Results

By type

          2022-11-05 04:59:31,046 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-11-05 04:59:31,873 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-11-05 04:59:32.599  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Nov 05, 2022 4:59:34 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Nov 05, 2022 4:59:34 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Nov 05, 2022 4:59:34 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Nov 05, 2022 4:59:34 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-11-05 04:59:34.953 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-11-05 04:59:35.245  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-11-05 04:59:35.403  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-11-05 04:59:36.126 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-11-05 04:59:36.128 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
2022-11-05 04:59:36.130 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-11-05 04:59:36.134 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-11-05 04:59:36.171 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
2022-11-05 04:59:36.174 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/docs]}: redirectToUi(HttpServletRequest)
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
2022-11-05 04:59:36.295 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-11-05 04:59:36.937 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Nov 05, 2022 4:59:37 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-11-05 04:59:37.932  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 7.66 seconds (JVM running for 9.276)
Nov 05, 2022 5:00:07 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-11-05 05:00:21.090  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-05 05:00:21.096 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-05 05:00:21.152 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-11-05 05:00:21.155 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-05 05:00:21.174  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-11-05 05:00:21.176  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-05 05:00:21.177  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-05 05:00:21.179 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-05 05:00:21.179 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-05 05:00:21.183 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-05 05:00:21.191 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-05 05:00:21.195 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-05 05:00:21.249 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-05 05:00:21.257 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-05 05:00:21.257 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-05 05:00:21.261 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-05 05:00:21.873  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-05 05:00:21.875  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-05 05:00:21.876 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-05 05:00:21.877 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-05 05:00:21.887  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-05 05:00:21.888  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-05 05:00:21.888 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-05 05:00:21.889 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-05 05:00:21.889 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-05 05:00:21.903 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-05 05:00:21.904 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-05 05:00:21.904 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-05 05:00:21.910 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-05 05:00:21.911 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-05 05:00:21.911 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-05 05:00:21.913 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-05 05:00:21.943 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 40350770764094019195363803017877888586040847466
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Nov 05 04:57:39 UTC 2022
           Final Date: Thu Nov 04 04:57:38 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [c3:f9:7e:50:04:f1:33:80:eb:0a:e4:75:5e:43:82:51:65:15:08:c2],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 121cea4e56b34d776bc3d41e11a4a2c69f33026c
                       686e742079e7a9a803975135ffe43abf37dc6288
                       544ed91fbad695695581465e2948fe9a10ea0272
                       a249c5bcdc366fc3a2f22b5fda31ded1bad5199a
                       cb2c0cbf2ca00361f5f2b2313f6e795dcf17e423
                       f9ff682fea647a2cdd30abb1b736ff2c2e952186
                       5889ebe34395fb6dfd6a82e23309f392920c6199
                       9fb7d0831d1a41bd0a6968f6ed7eb7a6ff429a8c
                       59e1c5692b69b1c4a2fb9ffec9935b0cfd082d85
                       3d65f2f45498238a2cef46617826fe2ed3074c90
                       d4350e8f910506ccac644583ed3447f1ac50b97a
                       90b0f31fa7b0b03f55e5406960d77dd555d41147
                       44f9b6a93736fd77e9e5318ff21205661108e668
                       085bb23d5ffc477484a7fa1ba31185d7853ab3f3
                       91d7aedf3c59289bc1a0aa8319b9af9cd498e82a
                       4b9fbeb25ffa656892e3a227737b28bf743d1e89
                       d2e837fbe880e500c6d2ec0e5b3a60b12b104e24
                       f38d0fe016dd84628047ef0560f8736d7870738d
                       556c68dd856613f373fe0318d9ea5ad6e30bf163
                       6d5b1605
