 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-03 05:04:33.790 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-03 05:04:33.793 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-03 05:04:33.854 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-03 05:04:33.863 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-03 05:04:33.864 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-03 05:04:33.868 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-03 05:04:34.404  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-03 05:04:34.407  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-03 05:04:34.407 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-03 05:04:34.408 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-03 05:04:34.417  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-03 05:04:34.417  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-03 05:04:34.418 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-03 05:04:34.418 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-03 05:04:34.419 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-03 05:04:34.429 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-03 05:04:34.429 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-03 05:04:34.430 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-03 05:04:34.435 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-03 05:04:34.436 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-03 05:04:34.436 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-03 05:04:34.438 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-03 05:04:34.469 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 708949841114505327948607856442623942984266175621
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue May 03 05:01:39 UTC 2022
           Final Date: Sun May 02 05:01:38 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [20:bd:52:e8:58:76:59:de:ab:b3:0e:cb:08:fe:0f:77:7f:fe:85:b4]
            modulus: ad03a088c38826ac4e95a24aae7da5586db4d2a32d1011ad619a334392d27aee68db90f6293880907814076eebd81a803f8c3e05fe8b8158cf9f6a14555ec79c16497ee8e3ca68bbd02e50108d9e3a231d566358796747066798135dcebdb0b59c857ff86eb311086e82c02f4bca5ea609df4fda7116c5969ec9d99468ecf0c13b863bbe0233cc9ff0c062476125ec313f2c6eb53978cd3c513d963e50329921ea21fa6b65aebe26c11b55e06abdb5de9fbdeb96419c7dada18a29d70c946a0133d7647225645e9f1d4dcf1e27482cb8501ad2d9dae6b9ccce57d112f4bd70a6bcd67c7a224e681a9d6d4e89dc05c03f3bdb21a50969e89325f1b15ed86df9fb3442dbc4ab735ae4491387be556ea21cae266fdfbba54bd9cff9b336f512d96202d0de0764f589f6d1ac00c5b162becb9eea93159ba3ec565d6888c17d506b09551b281ab3e08eec95070d4e59f3f4640e7a0aa7870edf1f67d89ab260d2aa622f5cdf4f92147824a749df5cd72f98877424a3127d07a67711047fb60ec23cbb
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8c93233d4e70c0628f0c310251164c43852e1051
                       7add654bb513bc6e3c2998c305b60d49a3cbc640
                       9d95907381903677c9be461c116556ae99826f59
                       504962c0733c405a74caa8091f56fd3a0e1103f3
                       9ae70f6569f528a8817c49204665605f4e00b31f
                       5a877ae95ddf5e70e6a4c828ccf72baa9b976394
                       7e7b891ee564e91ef1b634798e929aea4909486b
                       1c17d7a1d846df029ed5664ac2843c0a1c1d1f18
                       4b3c1eae79b93294c62c5a4a57a0f81167970338
                       4f17d72d7cfdfb5b103c53577d0cb67d7c566752
                       a1c5dc7d9c562fec3e294d7a93ada64b3c150bcb
                       f3398067478d3a02b6256239fa4b2326146c84ba
                       6e18bb3374630bc17c5adee761fb5650555cc54d
                       191ce2b8b648ac6e26b28ea4277dce7c4d7ec3e4
                       c32ea050b754df46686fb8bcac7c48732eaa9bb5
                       8b4896e2ebfe3f23df476cc08fce78b778896cf5
                       cd8f69cac74a8079ba2a6a610c2f0e4c6f25f571
                       840d1e9547a92e2c4eb7829c2c661fa170ea25bb
                       b9294a99906dc03822ad245b56087f964c676e1c
                       89a40ba8
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [77:12:08:df:8c:7f:f9:bc:e3:cb:06:f5:fe:f6:92:8f:13:b7:a9:a5]
            modulus: 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
    public exponent: 10001

] 
