Results

By type

          2022-11-09 04:58:33,780 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-11-09 04:58:35,082 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-11-09 04:58:35.728  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Nov 09, 2022 4:58:37 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Nov 09, 2022 4:58:37 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Nov 09, 2022 4:58:37 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Nov 09, 2022 4:58:37 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-11-09 04:58:37.992 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-11-09 04:58:38.254  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-11-09 04:58:38.411  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-11-09 04:58:39.057 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-11-09 04:58:39.060 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
2022-11-09 04:58:39.061 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-11-09 04:58:39.065 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-11-09 04:58:39.108 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2022-11-09 04:58:39.111 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/docs]}: redirectToUi(HttpServletRequest)
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
2022-11-09 04:58:39.228 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-11-09 04:58:40.001 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Nov 09, 2022 4:58:40 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-11-09 04:58:40.847  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 7.881 seconds (JVM running for 9.643)
Nov 09, 2022 4:59:07 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-11-09 04:59:33.257  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-09 04:59:33.264 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-09 04:59:33.305 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-11-09 04:59:33.308 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-09 04:59:33.324  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-11-09 04:59:33.327  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-09 04:59:33.327  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-09 04:59:33.329 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-09 04:59:33.329 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-09 04:59:33.333 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-09 04:59:33.341 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-09 04:59:33.345 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-09 04:59:33.396 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-09 04:59:33.403 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-09 04:59:33.403 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-09 04:59:33.408 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-09 04:59:33.992  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-09 04:59:33.994  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-09 04:59:33.995 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-09 04:59:33.996 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-09 04:59:34.006  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-09 04:59:34.007  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-09 04:59:34.008 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-09 04:59:34.008 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-09 04:59:34.009 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-09 04:59:34.024 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-09 04:59:34.024 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-09 04:59:34.025 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-09 04:59:34.031 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-09 04:59:34.032 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-09 04:59:34.033 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-09 04:59:34.035 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-09 04:59:34.071 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 278444683596101070385710211879529582979721449986
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Nov 09 04:56:21 UTC 2022
           Final Date: Mon Nov 08 04:56:20 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [53:37:7c:d5:ac:48:9c:8b:bc:ee:3a:2b:ad:f2:e8:2a:d5:b3:09:24],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3a54dda77af54437b88a6e6c59285ea65fa4d6f6
                       014bfd63fb1c51b09c9a203f1b562b88c3186a3a
                       674e1d090a602c04c2d4a97e7354129cdfbb80fb
                       6d8a1d35ee713696b20221d8c0f31a1aeea2a90c
                       8b6f267cc5e7d8d5c44966c49a439eeecd8dd9e3
                       920173bd9c9245148224878a65c8d1168c6d34db
                       2ea72af3629754789c7cd9b6ea2ad730346c1be5
                       4f427cf3407dc1eee8515dd1299e2e7246c7deff
                       1aa2fc1400dded16bace489dc871162732530c24
                       fbb4853ccabc61b1d197ac548b59f8b5e526026a
                       626d3217cc0e73f6a1ac2de6369a9ae4c8e4fdbe
                       dc1ca7f87cdf960d3a09fa8cb565e4d386efbcdb
                       a94f90b453c1a108a5672869d3b6958c897afcb1
                       08eda90d00f615f8bb0d104be8b5c829dd6f299c
                       4533917848bf25314ef249ca788371b937785d5d
                       5e8149e83017d45658362f6bb969d8819d8967ad