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [2f:34:1f:ab:5c:53:01:74:ab:67:10:ca:b8:e9:bc:91:84:f1:a9:ba],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-11-05 06:22:43.670  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-05 06:22:43.675 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-05 06:22:43.678 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-05 06:22:43.679 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-05 06:22:43.680  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-05 06:22:43.680  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-05 06:22:43.681  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-05 06:22:43.681 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-05 06:22:43.682 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-05 06:22:43.682 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-05 06:22:43.687 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-05 06:22:43.688 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-05 06:22:43.689 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-05 06:22:43.689 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-05 06:22:43.875  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-05 06:22:43.876  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-05 06:22:43.877 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-05 06:22:43.877 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-05 06:22:43.883  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-05 06:22:43.884  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-05 06:22:43.885 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-05 06:22:43.886 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-05 06:22:43.886 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-05 06:22:43.888 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-05 06:22:43.888 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-05 06:22:43.889 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-05 06:22:43.890 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-05 06:22:43.890 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-05 06:22:43.891 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-05 06:22:43.892 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-05 06:22:43.898 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 40350770764094019195363803017877888586040847466
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Nov 05 04:57:39 UTC 2022
           Final Date: Thu Nov 04 04:57:38 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [c3:f9:7e:50:04:f1:33:80:eb:0a:e4:75:5e:43:82:51:65:15:08:c2],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 121cea4e56b34d776bc3d41e11a4a2c69f33026c
                       686e742079e7a9a803975135ffe43abf37dc6288
                       544ed91fbad695695581465e2948fe9a10ea0272
                       a249c5bcdc366fc3a2f22b5fda31ded1bad5199a
                       cb2c0cbf2ca00361f5f2b2313f6e795dcf17e423
                       f9ff682fea647a2cdd30abb1b736ff2c2e952186
                       5889ebe34395fb6dfd6a82e23309f392920c6199
                       9fb7d0831d1a41bd0a6968f6ed7eb7a6ff429a8c
                       59e1c5692b69b1c4a2fb9ffec9935b0cfd082d85
                       3d65f2f45498238a2cef46617826fe2ed3074c90
                       d4350e8f910506ccac644583ed3447f1ac50b97a
                       90b0f31fa7b0b03f55e5406960d77dd555d41147
                       44f9b6a93736fd77e9e5318ff21205661108e668
                       085bb23d5ffc477484a7fa1ba31185d7853ab3f3
                       91d7aedf3c59289bc1a0aa8319b9af9cd498e82a
                       4b9fbeb25ffa656892e3a227737b28bf743d1e89
                       d2e837fbe880e500c6d2ec0e5b3a60b12b104e24
                       f38d0fe016dd84628047ef0560f8736d7870738d
                       556c68dd856613f373fe0318d9ea5ad6e30bf163
                       6d5b1605
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [2d:1f:fa:e8:f1:29:75:b9:db:1c:73:93:81:80:53:65:d4:22:36:62],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-11-05 06:24:31.413  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-05 06:24:31.414 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-05 06:24:31.416 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-11-05 06:24:31.417 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-05 06:24:31.418  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-11-05 06:24:31.418  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-05 06:24:31.419  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-05 06:24:31.420 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-05 06:24:31.420 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-05 06:24:31.421 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-05 06:24:31.425 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-05 06:24:31.426 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-05 06:24:31.427 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-05 06:24:31.427 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-05 06:24:31.571  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-05 06:24:31.572  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-05 06:24:31.572 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-05 06:24:31.573 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-05 06:24:31.576  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-05 06:24:31.576  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-05 06:24:31.577 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-05 06:24:31.578 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-05 06:24:31.578 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-05 06:24:31.579 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-05 06:24:31.580 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-05 06:24:31.580 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-05 06:24:31.581 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-05 06:24:31.582 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-05 06:24:31.582 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-05 06:24:31.584 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-05 06:24:31.588 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 40350770764094019195363803017877888586040847466
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Nov 05 04:57:39 UTC 2022
           Final Date: Thu Nov 04 04:57:38 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [c3:f9:7e:50:04:f1:33:80:eb:0a:e4:75:5e:43:82:51:65:15:08:c2],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 121cea4e56b34d776bc3d41e11a4a2c69f33026c
                       686e742079e7a9a803975135ffe43abf37dc6288
                       544ed91fbad695695581465e2948fe9a10ea0272
                       a249c5bcdc366fc3a2f22b5fda31ded1bad5199a
                       cb2c0cbf2ca00361f5f2b2313f6e795dcf17e423
                       f9ff682fea647a2cdd30abb1b736ff2c2e952186
                       5889ebe34395fb6dfd6a82e23309f392920c6199
                       9fb7d0831d1a41bd0a6968f6ed7eb7a6ff429a8c
                       59e1c5692b69b1c4a2fb9ffec9935b0cfd082d85
                       3d65f2f45498238a2cef46617826fe2ed3074c90
                       d4350e8f910506ccac644583ed3447f1ac50b97a
                       90b0f31fa7b0b03f55e5406960d77dd555d41147
