Results

By type

          2022-09-23 20:11:50,746 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-09-23 20:11:51,694 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-09-23 20:11:52.391  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Sep 23, 2022 8:11:54 PM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Sep 23, 2022 8:11:54 PM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Sep 23, 2022 8:11:54 PM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Sep 23, 2022 8:11:54 PM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-09-23 20:11:54.893 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-09-23 20:11:55.203  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-09-23 20:11:55.389  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-09-23 20:11:56.087 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-09-23 20:11:56.089 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
2022-09-23 20:11:56.091 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-09-23 20:11:56.095 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-09-23 20:11:56.134 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2022-09-23 20:11:56.137 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
	{GET [/docs]}: redirectToUi(HttpServletRequest)
2022-09-23 20:11:56.260 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-09-23 20:11:56.819 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Sep 23, 2022 8:11:57 PM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-09-23 20:11:57.825  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 7.813 seconds (JVM running for 9.705)
Sep 23, 2022 8:12:26 PM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-09-23 20:12:39.713  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-09-23 20:12:39.722 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-09-23 20:12:39.760 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-09-23 20:12:39.764 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-09-23 20:12:39.780  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-09-23 20:12:39.783  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-09-23 20:12:39.783  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-09-23 20:12:39.784 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-09-23 20:12:39.785 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-09-23 20:12:39.789 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-09-23 20:12:39.794 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-09-23 20:12:39.797 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-09-23 20:12:39.830 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-09-23 20:12:39.834 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-09-23 20:12:39.835 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-09-23 20:12:39.838 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-09-23 20:12:40.277  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-09-23 20:12:40.280  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-09-23 20:12:40.281 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-09-23 20:12:40.282 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-09-23 20:12:40.291  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-09-23 20:12:40.292  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-09-23 20:12:40.293 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-09-23 20:12:40.294 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-09-23 20:12:40.294 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-09-23 20:12:40.307 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-09-23 20:12:40.308 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-09-23 20:12:40.309 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-09-23 20:12:40.317 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-09-23 20:12:40.318 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-09-23 20:12:40.319 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-09-23 20:12:40.322 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-09-23 20:12:40.355 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 374075419081502992767481019490547579506458829245
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Sep 23 20:09:45 UTC 2022
           Final Date: Wed Sep 22 20:09:44 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [fd:62:e1:ca:12:9f:02:99:cc:e6:e4:55:34:6c:9b:ad:df:25:7b:56]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: d2d382ca9b6783efc3ea186cda62f75981698d22
                       9748e6b9208b9833d1ef2e83c8b0032a9819537f
                       4879716b62107b1b8c24c096793ba0f001622c00
                       2a7e3f883b45bba6683bef8ab102e7a373b50fc0
                       db805b23cd93baa66fa1f5ba3e3e067e4abe0d79
                       e491a49fef061f0065b2ac18df9a8884bb5714e3
                       915ab48eeeaf4b9c90e6cde25a06d12ae0e384ea
                       25d21e803fe1b79a334709f24fe7b5d3f7979de5
                       845c4abb7c6ba033ab03d19f5d53559a38794189
                       bfe83fa88ccda7812db7f41c770d3e8bac629966
                       7db6e3ae17f8d02c5e843175839dced8f42d860c
                       d42ca0f4782b66fee35115b9e7bbf44a840a5ab6
                       5d660fd45a47b3005d5dece0495906e8b71a049e
                       2cfb9fc7c20630637049951bd3dd1d9dcbde4a6c
                       50423138ba637bfa867211aa8b39391e7a3a022f
                       cf543df37336cca52c54e0f94fc6f7fc355b3cdb
                       4121bdac8f95e47b8244b0e0a01a7c48a88caf9d
                       74a7b8886741ebca8bff7b4eb0ad670c349e8457
                       37cac9477863c94930e9e40dbaf68c58498164cf
                       dd13741b
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [18:c9:0d:f2:9b:b4:4e:3f:dd:1d:96:1c:b2:23:38:47:69:e0:4c:cb]
            modulus: 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
    public exponent: 10001

] 