2022-05-03 06:19:55.225  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-03 06:19:55.230 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-03 06:19:55.235 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-05-03 06:19:55.238 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-03 06:19:55.239  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-05-03 06:19:55.240  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-03 06:19:55.241  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-03 06:19:55.242 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-03 06:19:55.243 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-03 06:19:55.244 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-03 06:19:55.252 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-03 06:19:55.253 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-03 06:19:55.253 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-03 06:19:55.254 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-03 06:19:55.486  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-03 06:19:55.488  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-03 06:19:55.488 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-03 06:19:55.489 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-03 06:19:55.495  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-03 06:19:55.496  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-03 06:19:55.497 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-03 06:19:55.498 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-03 06:19:55.498 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-03 06:19:55.500 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-03 06:19:55.501 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-03 06:19:55.502 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-03 06:19:55.504 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-03 06:19:55.504 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-03 06:19:55.505 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-03 06:19:55.507 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-03 06:19:55.517 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 708949841114505327948607856442623942984266175621
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue May 03 05:01:39 UTC 2022
           Final Date: Sun May 02 05:01:38 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [20:bd:52:e8:58:76:59:de:ab:b3:0e:cb:08:fe:0f:77:7f:fe:85:b4]
            modulus: ad03a088c38826ac4e95a24aae7da5586db4d2a32d1011ad619a334392d27aee68db90f6293880907814076eebd81a803f8c3e05fe8b8158cf9f6a14555ec79c16497ee8e3ca68bbd02e50108d9e3a231d566358796747066798135dcebdb0b59c857ff86eb311086e82c02f4bca5ea609df4fda7116c5969ec9d99468ecf0c13b863bbe0233cc9ff0c062476125ec313f2c6eb53978cd3c513d963e50329921ea21fa6b65aebe26c11b55e06abdb5de9fbdeb96419c7dada18a29d70c946a0133d7647225645e9f1d4dcf1e27482cb8501ad2d9dae6b9ccce57d112f4bd70a6bcd67c7a224e681a9d6d4e89dc05c03f3bdb21a50969e89325f1b15ed86df9fb3442dbc4ab735ae4491387be556ea21cae266fdfbba54bd9cff9b336f512d96202d0de0764f589f6d1ac00c5b162becb9eea93159ba3ec565d6888c17d506b09551b281ab3e08eec95070d4e59f3f4640e7a0aa7870edf1f67d89ab260d2aa622f5cdf4f92147824a749df5cd72f98877424a3127d07a67711047fb60ec23cbb
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8c93233d4e70c0628f0c310251164c43852e1051
                       7add654bb513bc6e3c2998c305b60d49a3cbc640
                       9d95907381903677c9be461c116556ae99826f59
                       504962c0733c405a74caa8091f56fd3a0e1103f3
                       9ae70f6569f528a8817c49204665605f4e00b31f
                       5a877ae95ddf5e70e6a4c828ccf72baa9b976394
                       7e7b891ee564e91ef1b634798e929aea4909486b
                       1c17d7a1d846df029ed5664ac2843c0a1c1d1f18
                       4b3c1eae79b93294c62c5a4a57a0f81167970338
                       4f17d72d7cfdfb5b103c53577d0cb67d7c566752
                       a1c5dc7d9c562fec3e294d7a93ada64b3c150bcb
                       f3398067478d3a02b6256239fa4b2326146c84ba
                       6e18bb3374630bc17c5adee761fb5650555cc54d
                       191ce2b8b648ac6e26b28ea4277dce7c4d7ec3e4
                       c32ea050b754df46686fb8bcac7c48732eaa9bb5
                       8b4896e2ebfe3f23df476cc08fce78b778896cf5
                       cd8f69cac74a8079ba2a6a610c2f0e4c6f25f571
                       840d1e9547a92e2c4eb7829c2c661fa170ea25bb
                       b9294a99906dc03822ad245b56087f964c676e1c
                       89a40ba8
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [6c:5e:0f:fa:06:e7:33:cf:7e:28:7a:a9:f4:4d:a0:18:79:8a:09:33]
            modulus: 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
    public exponent: 10001

] 
2022-05-03 06:20:10.546  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-03 06:20:10.547 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-03 06:20:10.549 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-03 06:20:10.550 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-03 06:20:10.550  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-03 06:20:10.551  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-03 06:20:10.552  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-03 06:20:10.552 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-03 06:20:10.553 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-03 06:20:10.553 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-03 06:20:10.563 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-03 06:20:10.563 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-03 06:20:10.564 