                       44f9b6a93736fd77e9e5318ff21205661108e668
                       085bb23d5ffc477484a7fa1ba31185d7853ab3f3
                       91d7aedf3c59289bc1a0aa8319b9af9cd498e82a
                       4b9fbeb25ffa656892e3a227737b28bf743d1e89
                       d2e837fbe880e500c6d2ec0e5b3a60b12b104e24
                       f38d0fe016dd84628047ef0560f8736d7870738d
                       556c68dd856613f373fe0318d9ea5ad6e30bf163
                       6d5b1605
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [86:b9:7b:5e:01:4a:0b:dc:10:61:a1:10:d2:76:47:94:c7:5f:7f:72],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-11-05 06:25:39.641  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-05 06:25:39.642 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-05 06:25:39.643 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-11-05 06:25:39.644 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-05 06:25:39.644  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-11-05 06:25:39.645  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-05 06:25:39.645  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-05 06:25:39.646 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-05 06:25:39.646 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-05 06:25:39.647 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-05 06:25:39.651 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-05 06:25:39.651 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-05 06:25:39.652 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-05 06:25:39.652 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-05 06:25:39.827  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-05 06:25:39.828  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-05 06:25:39.828 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-05 06:25:39.829 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-05 06:25:39.830  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-05 06:25:39.830  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-05 06:25:39.831 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-05 06:25:39.831 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-05 06:25:39.832 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-05 06:25:39.832 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-05 06:25:39.833 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-05 06:25:39.833 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-05 06:25:39.834 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-05 06:25:39.834 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-05 06:25:39.834 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-05 06:25:39.835 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-05 06:25:39.839 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 40350770764094019195363803017877888586040847466
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Nov 05 04:57:39 UTC 2022
           Final Date: Thu Nov 04 04:57:38 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [c3:f9:7e:50:04:f1:33:80:eb:0a:e4:75:5e:43:82:51:65:15:08:c2],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 121cea4e56b34d776bc3d41e11a4a2c69f33026c
                       686e742079e7a9a803975135ffe43abf37dc6288
                       544ed91fbad695695581465e2948fe9a10ea0272
                       a249c5bcdc366fc3a2f22b5fda31ded1bad5199a
                       cb2c0cbf2ca00361f5f2b2313f6e795dcf17e423
                       f9ff682fea647a2cdd30abb1b736ff2c2e952186
                       5889ebe34395fb6dfd6a82e23309f392920c6199
                       9fb7d0831d1a41bd0a6968f6ed7eb7a6ff429a8c
                       59e1c5692b69b1c4a2fb9ffec9935b0cfd082d85
                       3d65f2f45498238a2cef46617826fe2ed3074c90
                       d4350e8f910506ccac644583ed3447f1ac50b97a
                       90b0f31fa7b0b03f55e5406960d77dd555d41147
                       44f9b6a93736fd77e9e5318ff21205661108e668
                       085bb23d5ffc477484a7fa1ba31185d7853ab3f3
                       91d7aedf3c59289bc1a0aa8319b9af9cd498e82a
                       4b9fbeb25ffa656892e3a227737b28bf743d1e89
                       d2e837fbe880e500c6d2ec0e5b3a60b12b104e24
                       f38d0fe016dd84628047ef0560f8736d7870738d
                       556c68dd856613f373fe0318d9ea5ad6e30bf163
                       6d5b1605
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [37:e2:94:da:ba:91:9b:d7:35:b1:63:00:f7:01:b4:4c:19:ef:e3:92],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-11-05 06:27:45.807  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-05 06:27:45.810 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-05 06:27:45.813 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-05 06:27:45.814 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-05 06:27:45.814  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-05 06:27:45.815  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-05 06:27:45.816  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-05 06:27:45.816 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-05 06:27:45.817 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-05 06:27:45.817 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-05 06:27:45.822 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-05 06:27:45.823 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-05 06:27:45.823 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-05 06:27:45.823 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-05 06:27:45.946  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-05 06:27:45.947  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-05 06:27:45.947 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-05 06:27:45.948 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-05 06:27:45.949  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-05 06:27:45.950  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-05 06:27:45.950 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-05 06:27:45.950 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-05 06:27:45.951 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-05 06:27:45.951 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-05 06:27:45.952 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-05 06:27:45.952 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-05 06:27:45.953 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-05 06:27:45.953 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-05 06:27:45.953 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-05 06:27:45.954 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-05 06:27:45.957 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 40350770764094019195363803017877888586040847466