2022-09-23 22:31:52.072  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-09-23 22:31:52.076 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-09-23 22:31:52.080 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-09-23 22:31:52.081 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-09-23 22:31:52.082  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-09-23 22:31:52.083  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-09-23 22:31:52.085  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-09-23 22:31:52.086 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-09-23 22:31:52.087 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-09-23 22:31:52.088 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-09-23 22:31:52.107 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-09-23 22:31:52.109 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-09-23 22:31:52.110 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-09-23 22:31:52.112 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-09-23 22:31:52.357  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-09-23 22:31:52.358  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-09-23 22:31:52.358 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-09-23 22:31:52.359 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-09-23 22:31:52.362  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-09-23 22:31:52.362  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-09-23 22:31:52.363 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-09-23 22:31:52.364 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-09-23 22:31:52.364 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-09-23 22:31:52.366 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-09-23 22:31:52.366 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-09-23 22:31:52.367 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-09-23 22:31:52.369 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-09-23 22:31:52.369 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-09-23 22:31:52.370 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-09-23 22:31:52.372 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-09-23 22:31:52.380 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 374075419081502992767481019490547579506458829245
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Sep 23 20:09:45 UTC 2022
           Final Date: Wed Sep 22 20:09:44 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [fd:62:e1:ca:12:9f:02:99:cc:e6:e4:55:34:6c:9b:ad:df:25:7b:56]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: d2d382ca9b6783efc3ea186cda62f75981698d22
                       9748e6b9208b9833d1ef2e83c8b0032a9819537f
                       4879716b62107b1b8c24c096793ba0f001622c00
                       2a7e3f883b45bba6683bef8ab102e7a373b50fc0
                       db805b23cd93baa66fa1f5ba3e3e067e4abe0d79
                       e491a49fef061f0065b2ac18df9a8884bb5714e3
                       915ab48eeeaf4b9c90e6cde25a06d12ae0e384ea
                       25d21e803fe1b79a334709f24fe7b5d3f7979de5
                       845c4abb7c6ba033ab03d19f5d53559a38794189
                       bfe83fa88ccda7812db7f41c770d3e8bac629966
                       7db6e3ae17f8d02c5e843175839dced8f42d860c
                       d42ca0f4782b66fee35115b9e7bbf44a840a5ab6
                       5d660fd45a47b3005d5dece0495906e8b71a049e
                       2cfb9fc7c20630637049951bd3dd1d9dcbde4a6c
                       50423138ba637bfa867211aa8b39391e7a3a022f
                       cf543df37336cca52c54e0f94fc6f7fc355b3cdb
                       4121bdac8f95e47b8244b0e0a01a7c48a88caf9d
                       74a7b8886741ebca8bff7b4eb0ad670c349e8457
                       37cac9477863c94930e9e40dbaf68c58498164cf
                       dd13741b
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [47:44:c3:bb:5b:14:36:a8:65:cd:a0:f3:29:c5:34:51:1c:75:87:3e]
            modulus: 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
    public exponent: 10001

] 
2022-09-23 22:33:42.151  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-09-23 22:33:42.152 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-09-23 22:33:42.157 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-09-23 22:33:42.159 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-09-23 22:33:42.159  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-09-23 22:33:42.160  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-09-23 22:33:42.161  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-09-23 22:33:42.161 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-09-23 22:33:42.162 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-09-23 22:33:42.162 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-09-23 22:33:42.191 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-09-23 22:33:42.194 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-09-23 22:33:42.194 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-09-23 22:33:42.195 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-09-23 22:33:42.338  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-09-23 22:33:42.339  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-09-23 22:33:42.339 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-09-23 22:33:42.339 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-09-23 22:33:42.342  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-09-23 22:33:42.343  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-09-23 22:33:42.343 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-09-23 22:33:42.343 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-09-23 22:33:42.344 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-09-23 22:33:42.345 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-09-23 22:33:42.345 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-09-23 22:33:42.345 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-09-23 22:33:42.346 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-09-23 22:33:42.346 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-09-23 22:33:42.347 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-09-23 22:33:42.348 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-09-23 22:33:42.351 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 374075419081502992767481019490547579506458829245
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Sep 23 20:09:45 UTC 2022