                       b5b0d2db277a0362504f78618bd08cd0cad47d82
                       f773139be5d4b0076d8b3ecae11e7727c758085b
                       f5f58c5193a291dfdbd52025958adf81f78e2d4e
                       58db3094
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [66:f7:3e:d1:ef:c3:59:eb:c1:48:e5:5e:e6:b4:09:43:c1:ee:aa:6a],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-11-09 06:11:09.202  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-09 06:11:09.207 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-09 06:11:09.210 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-09 06:11:09.211 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-09 06:11:09.212  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-09 06:11:09.213  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-09 06:11:09.214  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-09 06:11:09.214 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-09 06:11:09.215 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-09 06:11:09.215 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-09 06:11:09.221 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-09 06:11:09.222 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-09 06:11:09.223 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-09 06:11:09.223 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-09 06:11:09.446  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-09 06:11:09.447  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-09 06:11:09.447 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-09 06:11:09.448 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-09 06:11:09.450  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-09 06:11:09.451  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-09 06:11:09.452 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-09 06:11:09.452 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-09 06:11:09.452 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-09 06:11:09.454 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-09 06:11:09.454 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-09 06:11:09.454 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-09 06:11:09.455 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-09 06:11:09.456 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-09 06:11:09.456 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-09 06:11:09.457 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-09 06:11:09.461 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 278444683596101070385710211879529582979721449986
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Nov 09 04:56:21 UTC 2022
           Final Date: Mon Nov 08 04:56:20 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [53:37:7c:d5:ac:48:9c:8b:bc:ee:3a:2b:ad:f2:e8:2a:d5:b3:09:24],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3a54dda77af54437b88a6e6c59285ea65fa4d6f6
                       014bfd63fb1c51b09c9a203f1b562b88c3186a3a
                       674e1d090a602c04c2d4a97e7354129cdfbb80fb
                       6d8a1d35ee713696b20221d8c0f31a1aeea2a90c
                       8b6f267cc5e7d8d5c44966c49a439eeecd8dd9e3
                       920173bd9c9245148224878a65c8d1168c6d34db
                       2ea72af3629754789c7cd9b6ea2ad730346c1be5
                       4f427cf3407dc1eee8515dd1299e2e7246c7deff
                       1aa2fc1400dded16bace489dc871162732530c24
                       fbb4853ccabc61b1d197ac548b59f8b5e526026a
                       626d3217cc0e73f6a1ac2de6369a9ae4c8e4fdbe
                       dc1ca7f87cdf960d3a09fa8cb565e4d386efbcdb
                       a94f90b453c1a108a5672869d3b6958c897afcb1
                       08eda90d00f615f8bb0d104be8b5c829dd6f299c
                       4533917848bf25314ef249ca788371b937785d5d
                       5e8149e83017d45658362f6bb969d8819d8967ad
                       b5b0d2db277a0362504f78618bd08cd0cad47d82
                       f773139be5d4b0076d8b3ecae11e7727c758085b
                       f5f58c5193a291dfdbd52025958adf81f78e2d4e
                       58db3094
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [1e:ad:b8:2d:28:e3:b0:ee:75:a3:ed:80:21:80:f6:71:e5:62:bb:c9],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-11-09 06:12:57.257  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-09 06:12:57.258 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-09 06:12:57.260 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-11-09 06:12:57.261 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-09 06:12:57.262  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-11-09 06:12:57.263  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-09 06:12:57.264  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-09 06:12:57.264 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-09 06:12:57.265 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-09 06:12:57.266 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-09 06:12:57.271 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-09 06:12:57.272 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-09 06:12:57.272 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-09 06:12:57.273 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-09 06:12:57.410  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-09 