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Nov 05 04:57:39 UTC 2022
           Final Date: Thu Nov 04 04:57:38 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [c3:f9:7e:50:04:f1:33:80:eb:0a:e4:75:5e:43:82:51:65:15:08:c2],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 121cea4e56b34d776bc3d41e11a4a2c69f33026c
                       686e742079e7a9a803975135ffe43abf37dc6288
                       544ed91fbad695695581465e2948fe9a10ea0272
                       a249c5bcdc366fc3a2f22b5fda31ded1bad5199a
                       cb2c0cbf2ca00361f5f2b2313f6e795dcf17e423
                       f9ff682fea647a2cdd30abb1b736ff2c2e952186
                       5889ebe34395fb6dfd6a82e23309f392920c6199
                       9fb7d0831d1a41bd0a6968f6ed7eb7a6ff429a8c
                       59e1c5692b69b1c4a2fb9ffec9935b0cfd082d85
                       3d65f2f45498238a2cef46617826fe2ed3074c90
                       d4350e8f910506ccac644583ed3447f1ac50b97a
                       90b0f31fa7b0b03f55e5406960d77dd555d41147
                       44f9b6a93736fd77e9e5318ff21205661108e668
                       085bb23d5ffc477484a7fa1ba31185d7853ab3f3
                       91d7aedf3c59289bc1a0aa8319b9af9cd498e82a
                       4b9fbeb25ffa656892e3a227737b28bf743d1e89
                       d2e837fbe880e500c6d2ec0e5b3a60b12b104e24
                       f38d0fe016dd84628047ef0560f8736d7870738d
                       556c68dd856613f373fe0318d9ea5ad6e30bf163
                       6d5b1605
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [a7:94:0b:90:63:ff:12:c1:de:f4:ff:4a:14:52:c9:70:f0:a9:b3:5f],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-11-05 06:34:22.643  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-05 06:34:22.645 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-05 06:34:22.647 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-05 06:34:22.648 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-05 06:34:22.648  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-05 06:34:22.649  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-05 06:34:22.650  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-05 06:34:22.650 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-05 06:34:22.651 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-05 06:34:22.652 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-05 06:34:22.657 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-05 06:34:22.658 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-05 06:34:22.658 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-05 06:34:22.659 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-05 06:34:22.795  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-05 06:34:22.796  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-05 06:34:22.796 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-05 06:34:22.797 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-05 06:34:22.798  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-05 06:34:22.798  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-05 06:34:22.799 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-05 06:34:22.799 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-05 06:34:22.800 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-05 06:34:22.801 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-05 06:34:22.801 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-05 06:34:22.801 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-05 06:34:22.802 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-05 06:34:22.802 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-05 06:34:22.803 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-05 06:34:22.804 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-05 06:34:22.807 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 40350770764094019195363803017877888586040847466
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Nov 05 04:57:39 UTC 2022
           Final Date: Thu Nov 04 04:57:38 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [c3:f9:7e:50:04:f1:33:80:eb:0a:e4:75:5e:43:82:51:65:15:08:c2],[56:66:d1:a4]
        modulus: ed6a8d94160df4b6c587bb7f95e858fafd94b4c7068bba66d7b1d8ac26cf46e1429d2d5297b8fc9fc5bcd7d28ed6a1c003aec6157dc1e196b6d627a18301fe97738e362f3efd1aea02a52fa66a0518a8188620ab146c567487b1f0d917c0150c3f8406c0a1cd8203659a63ca83f460a7ee7242ced76bd6dec4c6c8ae1c338d841e2e49ae90afe2703f21b4cdc11c90a53191df95064f0c176f501e458191efe90744dd407179348d6eb80924e17b015aecdca9cf604a4154bb7caa6be1ba7689aefc591d87308477e670ce2d0540dbc6abc8875c9530cbc13c4eed63a7de139ecf86d4dd98ccf379016a9ae1c6a858acf2deff93466f6c4890773c4821410ae43841c54e042a3bfed23919f3ee684daaabf3491ed559b2a32391e8abc60f2166e47bebb6d16f0323b542f24c2b5953682cc640b31eed1a69df9f2694ba2a79b0ba79cfd7f88f369504a0d6c3b28173b68d66c743d3bd638ccbec2f8dff286d6796492ac0b9d66a2b06a96fc04f52ce37fbdf7c5d4944f96372ed3d2031e3236d
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 121cea4e56b34d776bc3d41e11a4a2c69f33026c
                       686e742079e7a9a803975135ffe43abf37dc6288
                       544ed91fbad695695581465e2948fe9a10ea0272
                       a249c5bcdc366fc3a2f22b5fda31ded1bad5199a
                       cb2c0cbf2ca00361f5f2b2313f6e795dcf17e423
                       f9ff682fea647a2cdd30abb1b736ff2c2e952186
                       5889ebe34395fb6dfd6a82e23309f392920c6199
                       9fb7d0831d1a41bd0a6968f6ed7eb7a6ff429a8c
                       59e1c5692b69b1c4a2fb9ffec9935b0cfd082d85
                       3d65f2f45498238a2cef46617826fe2ed3074c90
                       d4350e8f910506ccac644583ed3447f1ac50b97a
                       90b0f31fa7b0b03f55e5406960d77dd555d41147
                       44f9b6a93736fd77e9e5318ff21205661108e668
                       085bb23d5ffc477484a7fa1ba31185d7853ab3f3
                       91d7aedf3c59289bc1a0aa8319b9af9cd498e82a
                       4b9fbeb25ffa656892e3a227737b28bf743d1e89
                       d2e837fbe880e500c6d2ec0e5b3a60b12b104e24
                       f38d0fe016dd84628047ef0560f8736d7870738d