           Final Date: Wed Sep 22 20:09:44 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [fd:62:e1:ca:12:9f:02:99:cc:e6:e4:55:34:6c:9b:ad:df:25:7b:56]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: d2d382ca9b6783efc3ea186cda62f75981698d22
                       9748e6b9208b9833d1ef2e83c8b0032a9819537f
                       4879716b62107b1b8c24c096793ba0f001622c00
                       2a7e3f883b45bba6683bef8ab102e7a373b50fc0
                       db805b23cd93baa66fa1f5ba3e3e067e4abe0d79
                       e491a49fef061f0065b2ac18df9a8884bb5714e3
                       915ab48eeeaf4b9c90e6cde25a06d12ae0e384ea
                       25d21e803fe1b79a334709f24fe7b5d3f7979de5
                       845c4abb7c6ba033ab03d19f5d53559a38794189
                       bfe83fa88ccda7812db7f41c770d3e8bac629966
                       7db6e3ae17f8d02c5e843175839dced8f42d860c
                       d42ca0f4782b66fee35115b9e7bbf44a840a5ab6
                       5d660fd45a47b3005d5dece0495906e8b71a049e
                       2cfb9fc7c20630637049951bd3dd1d9dcbde4a6c
                       50423138ba637bfa867211aa8b39391e7a3a022f
                       cf543df37336cca52c54e0f94fc6f7fc355b3cdb
                       4121bdac8f95e47b8244b0e0a01a7c48a88caf9d
                       74a7b8886741ebca8bff7b4eb0ad670c349e8457
                       37cac9477863c94930e9e40dbaf68c58498164cf
                       dd13741b
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [a1:2e:72:e3:cc:2d:79:db:b1:74:ec:2f:94:02:0a:73:41:39:1c:be]
            modulus: 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
    public exponent: 10001

] 
2022-09-23 22:34:57.703  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-09-23 22:34:57.706 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-09-23 22:34:57.708 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-09-23 22:34:57.709 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-09-23 22:34:57.710  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-09-23 22:34:57.711  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-09-23 22:34:57.711  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-09-23 22:34:57.711 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-09-23 22:34:57.712 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-09-23 22:34:57.712 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-09-23 22:34:57.717 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-09-23 22:34:57.717 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-09-23 22:34:57.718 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-09-23 22:34:57.718 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-09-23 22:34:57.837  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-09-23 22:34:57.838  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-09-23 22:34:57.838 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-09-23 22:34:57.838 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-09-23 22:34:57.840  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-09-23 22:34:57.841  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-09-23 22:34:57.841 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-09-23 22:34:57.842 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-09-23 22:34:57.842 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-09-23 22:34:57.843 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-09-23 22:34:57.843 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-09-23 22:34:57.843 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-09-23 22:34:57.844 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-09-23 22:34:57.844 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-09-23 22:34:57.845 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-09-23 22:34:57.846 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-09-23 22:34:57.850 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 374075419081502992767481019490547579506458829245
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Sep 23 20:09:45 UTC 2022
           Final Date: Wed Sep 22 20:09:44 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [fd:62:e1:ca:12:9f:02:99:cc:e6:e4:55:34:6c:9b:ad:df:25:7b:56]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: d2d382ca9b6783efc3ea186cda62f75981698d22
                       9748e6b9208b9833d1ef2e83c8b0032a9819537f
                       4879716b62107b1b8c24c096793ba0f001622c00
                       2a7e3f883b45bba6683bef8ab102e7a373b50fc0
                       db805b23cd93baa66fa1f5ba3e3e067e4abe0d79
                       e491a49fef061f0065b2ac18df9a8884bb5714e3
                       915ab48eeeaf4b9c90e6cde25a06d12ae0e384ea
                       25d21e803fe1b79a334709f24fe7b5d3f7979de5
                       845c4abb7c6ba033ab03d19f5d53559a38794189
                       bfe83fa88ccda7812db7f41c770d3e8bac629966
                       7db6e3ae17f8d02c5e843175839dced8f42d860c
                       d42ca0f4782b66fee35115b9e7bbf44a840a5ab6
                       5d660fd45a47b3005d5dece0495906e8b71a049e
                       2cfb9fc7c20630637049951bd3dd1d9dcbde4a6c
                       50423138ba637bfa867211aa8b39391e7a3a022f
                       cf543df37336cca52c54e0f94fc6f7fc355b3cdb
                       4121bdac8f95e47b8244b0e0a01a7c48a88caf9d
                       74a7b8886741ebca8bff7b4eb0ad670c349e8457
                       37cac9477863c94930e9e40dbaf68c58498164cf
                       dd13741b
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [09:4c:8f:2b:fc:2a:a1:43:eb:00:80:13:72:47:45:aa:3e:61:80:fc]
            modulus: a8760302ded78729757b8fd6844f440e8ea2d66dd496df0958672fd6afe6d37706a7d358477980d296562dd3da0742f08ef057d7a97777b5ff8fd9623f157593554a5efb8bc1dd55141813b4f663adae14d451c27814e6c638c62d233c10aba7efd3b84a43c3e26b07fb0856352d36f128c01f8181eb093f09782c78525234da00536423dabf8d0c852d71096e552f0ff28023bb04dd82955c423db9d2ba67cccb58c14b35390034304b27c63c23fc6e7da8d447957ffbcfcdfed6cd45b4827396ab38ae7cca2af77aea25d7e9653f7a6f4c58038c79a560d2a6cdd37c2873a0cf6fc3429f8b32beec377edde3936b6e9fa2c012dc99350ac0ea4e47a2d6bf31