06:12:57.415  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-09 06:12:57.416 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-09 06:12:57.416 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-09 06:12:57.419  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-09 06:12:57.420  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-09 06:12:57.420 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-09 06:12:57.421 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-09 06:12:57.421 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-09 06:12:57.422 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-09 06:12:57.423 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-09 06:12:57.424 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-09 06:12:57.424 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-09 06:12:57.425 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-09 06:12:57.425 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-09 06:12:57.437 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-09 06:12:57.442 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 278444683596101070385710211879529582979721449986
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Nov 09 04:56:21 UTC 2022
           Final Date: Mon Nov 08 04:56:20 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [53:37:7c:d5:ac:48:9c:8b:bc:ee:3a:2b:ad:f2:e8:2a:d5:b3:09:24],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3a54dda77af54437b88a6e6c59285ea65fa4d6f6
                       014bfd63fb1c51b09c9a203f1b562b88c3186a3a
                       674e1d090a602c04c2d4a97e7354129cdfbb80fb
                       6d8a1d35ee713696b20221d8c0f31a1aeea2a90c
                       8b6f267cc5e7d8d5c44966c49a439eeecd8dd9e3
                       920173bd9c9245148224878a65c8d1168c6d34db
                       2ea72af3629754789c7cd9b6ea2ad730346c1be5
                       4f427cf3407dc1eee8515dd1299e2e7246c7deff
                       1aa2fc1400dded16bace489dc871162732530c24
                       fbb4853ccabc61b1d197ac548b59f8b5e526026a
                       626d3217cc0e73f6a1ac2de6369a9ae4c8e4fdbe
                       dc1ca7f87cdf960d3a09fa8cb565e4d386efbcdb
                       a94f90b453c1a108a5672869d3b6958c897afcb1
                       08eda90d00f615f8bb0d104be8b5c829dd6f299c
                       4533917848bf25314ef249ca788371b937785d5d
                       5e8149e83017d45658362f6bb969d8819d8967ad
                       b5b0d2db277a0362504f78618bd08cd0cad47d82
                       f773139be5d4b0076d8b3ecae11e7727c758085b
                       f5f58c5193a291dfdbd52025958adf81f78e2d4e
                       58db3094
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [a0:0f:81:ca:58:8d:d0:78:a9:e4:68:9d:9b:43:f9:44:a3:42:24:8b],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-11-09 06:14:22.978  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-09 06:14:22.983 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-09 06:14:22.988 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-11-09 06:14:22.989 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-09 06:14:22.990  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-11-09 06:14:22.991  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-09 06:14:22.992  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-09 06:14:22.993 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-09 06:14:22.994 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-09 06:14:22.995 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-09 06:14:23.000 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-09 06:14:23.001 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-09 06:14:23.002 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-09 06:14:23.002 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-09 06:14:23.171  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-09 06:14:23.172  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-09 06:14:23.173 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-09 06:14:23.173 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-09 06:14:23.175  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-09 06:14:23.176  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-09 06:14:23.179 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-09 06:14:23.180 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-09 06:14:23.180 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-09 06:14:23.181 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-09 06:14:23.182 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-09 06:14:23.182 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-09 06:14:23.184 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-09 06:14:23.184 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-09 06:14:23.185 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-09 06:14:23.186 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-09 06:14:23.192 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 278444683596101070385710211879529582979721449986
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Nov 09 04:56:21 UTC 2022
           Final Date: Mon Nov 08 04:56:20 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [53:37:7c:d5:ac:48:9c:8b:bc:ee:3a:2b:ad:f2:e8:2a:d5:b3:09:24],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3a54dda77af54437b88a6e6c59285ea65fa4d6f6