                       556c68dd856613f373fe0318d9ea5ad6e30bf163
                       6d5b1605
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [8f:55:6d:44:6a:da:b0:b8:37:c6:bf:ed:82:8d:41:da:7c:a5:df:99],[56:66:d1:a4]
        modulus: b3bf94ce466faf03c2c354f0fb5106fb724c3fc75fa3e3f29d77770f5677017267c15c5f2deed51e9eee8978518e9fdbdacab2e4ce53e1b5503a6ddc9c87558ab17716360774ed6f9d1b41ef0211e885fe246925929d521a6e2a8274450b1be2909e55e675c4769a662ab8443a39f95054b141c473a4eb83655a4734edfe4ae7ac955c6057a4641815d623d756e5cf08fe5155e71ff9ffb9c982c5ddd0c022ac4531a84c98d82802b93ec7be8b0791b35fbfcb4efb5f3160b9b048682032c45e578261d67cb153afb074122f4ef5cb8d121c50befda5e68b93ef41ad3f1fb6f3a52ac33054b6752e336b16c075c69783cbffca54b53d0f78b8c2499327e20065
public exponent: 10001

] 
2022-11-05 06:38:20.618  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-05 06:38:20.624 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-05 06:38:20.630 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-05 06:38:20.631 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-05 06:38:20.632  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-05 06:38:20.633  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-05 06:38:20.634  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-05 06:38:20.635 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-05 06:38:20.635 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-05 06:38:20.637 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-05 06:38:20.642 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-05 06:38:20.643 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-05 06:38:20.644 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-05 06:38:20.644 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-05 06:38:20.787  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-05 06:38:20.788  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-05 06:38:20.789 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-05 06:38:20.789 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-05 06:38:20.790  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-05 06:38:20.791  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-05 06:38:20.791 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-05 06:38:20.792 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-05 06:38:20.792 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-05 06:38:20.793 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-05 06:38:20.793 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-05 06:38:20.794 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-05 06:38:20.795 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-05 06:38:20.795 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-05 06:38:20.795 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-05 06:38:20.796 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-05 06:38:20.799 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 40350770764094019195363803017877888586040847466
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Nov 05 04:57:39 UTC 2022
           Final Date: Thu Nov 04 04:57:38 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [c3:f9:7e:50:04:f1:33:80:eb:0a:e4:75:5e:43:82:51:65:15:08:c2],[56:66:d1:a4]
        modulus: ed6a8d94160df4b6c587bb7f95e858fafd94b4c7068bba66d7b1d8ac26cf46e1429d2d5297b8fc9fc5bcd7d28ed6a1c003aec6157dc1e196b6d627a18301fe97738e362f3efd1aea02a52fa66a0518a8188620ab146c567487b1f0d917c0150c3f8406c0a1cd8203659a63ca83f460a7ee7242ced76bd6dec4c6c8ae1c338d841e2e49ae90afe2703f21b4cdc11c90a53191df95064f0c176f501e458191efe90744dd407179348d6eb80924e17b015aecdca9cf604a4154bb7caa6be1ba7689aefc591d87308477e670ce2d0540dbc6abc8875c9530cbc13c4eed63a7de139ecf86d4dd98ccf379016a9ae1c6a858acf2deff93466f6c4890773c4821410ae43841c54e042a3bfed23919f3ee684daaabf3491ed559b2a32391e8abc60f2166e47bebb6d16f0323b542f24c2b5953682cc640b31eed1a69df9f2694ba2a79b0ba79cfd7f88f369504a0d6c3b28173b68d66c743d3bd638ccbec2f8dff286d6796492ac0b9d66a2b06a96fc04f52ce37fbdf7c5d4944f96372ed3d2031e3236d
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 121cea4e56b34d776bc3d41e11a4a2c69f33026c
                       686e742079e7a9a803975135ffe43abf37dc6288
                       544ed91fbad695695581465e2948fe9a10ea0272
                       a249c5bcdc366fc3a2f22b5fda31ded1bad5199a
                       cb2c0cbf2ca00361f5f2b2313f6e795dcf17e423
                       f9ff682fea647a2cdd30abb1b736ff2c2e952186
                       5889ebe34395fb6dfd6a82e23309f392920c6199
                       9fb7d0831d1a41bd0a6968f6ed7eb7a6ff429a8c
                       59e1c5692b69b1c4a2fb9ffec9935b0cfd082d85
                       3d65f2f45498238a2cef46617826fe2ed3074c90
                       d4350e8f910506ccac644583ed3447f1ac50b97a
                       90b0f31fa7b0b03f55e5406960d77dd555d41147
                       44f9b6a93736fd77e9e5318ff21205661108e668
                       085bb23d5ffc477484a7fa1ba31185d7853ab3f3
                       91d7aedf3c59289bc1a0aa8319b9af9cd498e82a
                       4b9fbeb25ffa656892e3a227737b28bf743d1e89
                       d2e837fbe880e500c6d2ec0e5b3a60b12b104e24
                       f38d0fe016dd84628047ef0560f8736d7870738d
                       556c68dd856613f373fe0318d9ea5ad6e30bf163
                       6d5b1605
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [f9:f4:c6:18:15:11:0a:ea:8e:96:29:28:ae:18:a3:2c:86:b1:97:61],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-11-05 06:44:37.368  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-05 06:44:37.371 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-05 06:44:37.373 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-11-05 06:44:37.374 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-05 06:44:37.375  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-11-05 06:44:37.375  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-05 06:44:37.376  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-05 06:44:37.377 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-05 06:44:37.377 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-05 06:44:37.378 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-05 06:44:37.382 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-05 06:44:37.383 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-05 06:44:37.383 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-05 06:44:37.384 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-05 