    public exponent: 10001

] 
2022-09-23 22:40:05.742  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-09-23 22:40:05.745 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-09-23 22:40:05.749 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-09-23 22:40:05.750 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-09-23 22:40:05.751  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-09-23 22:40:05.751  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-09-23 22:40:05.752  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-09-23 22:40:05.753 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-09-23 22:40:05.754 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-09-23 22:40:05.754 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-09-23 22:40:05.760 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-09-23 22:40:05.761 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-09-23 22:40:05.761 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-09-23 22:40:05.762 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-09-23 22:40:05.895  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-09-23 22:40:05.896  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-09-23 22:40:05.897 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-09-23 22:40:05.897 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-09-23 22:40:05.899  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-09-23 22:40:05.901  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-09-23 22:40:05.904 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-09-23 22:40:05.906 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-09-23 22:40:05.907 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-09-23 22:40:05.908 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-09-23 22:40:05.908 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-09-23 22:40:05.912 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-09-23 22:40:05.915 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-09-23 22:40:05.916 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-09-23 22:40:05.916 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-09-23 22:40:05.917 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-09-23 22:40:05.924 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 374075419081502992767481019490547579506458829245
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Sep 23 20:09:45 UTC 2022
           Final Date: Wed Sep 22 20:09:44 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [fd:62:e1:ca:12:9f:02:99:cc:e6:e4:55:34:6c:9b:ad:df:25:7b:56]
            modulus: dd574dc92cd9c4761b8c713621788b0fc115a05dac11e4b38a353715c0d2eeed8a24c18e1d567d64650986b58516b74a5b98de34c188d695aef63e1c5013383afa413434ba212ef5d709db0aa36358e5e75b63de2dda9fe3dce354b1adb72e2290446095370a913db27488a497942a22789c92158a8f89d51e4e6a0327c000af266e2b8a273aeb8355bd65983362a10b492e489b21be37da1dbcc773653fb2c0fe42bce974bcd2d3004f246be041ccea8aa8624c2064f0da14c333d47a5677ec115a9e05d5918be0f17f2ab526163fca23a790ff7754a6855f629164be5d1e8ce3971f83e4a6670b6730f7500b7e5648cb7f710f2fd829ca6b7f674bbca6fae28d89d88e7be6bdb55aa2861aec3888df4acf9ebaf39a1d2c76f64cd41d768a16f6b75c776500fa750929d6037408e89ab60877b573d7da849283269ab346f27bd2a4319f6440b54bd4570a5bc13b368a2a6786e29a8c2347719f32e8cfada881852db991dd871e66472e3f1153e1131a75c362394a848b08cea9378599d1f819
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: d2d382ca9b6783efc3ea186cda62f75981698d22
                       9748e6b9208b9833d1ef2e83c8b0032a9819537f
                       4879716b62107b1b8c24c096793ba0f001622c00
                       2a7e3f883b45bba6683bef8ab102e7a373b50fc0
                       db805b23cd93baa66fa1f5ba3e3e067e4abe0d79
                       e491a49fef061f0065b2ac18df9a8884bb5714e3
                       915ab48eeeaf4b9c90e6cde25a06d12ae0e384ea
                       25d21e803fe1b79a334709f24fe7b5d3f7979de5
                       845c4abb7c6ba033ab03d19f5d53559a38794189
                       bfe83fa88ccda7812db7f41c770d3e8bac629966
                       7db6e3ae17f8d02c5e843175839dced8f42d860c
                       d42ca0f4782b66fee35115b9e7bbf44a840a5ab6
                       5d660fd45a47b3005d5dece0495906e8b71a049e
                       2cfb9fc7c20630637049951bd3dd1d9dcbde4a6c
                       50423138ba637bfa867211aa8b39391e7a3a022f
                       cf543df37336cca52c54e0f94fc6f7fc355b3cdb
                       4121bdac8f95e47b8244b0e0a01a7c48a88caf9d
                       74a7b8886741ebca8bff7b4eb0ad670c349e8457
                       37cac9477863c94930e9e40dbaf68c58498164cf
                       dd13741b
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [f1:f5:af:fd:b4:2f:26:15:f0:49:d0:9f:e3:b0:0b:92:84:2c:4f:8a]
            modulus: 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
    public exponent: 10001

] 
2022-09-23 22:45:06.158  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-09-23 22:45:06.163 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-09-23 22:45:06.164 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-09-23 22:45:06.165 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-09-23 22:45:06.165  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-09-23 22:45:06.166  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-09-23 22:45:06.167  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-09-23 22:45:06.167 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-09-23 22:45:06.167 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-09-23 22:45:06.168 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-09-23 22:45:06.174 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-09-23 22:45:06.175 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-09-23 22:45:06.175 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-09-23 22:45:06.175 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-09-23 22:45:06.333  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-09-23 22:45:06.335  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-09-23 22:45:06.335 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-09-23 22:45:06.336 