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-03 06:20:10.564 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-03 06:20:10.728  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-03 06:20:10.729  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-03 06:20:10.729 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-03 06:20:10.730 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-03 06:20:10.737  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-03 06:20:10.737  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-03 06:20:10.738 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-03 06:20:10.738 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-03 06:20:10.739 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-03 06:20:10.741 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-03 06:20:10.742 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-03 06:20:10.742 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-03 06:20:10.743 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-03 06:20:10.744 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-03 06:20:10.744 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-03 06:20:10.747 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-03 06:20:10.751 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 708949841114505327948607856442623942984266175621
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue May 03 05:01:39 UTC 2022
           Final Date: Sun May 02 05:01:38 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [20:bd:52:e8:58:76:59:de:ab:b3:0e:cb:08:fe:0f:77:7f:fe:85:b4]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8c93233d4e70c0628f0c310251164c43852e1051
                       7add654bb513bc6e3c2998c305b60d49a3cbc640
                       9d95907381903677c9be461c116556ae99826f59
                       504962c0733c405a74caa8091f56fd3a0e1103f3
                       9ae70f6569f528a8817c49204665605f4e00b31f
                       5a877ae95ddf5e70e6a4c828ccf72baa9b976394
                       7e7b891ee564e91ef1b634798e929aea4909486b
                       1c17d7a1d846df029ed5664ac2843c0a1c1d1f18
                       4b3c1eae79b93294c62c5a4a57a0f81167970338
                       4f17d72d7cfdfb5b103c53577d0cb67d7c566752
                       a1c5dc7d9c562fec3e294d7a93ada64b3c150bcb
                       f3398067478d3a02b6256239fa4b2326146c84ba
                       6e18bb3374630bc17c5adee761fb5650555cc54d
                       191ce2b8b648ac6e26b28ea4277dce7c4d7ec3e4
                       c32ea050b754df46686fb8bcac7c48732eaa9bb5
                       8b4896e2ebfe3f23df476cc08fce78b778896cf5
                       cd8f69cac74a8079ba2a6a610c2f0e4c6f25f571
                       840d1e9547a92e2c4eb7829c2c661fa170ea25bb
                       b9294a99906dc03822ad245b56087f964c676e1c
                       89a40ba8
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [20:9b:f4:55:e1:dd:70:db:9a:b9:57:8e:af:3b:43:3c:fb:9e:93:2f]
            modulus: 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
    public exponent: 10001

] 
2022-05-03 06:21:58.267  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-03 06:21:58.269 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-03 06:21:58.270 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-05-03 06:21:58.271 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-03 06:21:58.272  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-05-03 06:21:58.273  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-03 06:21:58.274  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-03 06:21:58.275 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-03 06:21:58.275 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-03 06:21:58.276 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-03 06:21:58.282 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-03 06:21:58.283 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-03 06:21:58.283 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-03 06:21:58.284 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-03 06:21:58.513  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-03 06:21:58.514  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-03 06:21:58.515 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-03 06:21:58.516 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-03 06:21:58.520  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-03 06:21:58.522  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-03 06:21:58.522 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-03 06:21:58.523 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-03 06:21:58.523 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-03 06:21:58.524 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-03 06:21:58.524 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-03 06:21:58.525 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-03 06:21:58.526 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-03 06:21:58.526 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-03 06:21:58.526 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-03 06:21:58.527 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-03 06:21:58.532 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 708949841114505327948607856442623942984266175621