06:44:37.557  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-05 06:44:37.557  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-05 06:44:37.558 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-05 06:44:37.558 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-05 06:44:37.560  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-05 06:44:37.560  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-05 06:44:37.560 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-05 06:44:37.561 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-05 06:44:37.561 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-05 06:44:37.562 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-05 06:44:37.562 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-05 06:44:37.562 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-05 06:44:37.563 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-05 06:44:37.564 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-05 06:44:37.564 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-05 06:44:37.565 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-05 06:44:37.568 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 40350770764094019195363803017877888586040847466
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Nov 05 04:57:39 UTC 2022
           Final Date: Thu Nov 04 04:57:38 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [c3:f9:7e:50:04:f1:33:80:eb:0a:e4:75:5e:43:82:51:65:15:08:c2],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 121cea4e56b34d776bc3d41e11a4a2c69f33026c
                       686e742079e7a9a803975135ffe43abf37dc6288
                       544ed91fbad695695581465e2948fe9a10ea0272
                       a249c5bcdc366fc3a2f22b5fda31ded1bad5199a
                       cb2c0cbf2ca00361f5f2b2313f6e795dcf17e423
                       f9ff682fea647a2cdd30abb1b736ff2c2e952186
                       5889ebe34395fb6dfd6a82e23309f392920c6199
                       9fb7d0831d1a41bd0a6968f6ed7eb7a6ff429a8c
                       59e1c5692b69b1c4a2fb9ffec9935b0cfd082d85
                       3d65f2f45498238a2cef46617826fe2ed3074c90
                       d4350e8f910506ccac644583ed3447f1ac50b97a
                       90b0f31fa7b0b03f55e5406960d77dd555d41147
                       44f9b6a93736fd77e9e5318ff21205661108e668
                       085bb23d5ffc477484a7fa1ba31185d7853ab3f3
                       91d7aedf3c59289bc1a0aa8319b9af9cd498e82a
                       4b9fbeb25ffa656892e3a227737b28bf743d1e89
                       d2e837fbe880e500c6d2ec0e5b3a60b12b104e24
                       f38d0fe016dd84628047ef0560f8736d7870738d
                       556c68dd856613f373fe0318d9ea5ad6e30bf163
                       6d5b1605
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [aa:6b:3e:df:07:18:30:b6:87:96:2a:25:40:9d:47:0a:8c:ad:5e:a4],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-11-05 06:49:21.358  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-05 06:49:21.361 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-05 06:49:21.364 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-11-05 06:49:21.365 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-05 06:49:21.366  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-11-05 06:49:21.366  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-05 06:49:21.367  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-05 06:49:21.367 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-05 06:49:21.368 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-05 06:49:21.369 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-05 06:49:21.373 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-05 06:49:21.374 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-05 06:49:21.374 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-05 06:49:21.375 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-05 06:49:21.506  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-05 06:49:21.507  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-05 06:49:21.508 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-05 06:49:21.508 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-05 06:49:21.511  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-05 06:49:21.512  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-05 06:49:21.513 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-05 06:49:21.513 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-05 06:49:21.514 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-05 06:49:21.515 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-05 06:49:21.515 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-05 06:49:21.515 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-05 06:49:21.516 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-05 06:49:21.517 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-05 06:49:21.517 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-05 06:49:21.518 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-05 06:49:21.524 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 40350770764094019195363803017877888586040847466
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Nov 05 04:57:39 UTC 2022
           Final Date: Thu Nov 04 04:57:38 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [c3:f9:7e:50:04:f1:33:80:eb:0a:e4:75:5e:43:82:51:65:15:08:c2],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 121cea4e56b34d776bc3d41e11a4a2c69f33026c
                       686e742079e7a9a803975135ffe43abf37dc6288
                       544ed91fbad695695581465e2948fe9a10ea0272
                       a249c5bcdc366fc3a2f22b5fda31ded1bad5199a
                       cb2c0cbf2ca00361f5f2b2313f6e795dcf17e423
                       f9ff682fea647a2cdd30abb1b736ff2c2e952186
                       5889ebe34395fb6dfd6a82e23309f392920c6199
                       9fb7d0831d1a41bd0a6968f6ed7eb7a6ff429a8c
                       59e1c5692b69b1c4a2fb9ffec9935b0cfd082d85
                       3d65f2f45498238a2cef46617826fe2ed3074c90
                       d4350e8f910506ccac644583ed3447f1ac50b97a
                       90b0f31fa7b0b03f55e5406960d77dd555d41147
                       44f9b6a93736fd77e9e5318ff21205661108e668
                       085bb23d5ffc477484a7fa1ba31185d7853ab3f3
                       91d7aedf3c59289bc1a0aa8319b9af9cd498e82a
                       4b9fbeb25ffa656892e3a227737b28bf743d1e89