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-09-23 22:45:06.337  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-09-23 22:45:06.337  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-09-23 22:45:06.338 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-09-23 22:45:06.339 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-09-23 22:45:06.341 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-09-23 22:45:06.344 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-09-23 22:45:06.345 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-09-23 22:45:06.346 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-09-23 22:45:06.347 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-09-23 22:45:06.347 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-09-23 22:45:06.347 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-09-23 22:45:06.352 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-09-23 22:45:06.357 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 374075419081502992767481019490547579506458829245
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Sep 23 20:09:45 UTC 2022
           Final Date: Wed Sep 22 20:09:44 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [fd:62:e1:ca:12:9f:02:99:cc:e6:e4:55:34:6c:9b:ad:df:25:7b:56]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: d2d382ca9b6783efc3ea186cda62f75981698d22
                       9748e6b9208b9833d1ef2e83c8b0032a9819537f
                       4879716b62107b1b8c24c096793ba0f001622c00
                       2a7e3f883b45bba6683bef8ab102e7a373b50fc0
                       db805b23cd93baa66fa1f5ba3e3e067e4abe0d79
                       e491a49fef061f0065b2ac18df9a8884bb5714e3
                       915ab48eeeaf4b9c90e6cde25a06d12ae0e384ea
                       25d21e803fe1b79a334709f24fe7b5d3f7979de5
                       845c4abb7c6ba033ab03d19f5d53559a38794189
                       bfe83fa88ccda7812db7f41c770d3e8bac629966
                       7db6e3ae17f8d02c5e843175839dced8f42d860c
                       d42ca0f4782b66fee35115b9e7bbf44a840a5ab6
                       5d660fd45a47b3005d5dece0495906e8b71a049e
                       2cfb9fc7c20630637049951bd3dd1d9dcbde4a6c
                       50423138ba637bfa867211aa8b39391e7a3a022f
                       cf543df37336cca52c54e0f94fc6f7fc355b3cdb
                       4121bdac8f95e47b8244b0e0a01a7c48a88caf9d
                       74a7b8886741ebca8bff7b4eb0ad670c349e8457
                       37cac9477863c94930e9e40dbaf68c58498164cf
                       dd13741b
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [86:23:7f:fb:46:d9:48:78:5f:18:5e:d5:fb:fa:df:b8:9c:67:7a:24]
            modulus: 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
    public exponent: 10001

] 
2022-09-23 22:50:27.202  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-09-23 22:50:27.206 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-09-23 22:50:27.208 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-09-23 22:50:27.209 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-09-23 22:50:27.210  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-09-23 22:50:27.210  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-09-23 22:50:27.211  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-09-23 22:50:27.212 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-09-23 22:50:27.213 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-09-23 22:50:27.214 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-09-23 22:50:27.221 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-09-23 22:50:27.222 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-09-23 22:50:27.222 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-09-23 22:50:27.222 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-09-23 22:50:27.342  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-09-23 22:50:27.343  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-09-23 22:50:27.344 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-09-23 22:50:27.344 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-09-23 22:50:27.346  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-09-23 22:50:27.346  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-09-23 22:50:27.347 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-09-23 22:50:27.347 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-09-23 22:50:27.347 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-09-23 22:50:27.348 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-09-23 22:50:27.349 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-09-23 22:50:27.349 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-09-23 22:50:27.350 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-09-23 22:50:27.350 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-09-23 22:50:27.351 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-09-23 22:50:27.352 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-09-23 22:50:27.355 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 374075419081502992767481019490547579506458829245
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Sep 23 20:09:45 UTC 2022
           Final Date: Wed Sep 22 20:09:44 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [fd:62:e1:ca:12:9f:02:99:cc:e6:e4:55:34:6c:9b:ad:df:25:7b:56]
            modulus: dd574dc92cd9c4761b8c713621788b0fc115a05dac11e4b38a353715c0d2eeed8a24c18e1d567d64650986b58516b74a5b98de34c188d695aef63e1c5013383afa413434ba212ef5d709db0aa36358e5e75b63de2dda9fe3dce354b1adb72e2290446095370a913db27488a497942a22789c92158a8f89d51e4e6a0327c000af266e2b8a273aeb8355bd65983362a10b492e489b21be37da1dbcc773653fb2c0fe42bce974bcd2d3004f246be041ccea8aa8624c2064f0da14c333d47a5677ec115a9e05d5918be0f17f2ab526163fca23a790ff7754a6855f629164be5d1e8ce3971f83e4a6670b6730f7500b7e5648cb7f710f2fd829ca6b7f674bbca6fae28d89d88e7be6bdb55aa2861aec3888df4acf9ebaf39a1d2c76f64cd41d768a16f6b75c776500fa750929d6037408e89ab60877b573d7da849283269ab346f27bd2a4319f6440b54bd4570a5bc13b368a2a6786e29a8c2347719f32e8cfada881852db991dd871e66472e3f1153e1131a75c362394a848b08cea9378599d1f819