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue May 03 05:01:39 UTC 2022
           Final Date: Sun May 02 05:01:38 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [20:bd:52:e8:58:76:59:de:ab:b3:0e:cb:08:fe:0f:77:7f:fe:85:b4]
            modulus: ad03a088c38826ac4e95a24aae7da5586db4d2a32d1011ad619a334392d27aee68db90f6293880907814076eebd81a803f8c3e05fe8b8158cf9f6a14555ec79c16497ee8e3ca68bbd02e50108d9e3a231d566358796747066798135dcebdb0b59c857ff86eb311086e82c02f4bca5ea609df4fda7116c5969ec9d99468ecf0c13b863bbe0233cc9ff0c062476125ec313f2c6eb53978cd3c513d963e50329921ea21fa6b65aebe26c11b55e06abdb5de9fbdeb96419c7dada18a29d70c946a0133d7647225645e9f1d4dcf1e27482cb8501ad2d9dae6b9ccce57d112f4bd70a6bcd67c7a224e681a9d6d4e89dc05c03f3bdb21a50969e89325f1b15ed86df9fb3442dbc4ab735ae4491387be556ea21cae266fdfbba54bd9cff9b336f512d96202d0de0764f589f6d1ac00c5b162becb9eea93159ba3ec565d6888c17d506b09551b281ab3e08eec95070d4e59f3f4640e7a0aa7870edf1f67d89ab260d2aa622f5cdf4f92147824a749df5cd72f98877424a3127d07a67711047fb60ec23cbb
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8c93233d4e70c0628f0c310251164c43852e1051
                       7add654bb513bc6e3c2998c305b60d49a3cbc640
                       9d95907381903677c9be461c116556ae99826f59
                       504962c0733c405a74caa8091f56fd3a0e1103f3
                       9ae70f6569f528a8817c49204665605f4e00b31f
                       5a877ae95ddf5e70e6a4c828ccf72baa9b976394
                       7e7b891ee564e91ef1b634798e929aea4909486b
                       1c17d7a1d846df029ed5664ac2843c0a1c1d1f18
                       4b3c1eae79b93294c62c5a4a57a0f81167970338
                       4f17d72d7cfdfb5b103c53577d0cb67d7c566752
                       a1c5dc7d9c562fec3e294d7a93ada64b3c150bcb
                       f3398067478d3a02b6256239fa4b2326146c84ba
                       6e18bb3374630bc17c5adee761fb5650555cc54d
                       191ce2b8b648ac6e26b28ea4277dce7c4d7ec3e4
                       c32ea050b754df46686fb8bcac7c48732eaa9bb5
                       8b4896e2ebfe3f23df476cc08fce78b778896cf5
                       cd8f69cac74a8079ba2a6a610c2f0e4c6f25f571
                       840d1e9547a92e2c4eb7829c2c661fa170ea25bb
                       b9294a99906dc03822ad245b56087f964c676e1c
                       89a40ba8
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [31:12:db:8e:e7:f4:61:00:42:03:53:42:43:41:62:65:07:c6:a3:5a]
            modulus: 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
    public exponent: 10001

] 
2022-05-03 06:22:56.954  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-03 06:22:56.957 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-03 06:22:56.961 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-05-03 06:22:56.963 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-03 06:22:56.964  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-05-03 06:22:56.965  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-03 06:22:56.966  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-03 06:22:56.966 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-03 06:22:56.967 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-03 06:22:56.967 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-03 06:22:56.974 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-03 06:22:56.974 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-03 06:22:56.974 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-03 06:22:56.975 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-03 06:22:57.098  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-03 06:22:57.099  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-03 06:22:57.100 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-03 06:22:57.100 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-03 06:22:57.102  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-03 06:22:57.102  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-03 06:22:57.103 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-03 06:22:57.103 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-03 06:22:57.104 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-03 06:22:57.105 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-03 06:22:57.105 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-03 06:22:57.105 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-03 06:22:57.106 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-03 06:22:57.107 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-03 06:22:57.107 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-03 06:22:57.108 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-03 06:22:57.112 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 708949841114505327948607856442623942984266175621