                       d2e837fbe880e500c6d2ec0e5b3a60b12b104e24
                       f38d0fe016dd84628047ef0560f8736d7870738d
                       556c68dd856613f373fe0318d9ea5ad6e30bf163
                       6d5b1605
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ac:ea:3d:ae:35:2a:5f:e5:60:34:40:de:76:08:c9:c6:cb:01:e4:74],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-11-05 06:49:34.453  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-05 06:49:34.454 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-05 06:49:34.455 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-11-05 06:49:34.456 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-05 06:49:34.457  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-11-05 06:49:34.457  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-05 06:49:34.457  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-05 06:49:34.458 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-05 06:49:34.458 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-05 06:49:34.458 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-05 06:49:34.462 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-05 06:49:34.462 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-05 06:49:34.463 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-05 06:49:34.463 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-05 06:49:34.569  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-05 06:49:34.570  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-05 06:49:34.570 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-05 06:49:34.570 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-05 06:49:34.573  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-05 06:49:34.573  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-05 06:49:34.574 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-05 06:49:34.574 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-05 06:49:34.575 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-05 06:49:34.576 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-05 06:49:34.576 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-05 06:49:34.577 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-05 06:49:34.578 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-05 06:49:34.578 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-05 06:49:34.578 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-05 06:49:34.580 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-05 06:49:34.583 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 40350770764094019195363803017877888586040847466
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Nov 05 04:57:39 UTC 2022
           Final Date: Thu Nov 04 04:57:38 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [c3:f9:7e:50:04:f1:33:80:eb:0a:e4:75:5e:43:82:51:65:15:08:c2],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 121cea4e56b34d776bc3d41e11a4a2c69f33026c
                       686e742079e7a9a803975135ffe43abf37dc6288
                       544ed91fbad695695581465e2948fe9a10ea0272
                       a249c5bcdc366fc3a2f22b5fda31ded1bad5199a
                       cb2c0cbf2ca00361f5f2b2313f6e795dcf17e423
                       f9ff682fea647a2cdd30abb1b736ff2c2e952186
                       5889ebe34395fb6dfd6a82e23309f392920c6199
                       9fb7d0831d1a41bd0a6968f6ed7eb7a6ff429a8c
                       59e1c5692b69b1c4a2fb9ffec9935b0cfd082d85
                       3d65f2f45498238a2cef46617826fe2ed3074c90
                       d4350e8f910506ccac644583ed3447f1ac50b97a
                       90b0f31fa7b0b03f55e5406960d77dd555d41147
                       44f9b6a93736fd77e9e5318ff21205661108e668
                       085bb23d5ffc477484a7fa1ba31185d7853ab3f3
                       91d7aedf3c59289bc1a0aa8319b9af9cd498e82a
                       4b9fbeb25ffa656892e3a227737b28bf743d1e89
                       d2e837fbe880e500c6d2ec0e5b3a60b12b104e24
                       f38d0fe016dd84628047ef0560f8736d7870738d
                       556c68dd856613f373fe0318d9ea5ad6e30bf163
                       6d5b1605
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [c3:3d:73:6e:ba:b5:84:bd:49:29:5b:1e:de:bd:8d:d8:33:86:48:17],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-11-05 07:10:19.372  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-05 07:10:19.375 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-05 07:10:19.378 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-11-05 07:10:19.378 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-05 07:10:19.379  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-11-05 07:10:19.379  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-05 07:10:19.380  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-05 07:10:19.380 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-05 07:10:19.381 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-05 07:10:19.381 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-05 07:10:19.385 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-05 07:10:19.386 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-05 07:10:19.386 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-05 07:10:19.387 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-05 07:10:19.539  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-05 07:10:19.539  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-05 07:10:19.540 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-05 07:10:19.540 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-05 07:10:19.541  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-05 07:10:19.542  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-05 07:10:19.542 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-05 07:10:19.543 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-05 07:10:19.543 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-05 07:10:19.544 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-05 07:10:19.544 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-05 07:10:19.544 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-05 07:10:19.545 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-05 07:10:19.546 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-05 07:10:19.546 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-05 07:10:19.547 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-05 07:10:19.551 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 40350770764094019195363803017877888586040847466