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: d2d382ca9b6783efc3ea186cda62f75981698d22
                       9748e6b9208b9833d1ef2e83c8b0032a9819537f
                       4879716b62107b1b8c24c096793ba0f001622c00
                       2a7e3f883b45bba6683bef8ab102e7a373b50fc0
                       db805b23cd93baa66fa1f5ba3e3e067e4abe0d79
                       e491a49fef061f0065b2ac18df9a8884bb5714e3
                       915ab48eeeaf4b9c90e6cde25a06d12ae0e384ea
                       25d21e803fe1b79a334709f24fe7b5d3f7979de5
                       845c4abb7c6ba033ab03d19f5d53559a38794189
                       bfe83fa88ccda7812db7f41c770d3e8bac629966
                       7db6e3ae17f8d02c5e843175839dced8f42d860c
                       d42ca0f4782b66fee35115b9e7bbf44a840a5ab6
                       5d660fd45a47b3005d5dece0495906e8b71a049e
                       2cfb9fc7c20630637049951bd3dd1d9dcbde4a6c
                       50423138ba637bfa867211aa8b39391e7a3a022f
                       cf543df37336cca52c54e0f94fc6f7fc355b3cdb
                       4121bdac8f95e47b8244b0e0a01a7c48a88caf9d
                       74a7b8886741ebca8bff7b4eb0ad670c349e8457
                       37cac9477863c94930e9e40dbaf68c58498164cf
                       dd13741b
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [73:00:61:70:da:ad:53:e5:58:e5:2b:8c:93:67:a3:10:44:64:ab:9e]
            modulus: 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
    public exponent: 10001

] 
2022-09-23 22:50:27.721  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-09-23 22:50:27.722 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-09-23 22:50:27.723 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-09-23 22:50:27.724 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-09-23 22:50:27.725  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-09-23 22:50:27.725  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-09-23 22:50:27.726  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-09-23 22:50:27.726 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-09-23 22:50:27.726 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-09-23 22:50:27.727 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-09-23 22:50:27.731 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-09-23 22:50:27.732 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-09-23 22:50:27.732 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-09-23 22:50:27.733 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-09-23 22:50:27.825  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-09-23 22:50:27.825  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-09-23 22:50:27.826 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-09-23 22:50:27.826 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-09-23 22:50:27.828  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-09-23 22:50:27.828  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-09-23 22:50:27.829 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-09-23 22:50:27.830 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-09-23 22:50:27.830 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-09-23 22:50:27.831 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-09-23 22:50:27.832 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-09-23 22:50:27.832 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-09-23 22:50:27.833 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-09-23 22:50:27.833 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-09-23 22:50:27.834 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-09-23 22:50:27.835 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-09-23 22:50:27.839 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 374075419081502992767481019490547579506458829245
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Sep 23 20:09:45 UTC 2022
           Final Date: Wed Sep 22 20:09:44 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [fd:62:e1:ca:12:9f:02:99:cc:e6:e4:55:34:6c:9b:ad:df:25:7b:56]
            modulus: dd574dc92cd9c4761b8c713621788b0fc115a05dac11e4b38a353715c0d2eeed8a24c18e1d567d64650986b58516b74a5b98de34c188d695aef63e1c5013383afa413434ba212ef5d709db0aa36358e5e75b63de2dda9fe3dce354b1adb72e2290446095370a913db27488a497942a22789c92158a8f89d51e4e6a0327c000af266e2b8a273aeb8355bd65983362a10b492e489b21be37da1dbcc773653fb2c0fe42bce974bcd2d3004f246be041ccea8aa8624c2064f0da14c333d47a5677ec115a9e05d5918be0f17f2ab526163fca23a790ff7754a6855f629164be5d1e8ce3971f83e4a6670b6730f7500b7e5648cb7f710f2fd829ca6b7f674bbca6fae28d89d88e7be6bdb55aa2861aec3888df4acf9ebaf39a1d2c76f64cd41d768a16f6b75c776500fa750929d6037408e89ab60877b573d7da849283269ab346f27bd2a4319f6440b54bd4570a5bc13b368a2a6786e29a8c2347719f32e8cfada881852db991dd871e66472e3f1153e1131a75c362394a848b08cea9378599d1f819
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: d2d382ca9b6783efc3ea186cda62f75981698d22
                       9748e6b9208b9833d1ef2e83c8b0032a9819537f
                       4879716b62107b1b8c24c096793ba0f001622c00
                       2a7e3f883b45bba6683bef8ab102e7a373b50fc0
                       db805b23cd93baa66fa1f5ba3e3e067e4abe0d79
                       e491a49fef061f0065b2ac18df9a8884bb5714e3
                       915ab48eeeaf4b9c90e6cde25a06d12ae0e384ea
                       25d21e803fe1b79a334709f24fe7b5d3f7979de5
                       845c4abb7c6ba033ab03d19f5d53559a38794189
                       bfe83fa88ccda7812db7f41c770d3e8bac629966
                       7db6e3ae17f8d02c5e843175839dced8f42d860c
                       d42ca0f4782b66fee35115b9e7bbf44a840a5ab6
                       5d660fd45a47b3005d5dece0495906e8b71a049e
                       2cfb9fc7c20630637049951bd3dd1d9dcbde4a6c
                       50423138ba637bfa867211aa8b39391e7a3a022f
                       cf543df37336cca52c54e0f94fc6f7fc355b3cdb
                       4121bdac8f95e47b8244b0e0a01a7c48a88caf9d
                       74a7b8886741ebca8bff7b4eb0ad670c349e8457
                       37cac9477863c94930e9e40dbaf68c58498164cf
                       dd13741b
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [73:00:61:70:da:ad:53:e5:58:e5:2b:8c:93:67:a3:10:44:64:ab:9e]