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue May 03 05:01:39 UTC 2022
           Final Date: Sun May 02 05:01:38 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [20:bd:52:e8:58:76:59:de:ab:b3:0e:cb:08:fe:0f:77:7f:fe:85:b4]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8c93233d4e70c0628f0c310251164c43852e1051
                       7add654bb513bc6e3c2998c305b60d49a3cbc640
                       9d95907381903677c9be461c116556ae99826f59
                       504962c0733c405a74caa8091f56fd3a0e1103f3
                       9ae70f6569f528a8817c49204665605f4e00b31f
                       5a877ae95ddf5e70e6a4c828ccf72baa9b976394
                       7e7b891ee564e91ef1b634798e929aea4909486b
                       1c17d7a1d846df029ed5664ac2843c0a1c1d1f18
                       4b3c1eae79b93294c62c5a4a57a0f81167970338
                       4f17d72d7cfdfb5b103c53577d0cb67d7c566752
                       a1c5dc7d9c562fec3e294d7a93ada64b3c150bcb
                       f3398067478d3a02b6256239fa4b2326146c84ba
                       6e18bb3374630bc17c5adee761fb5650555cc54d
                       191ce2b8b648ac6e26b28ea4277dce7c4d7ec3e4
                       c32ea050b754df46686fb8bcac7c48732eaa9bb5
                       8b4896e2ebfe3f23df476cc08fce78b778896cf5
                       cd8f69cac74a8079ba2a6a610c2f0e4c6f25f571
                       840d1e9547a92e2c4eb7829c2c661fa170ea25bb
                       b9294a99906dc03822ad245b56087f964c676e1c
                       89a40ba8
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [f8:50:70:f0:b7:c5:3c:5c:f2:8f:cb:30:d5:65:08:7c:58:eb:94:34]
            modulus: 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
    public exponent: 10001

] 
2022-05-03 06:24:58.004  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-03 06:24:58.008 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-03 06:24:58.011 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-03 06:24:58.011 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-03 06:24:58.012  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-03 06:24:58.013  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-03 06:24:58.013  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-03 06:24:58.014 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-03 06:24:58.014 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-03 06:24:58.015 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-03 06:24:58.021 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-03 06:24:58.022 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-03 06:24:58.022 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-03 06:24:58.022 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-03 06:24:58.282  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-03 06:24:58.284  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-03 06:24:58.285 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-03 06:24:58.285 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-03 06:24:58.287  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-03 06:24:58.287  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-03 06:24:58.288 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-03 06:24:58.288 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-03 06:24:58.289 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-03 06:24:58.290 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-03 06:24:58.290 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-03 06:24:58.290 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-03 06:24:58.291 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-03 06:24:58.292 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-03 06:24:58.292 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-03 06:24:58.293 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-03 06:24:58.298 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 708949841114505327948607856442623942984266175621
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue May 03 05:01:39 UTC 2022
           Final Date: Sun May 02 05:01:38 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [20:bd:52:e8:58:76:59:de:ab:b3:0e:cb:08:fe:0f:77:7f:fe:85:b4]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8c93233d4e70c0628f0c310251164c43852e1051
                       7add654bb513bc6e3c2998c305b60d49a3cbc640
                       9d95907381903677c9be461c116556ae99826f59
                       504962c0733c405a74caa8091f56fd3a0e1103f3
                       9ae70f6569f528a8817c49204665605f4e00b31f
                       5a877ae95ddf5e70e6a4c828ccf72baa9b976394
                       7e7b891ee564e91ef1b634798e929aea4909486b