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Nov 05 04:57:39 UTC 2022
           Final Date: Thu Nov 04 04:57:38 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [c3:f9:7e:50:04:f1:33:80:eb:0a:e4:75:5e:43:82:51:65:15:08:c2],[56:66:d1:a4]
        modulus: ed6a8d94160df4b6c587bb7f95e858fafd94b4c7068bba66d7b1d8ac26cf46e1429d2d5297b8fc9fc5bcd7d28ed6a1c003aec6157dc1e196b6d627a18301fe97738e362f3efd1aea02a52fa66a0518a8188620ab146c567487b1f0d917c0150c3f8406c0a1cd8203659a63ca83f460a7ee7242ced76bd6dec4c6c8ae1c338d841e2e49ae90afe2703f21b4cdc11c90a53191df95064f0c176f501e458191efe90744dd407179348d6eb80924e17b015aecdca9cf604a4154bb7caa6be1ba7689aefc591d87308477e670ce2d0540dbc6abc8875c9530cbc13c4eed63a7de139ecf86d4dd98ccf379016a9ae1c6a858acf2deff93466f6c4890773c4821410ae43841c54e042a3bfed23919f3ee684daaabf3491ed559b2a32391e8abc60f2166e47bebb6d16f0323b542f24c2b5953682cc640b31eed1a69df9f2694ba2a79b0ba79cfd7f88f369504a0d6c3b28173b68d66c743d3bd638ccbec2f8dff286d6796492ac0b9d66a2b06a96fc04f52ce37fbdf7c5d4944f96372ed3d2031e3236d
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 121cea4e56b34d776bc3d41e11a4a2c69f33026c
                       686e742079e7a9a803975135ffe43abf37dc6288
                       544ed91fbad695695581465e2948fe9a10ea0272
                       a249c5bcdc366fc3a2f22b5fda31ded1bad5199a
                       cb2c0cbf2ca00361f5f2b2313f6e795dcf17e423
                       f9ff682fea647a2cdd30abb1b736ff2c2e952186
                       5889ebe34395fb6dfd6a82e23309f392920c6199
                       9fb7d0831d1a41bd0a6968f6ed7eb7a6ff429a8c
                       59e1c5692b69b1c4a2fb9ffec9935b0cfd082d85
                       3d65f2f45498238a2cef46617826fe2ed3074c90
                       d4350e8f910506ccac644583ed3447f1ac50b97a
                       90b0f31fa7b0b03f55e5406960d77dd555d41147
                       44f9b6a93736fd77e9e5318ff21205661108e668
                       085bb23d5ffc477484a7fa1ba31185d7853ab3f3
                       91d7aedf3c59289bc1a0aa8319b9af9cd498e82a
                       4b9fbeb25ffa656892e3a227737b28bf743d1e89
                       d2e837fbe880e500c6d2ec0e5b3a60b12b104e24
                       f38d0fe016dd84628047ef0560f8736d7870738d
                       556c68dd856613f373fe0318d9ea5ad6e30bf163
                       6d5b1605
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [c3:2d:72:17:f7:26:cd:df:9c:ca:66:6e:d0:aa:70:4e:2b:3e:63:71],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-11-05 07:10:24.470  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-05 07:10:24.471 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-05 07:10:24.473 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-11-05 07:10:24.474 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-05 07:10:24.474  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-11-05 07:10:24.474  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-05 07:10:24.475  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-05 07:10:24.475 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-05 07:10:24.476 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-05 07:10:24.476 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-05 07:10:24.480 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-05 07:10:24.480 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-05 07:10:24.481 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-05 07:10:24.481 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-05 07:10:24.585  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-05 07:10:24.586  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-05 07:10:24.586 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-05 07:10:24.586 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-05 07:10:24.587  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-05 07:10:24.588  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-05 07:10:24.588 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-05 07:10:24.589 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-05 07:10:24.589 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-05 07:10:24.589 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-05 07:10:24.590 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-05 07:10:24.590 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-05 07:10:24.591 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-05 07:10:24.591 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-05 07:10:24.591 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-05 07:10:24.592 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-05 07:10:24.595 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 40350770764094019195363803017877888586040847466
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Nov 05 04:57:39 UTC 2022
           Final Date: Thu Nov 04 04:57:38 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [c3:f9:7e:50:04:f1:33:80:eb:0a:e4:75:5e:43:82:51:65:15:08:c2],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 121cea4e56b34d776bc3d41e11a4a2c69f33026c
                       686e742079e7a9a803975135ffe43abf37dc6288
                       544ed91fbad695695581465e2948fe9a10ea0272
                       a249c5bcdc366fc3a2f22b5fda31ded1bad5199a
                       cb2c0cbf2ca00361f5f2b2313f6e795dcf17e423
                       f9ff682fea647a2cdd30abb1b736ff2c2e952186
                       5889ebe34395fb6dfd6a82e23309f392920c6199
                       9fb7d0831d1a41bd0a6968f6ed7eb7a6ff429a8c
                       59e1c5692b69b1c4a2fb9ffec9935b0cfd082d85
                       3d65f2f45498238a2cef46617826fe2ed3074c90
                       d4350e8f910506ccac644583ed3447f1ac50b97a
                       90b0f31fa7b0b03f55e5406960d77dd555d41147
                       44f9b6a93736fd77e9e5318ff21205661108e668
                       085bb23d5ffc477484a7fa1ba31185d7853ab3f3
                       91d7aedf3c59289bc1a0aa8319b9af9cd498e82a
                       4b9fbeb25ffa656892e3a227737b28bf743d1e89
                       d2e837fbe880e500c6d2ec0e5b3a60b12b104e24
                       f38d0fe016dd84628047ef0560f8736d7870738d
                       556c68dd856613f373fe0318d9ea5ad6e30bf163
                       6d5b1605
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [d3:fb:a1:00:1a:ae:12:3a:b2:39:b4:d4:74:19:02:5f:8f:a4:cc:cd],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

]