            modulus: 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
    public exponent: 10001

] 
2022-09-23 23:36:30.196  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-09-23 23:36:30.199 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-09-23 23:36:30.204 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-09-23 23:36:30.206 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-09-23 23:36:30.206  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-09-23 23:36:30.207  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-09-23 23:36:30.208  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-09-23 23:36:30.208 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-09-23 23:36:30.209 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-09-23 23:36:30.209 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-09-23 23:36:30.216 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-09-23 23:36:30.217 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-09-23 23:36:30.217 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-09-23 23:36:30.218 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-09-23 23:36:30.367  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-09-23 23:36:30.368  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-09-23 23:36:30.368 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-09-23 23:36:30.369 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-09-23 23:36:30.370  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-09-23 23:36:30.371  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-09-23 23:36:30.372 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-09-23 23:36:30.372 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-09-23 23:36:30.372 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-09-23 23:36:30.373 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-09-23 23:36:30.374 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-09-23 23:36:30.374 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-09-23 23:36:30.375 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-09-23 23:36:30.375 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-09-23 23:36:30.376 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-09-23 23:36:30.376 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-09-23 23:36:30.381 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 374075419081502992767481019490547579506458829245
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Sep 23 20:09:45 UTC 2022
           Final Date: Wed Sep 22 20:09:44 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [fd:62:e1:ca:12:9f:02:99:cc:e6:e4:55:34:6c:9b:ad:df:25:7b:56]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: d2d382ca9b6783efc3ea186cda62f75981698d22
                       9748e6b9208b9833d1ef2e83c8b0032a9819537f
                       4879716b62107b1b8c24c096793ba0f001622c00
                       2a7e3f883b45bba6683bef8ab102e7a373b50fc0
                       db805b23cd93baa66fa1f5ba3e3e067e4abe0d79
                       e491a49fef061f0065b2ac18df9a8884bb5714e3
                       915ab48eeeaf4b9c90e6cde25a06d12ae0e384ea
                       25d21e803fe1b79a334709f24fe7b5d3f7979de5
                       845c4abb7c6ba033ab03d19f5d53559a38794189
                       bfe83fa88ccda7812db7f41c770d3e8bac629966
                       7db6e3ae17f8d02c5e843175839dced8f42d860c
                       d42ca0f4782b66fee35115b9e7bbf44a840a5ab6
                       5d660fd45a47b3005d5dece0495906e8b71a049e
                       2cfb9fc7c20630637049951bd3dd1d9dcbde4a6c
                       50423138ba637bfa867211aa8b39391e7a3a022f
                       cf543df37336cca52c54e0f94fc6f7fc355b3cdb
                       4121bdac8f95e47b8244b0e0a01a7c48a88caf9d
                       74a7b8886741ebca8bff7b4eb0ad670c349e8457
                       37cac9477863c94930e9e40dbaf68c58498164cf
                       dd13741b
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [1a:9c:c8:d6:16:5f:48:a5:b7:28:aa:4d:f9:0d:1b:82:b4:31:4d:f5]
            modulus: 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
    public exponent: 10001

] 
2022-09-23 23:50:26.921  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-09-23 23:50:26.924 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-09-23 23:50:26.927 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-09-23 23:50:26.927 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-09-23 23:50:26.928  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-09-23 23:50:26.928  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-09-23 23:50:26.929  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-09-23 23:50:26.929 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-09-23 23:50:26.929 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-09-23 23:50:26.930 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-09-23 23:50:26.935 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-09-23 23:50:26.936 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-09-23 23:50:26.936 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-09-23 23:50:26.936 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-09-23 23:50:27.091  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-09-23 23:50:27.091  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-09-23 23:50:27.092 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-09-23 23:50:27.092 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-09-23 23:50:27.093  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-09-23 23:50:27.094  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-09-23 23:50:27.094 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-09-23 23:50:27.094 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-09-23 23:50:27.094 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-09-23 23:50:27.095 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-09-23 23:50:27.095 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-09-23 23:50:27.096 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-09-23 23:50:27.096 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-09-23 23:50:27.097 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-09-23 23:50:27.097 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-09-23 23:50:27.098 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-09-23 23:50:27.102 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 374075419081502992767481019490547579506458829245