                       1c17d7a1d846df029ed5664ac2843c0a1c1d1f18
                       4b3c1eae79b93294c62c5a4a57a0f81167970338
                       4f17d72d7cfdfb5b103c53577d0cb67d7c566752
                       a1c5dc7d9c562fec3e294d7a93ada64b3c150bcb
                       f3398067478d3a02b6256239fa4b2326146c84ba
                       6e18bb3374630bc17c5adee761fb5650555cc54d
                       191ce2b8b648ac6e26b28ea4277dce7c4d7ec3e4
                       c32ea050b754df46686fb8bcac7c48732eaa9bb5
                       8b4896e2ebfe3f23df476cc08fce78b778896cf5
                       cd8f69cac74a8079ba2a6a610c2f0e4c6f25f571
                       840d1e9547a92e2c4eb7829c2c661fa170ea25bb
                       b9294a99906dc03822ad245b56087f964c676e1c
                       89a40ba8
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [6a:bc:0c:1b:50:b4:ab:7e:c9:c7:d1:2b:0f:e5:e4:6e:82:58:ab:a6]
            modulus: c3d83d414229278e70f7007290be04b7b55f168133bef26aac94d6bcdd78390b8849590809d5b01c9cce488c9cbdfb71770fd778387ed46b95ceea02a23a12bbd6578fde80dc11a40960f1038666f99fc2ed9cd074dcc85169ef0c149e211ed8f4258b4cc78046e743647f02a13558c47d93e912c9745c15eb0bdc056a025fc04d593fa9410bc5ee7262e0e1dce78f08929ee1df4375981dfea4932f31bfd817ba505c8d52711de44943aedc26a685d7cd474a4c306ad46d40739d6d0c00c166a3e7da821b82eda0adf2f8635845f30b55d9a8cc6f1b31a3b140755bf6c45bf656d0a606a561db9401b89628ff46e8d2b8e39616d403b95937bf7f6ef990a265
    public exponent: 10001

] 
2022-05-03 06:25:08.679  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-03 06:25:08.680 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-03 06:25:08.682 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-05-03 06:25:08.683 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-03 06:25:08.683  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-05-03 06:25:08.684  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-03 06:25:08.684  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-03 06:25:08.685 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-03 06:25:08.685 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-03 06:25:08.686 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-03 06:25:08.692 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-03 06:25:08.692 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-03 06:25:08.693 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-03 06:25:08.693 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-03 06:25:08.825  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-03 06:25:08.826  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-03 06:25:08.826 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-03 06:25:08.826 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-03 06:25:08.828  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-03 06:25:08.828  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-03 06:25:08.829 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-03 06:25:08.846 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-03 06:25:08.846 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-03 06:25:08.847 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-03 06:25:08.847 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-03 06:25:08.848 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-03 06:25:08.849 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-03 06:25:08.849 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-03 06:25:08.849 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-03 06:25:08.850 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-03 06:25:08.855 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 708949841114505327948607856442623942984266175621
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue May 03 05:01:39 UTC 2022
           Final Date: Sun May 02 05:01:38 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [20:bd:52:e8:58:76:59:de:ab:b3:0e:cb:08:fe:0f:77:7f:fe:85:b4]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8c93233d4e70c0628f0c310251164c43852e1051
                       7add654bb513bc6e3c2998c305b60d49a3cbc640
                       9d95907381903677c9be461c116556ae99826f59
                       504962c0733c405a74caa8091f56fd3a0e1103f3
                       9ae70f6569f528a8817c49204665605f4e00b31f
                       5a877ae95ddf5e70e6a4c828ccf72baa9b976394
                       7e7b891ee564e91ef1b634798e929aea4909486b
                       1c17d7a1d846df029ed5664ac2843c0a1c1d1f18
                       4b3c1eae79b93294c62c5a4a57a0f81167970338
                       4f17d72d7cfdfb5b103c53577d0cb67d7c566752
                       a1c5dc7d9c562fec3e294d7a93ada64b3c150bcb
                       f3398067478d3a02b6256239fa4b2326146c84ba
                       6e18bb3374630bc17c5adee761fb5650555cc54d
                       191ce2b8b648ac6e26b28ea4277dce7c4d7ec3e4
                       c32ea050b754df46686fb8bcac7c48732eaa9bb5