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Sep 23 20:09:45 UTC 2022
           Final Date: Wed Sep 22 20:09:44 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [fd:62:e1:ca:12:9f:02:99:cc:e6:e4:55:34:6c:9b:ad:df:25:7b:56]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: d2d382ca9b6783efc3ea186cda62f75981698d22
                       9748e6b9208b9833d1ef2e83c8b0032a9819537f
                       4879716b62107b1b8c24c096793ba0f001622c00
                       2a7e3f883b45bba6683bef8ab102e7a373b50fc0
                       db805b23cd93baa66fa1f5ba3e3e067e4abe0d79
                       e491a49fef061f0065b2ac18df9a8884bb5714e3
                       915ab48eeeaf4b9c90e6cde25a06d12ae0e384ea
                       25d21e803fe1b79a334709f24fe7b5d3f7979de5
                       845c4abb7c6ba033ab03d19f5d53559a38794189
                       bfe83fa88ccda7812db7f41c770d3e8bac629966
                       7db6e3ae17f8d02c5e843175839dced8f42d860c
                       d42ca0f4782b66fee35115b9e7bbf44a840a5ab6
                       5d660fd45a47b3005d5dece0495906e8b71a049e
                       2cfb9fc7c20630637049951bd3dd1d9dcbde4a6c
                       50423138ba637bfa867211aa8b39391e7a3a022f
                       cf543df37336cca52c54e0f94fc6f7fc355b3cdb
                       4121bdac8f95e47b8244b0e0a01a7c48a88caf9d
                       74a7b8886741ebca8bff7b4eb0ad670c349e8457
                       37cac9477863c94930e9e40dbaf68c58498164cf
                       dd13741b
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [b7:e7:2e:9d:6d:45:b6:13:0f:01:95:22:37:e4:bb:38:52:e7:17:e1]
            modulus: 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
    public exponent: 10001

] 
2022-09-23 23:50:45.975  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-09-23 23:50:45.976 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-09-23 23:50:45.977 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-09-23 23:50:45.977 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-09-23 23:50:45.978  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-09-23 23:50:45.978  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-09-23 23:50:45.979  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-09-23 23:50:45.979 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-09-23 23:50:45.979 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-09-23 23:50:45.983 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-09-23 23:50:45.987 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-09-23 23:50:45.988 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-09-23 23:50:45.988 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-09-23 23:50:45.988 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-09-23 23:50:46.092  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-09-23 23:50:46.092  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-09-23 23:50:46.092 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-09-23 23:50:46.093 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-09-23 23:50:46.094  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-09-23 23:50:46.094  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-09-23 23:50:46.095 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-09-23 23:50:46.095 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-09-23 23:50:46.095 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-09-23 23:50:46.095 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-09-23 23:50:46.096 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-09-23 23:50:46.096 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-09-23 23:50:46.096 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-09-23 23:50:46.097 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-09-23 23:50:46.097 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-09-23 23:50:46.098 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-09-23 23:50:46.101 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 374075419081502992767481019490547579506458829245
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Sep 23 20:09:45 UTC 2022
           Final Date: Wed Sep 22 20:09:44 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [fd:62:e1:ca:12:9f:02:99:cc:e6:e4:55:34:6c:9b:ad:df:25:7b:56]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: d2d382ca9b6783efc3ea186cda62f75981698d22
                       9748e6b9208b9833d1ef2e83c8b0032a9819537f
                       4879716b62107b1b8c24c096793ba0f001622c00
                       2a7e3f883b45bba6683bef8ab102e7a373b50fc0
                       db805b23cd93baa66fa1f5ba3e3e067e4abe0d79
                       e491a49fef061f0065b2ac18df9a8884bb5714e3
                       915ab48eeeaf4b9c90e6cde25a06d12ae0e384ea
                       25d21e803fe1b79a334709f24fe7b5d3f7979de5
                       845c4abb7c6ba033ab03d19f5d53559a38794189
                       bfe83fa88ccda7812db7f41c770d3e8bac629966
                       7db6e3ae17f8d02c5e843175839dced8f42d860c
                       d42ca0f4782b66fee35115b9e7bbf44a840a5ab6
                       5d660fd45a47b3005d5dece0495906e8b71a049e
                       2cfb9fc7c20630637049951bd3dd1d9dcbde4a6c
                       50423138ba637bfa867211aa8b39391e7a3a022f
                       cf543df37336cca52c54e0f94fc6f7fc355b3cdb
                       4121bdac8f95e47b8244b0e0a01a7c48a88caf9d
                       74a7b8886741ebca8bff7b4eb0ad670c349e8457
                       37cac9477863c94930e9e40dbaf68c58498164cf
                       dd13741b
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [db:28:d7:08:f0:32:7c:6f:ee:7b:a8:88:ca:b0:3b:10:29:63:d4:12]
            modulus: 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
    public exponent: 10001

]