                       8b4896e2ebfe3f23df476cc08fce78b778896cf5
                       cd8f69cac74a8079ba2a6a610c2f0e4c6f25f571
                       840d1e9547a92e2c4eb7829c2c661fa170ea25bb
                       b9294a99906dc03822ad245b56087f964c676e1c
                       89a40ba8
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [9f:af:27:d2:9b:0e:5a:40:10:13:66:56:da:78:53:a9:62:0f:06:53]
            modulus: f21b43a180964681e08447ad3ec22e774aaad977a82cf4c4d7d19c6a66c12fafbe9bd71a6dc59d774115398d839440233c0bdc1411b0d098d8e1eb732f150c1ffd595da4fccfeadf529bec6ea348f4e532ef01ec45f59e14ad46adc1e0ad58103bd0b1e3c86c34449e2684c359ad2ff2caf0de08836e4fd185f0178ecd80cfb26b19e867296da2ae9721f5028a142caed51c3869a42141bdff8e4335f96a7335d2665db2e5060f1644da2530f4667fb263bbda85bd47b4a71a2ff32b83b547537fe846f63a8f452364e39c44ac3315e9bb8e521bd6fc58e47e108ee8604fd5d7956a8a7f05b8548956df4562ac6e7af1c0f2339c30f29bfa650b974d16f4d563
    public exponent: 10001

] 
2022-05-03 06:25:25.789  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-03 06:25:25.793 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-03 06:25:25.796 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-05-03 06:25:25.797 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-03 06:25:25.797  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-05-03 06:25:25.798  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-03 06:25:25.798  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-03 06:25:25.799 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-03 06:25:25.799 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-03 06:25:25.800 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-03 06:25:25.804 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-03 06:25:25.805 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-03 06:25:25.806 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-03 06:25:25.806 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-03 06:25:25.953  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-03 06:25:25.956  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-03 06:25:25.956 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-03 06:25:25.957 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-03 06:25:25.959  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-03 06:25:25.959  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-03 06:25:25.960 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-03 06:25:25.960 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-03 06:25:25.960 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-03 06:25:25.961 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-03 06:25:25.961 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-03 06:25:25.962 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-03 06:25:25.963 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-03 06:25:25.963 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-03 06:25:25.964 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-03 06:25:25.966 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-03 06:25:25.971 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 708949841114505327948607856442623942984266175621
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue May 03 05:01:39 UTC 2022
           Final Date: Sun May 02 05:01:38 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [20:bd:52:e8:58:76:59:de:ab:b3:0e:cb:08:fe:0f:77:7f:fe:85:b4]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8c93233d4e70c0628f0c310251164c43852e1051
                       7add654bb513bc6e3c2998c305b60d49a3cbc640
                       9d95907381903677c9be461c116556ae99826f59
                       504962c0733c405a74caa8091f56fd3a0e1103f3
                       9ae70f6569f528a8817c49204665605f4e00b31f
                       5a877ae95ddf5e70e6a4c828ccf72baa9b976394
                       7e7b891ee564e91ef1b634798e929aea4909486b
                       1c17d7a1d846df029ed5664ac2843c0a1c1d1f18
                       4b3c1eae79b93294c62c5a4a57a0f81167970338
                       4f17d72d7cfdfb5b103c53577d0cb67d7c566752
                       a1c5dc7d9c562fec3e294d7a93ada64b3c150bcb
                       f3398067478d3a02b6256239fa4b2326146c84ba
                       6e18bb3374630bc17c5adee761fb5650555cc54d
                       191ce2b8b648ac6e26b28ea4277dce7c4d7ec3e4
                       c32ea050b754df46686fb8bcac7c48732eaa9bb5
                       8b4896e2ebfe3f23df476cc08fce78b778896cf5
                       cd8f69cac74a8079ba2a6a610c2f0e4c6f25f571
                       840d1e9547a92e2c4eb7829c2c661fa170ea25bb
                       b9294a99906dc03822ad245b56087f964c676e1c
                       89a40ba8
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [55:36:cf:c5:d3:24:fd:6c:90:1c:e1:7a:34:56:78:0f:98:5f:59:1f]
            modulus: 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
    public exponent: 10001

]