                       014bfd63fb1c51b09c9a203f1b562b88c3186a3a
                       674e1d090a602c04c2d4a97e7354129cdfbb80fb
                       6d8a1d35ee713696b20221d8c0f31a1aeea2a90c
                       8b6f267cc5e7d8d5c44966c49a439eeecd8dd9e3
                       920173bd9c9245148224878a65c8d1168c6d34db
                       2ea72af3629754789c7cd9b6ea2ad730346c1be5
                       4f427cf3407dc1eee8515dd1299e2e7246c7deff
                       1aa2fc1400dded16bace489dc871162732530c24
                       fbb4853ccabc61b1d197ac548b59f8b5e526026a
                       626d3217cc0e73f6a1ac2de6369a9ae4c8e4fdbe
                       dc1ca7f87cdf960d3a09fa8cb565e4d386efbcdb
                       a94f90b453c1a108a5672869d3b6958c897afcb1
                       08eda90d00f615f8bb0d104be8b5c829dd6f299c
                       4533917848bf25314ef249ca788371b937785d5d
                       5e8149e83017d45658362f6bb969d8819d8967ad
                       b5b0d2db277a0362504f78618bd08cd0cad47d82
                       f773139be5d4b0076d8b3ecae11e7727c758085b
                       f5f58c5193a291dfdbd52025958adf81f78e2d4e
                       58db3094
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [07:ea:c2:55:8a:e2:5a:e5:2a:34:d0:cf:87:a3:c3:46:5b:67:02:26],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-11-09 06:16:31.410  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-09 06:16:31.412 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-09 06:16:31.414 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-09 06:16:31.416 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-09 06:16:31.416  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-09 06:16:31.417  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-09 06:16:31.418  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-09 06:16:31.419 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-09 06:16:31.419 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-09 06:16:31.420 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-09 06:16:31.425 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-09 06:16:31.426 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-09 06:16:31.426 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-09 06:16:31.427 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-09 06:16:31.561  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-09 06:16:31.562  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-09 06:16:31.563 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-09 06:16:31.563 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-09 06:16:31.565  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-09 06:16:31.566  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-09 06:16:31.567 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-09 06:16:31.568 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-09 06:16:31.568 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-09 06:16:31.569 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-09 06:16:31.570 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-09 06:16:31.570 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-09 06:16:31.571 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-09 06:16:31.572 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-09 06:16:31.573 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-09 06:16:31.574 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-09 06:16:31.578 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 278444683596101070385710211879529582979721449986
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Nov 09 04:56:21 UTC 2022
           Final Date: Mon Nov 08 04:56:20 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [53:37:7c:d5:ac:48:9c:8b:bc:ee:3a:2b:ad:f2:e8:2a:d5:b3:09:24],[56:66:d1:a4]
        modulus: c5bc25caa3ed6768a5574e0e716f27f59e385a3766644b134b010131076c4953459c30cace689af71e65e5d84c90e41ad8dbac8dc0397aa92fd670880bbd45450d4a5cfee0822e7a5b6053a0590bcd6c612234616eecb39ca0add9391086bed66417694cc3d408682b9f8909967670e82280166898a49b5749563b4da77a2168fcbd76a6e2c4d6a2e0b2f6bd461bb95458e10188bbbf5eb1229445bee61674921a055b4aa99419535dff8ace6dd106bb25b542f192cba8af9159e06b6562b5734fe0297440ed2aab32443f8aab3a51283e77d48fc9ec6fdabd92bdf94088a1a4f70948f4620a768fe0a70947f5f103b40c5a30baf9304ee7f83a34372bc20427b95192e998af458e673358ad4e9ea7621fc444ce82276fe67d0a5a01de1cf2e4b458648acf40d6cf062b2af14763bce3a1d6ac598eff5e46d67fb4fa851c3b5cd2606c50b6222f8c903fe4a6a7ca2db1a044dc5269d9a05795e7650b22ee2baa52019cbd1688366d1013100a6f5ad1d8f8a8a2b5fc822e3246cf22b124c8a5f9
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3a54dda77af54437b88a6e6c59285ea65fa4d6f6
                       014bfd63fb1c51b09c9a203f1b562b88c3186a3a
                       674e1d090a602c04c2d4a97e7354129cdfbb80fb
                       6d8a1d35ee713696b20221d8c0f31a1aeea2a90c
                       8b6f267cc5e7d8d5c44966c49a439eeecd8dd9e3
                       920173bd9c9245148224878a65c8d1168c6d34db
                       2ea72af3629754789c7cd9b6ea2ad730346c1be5
                       4f427cf3407dc1eee8515dd1299e2e7246c7deff
                       1aa2fc1400dded16bace489dc871162732530c24
                       fbb4853ccabc61b1d197ac548b59f8b5e526026a
                       626d3217cc0e73f6a1ac2de6369a9ae4c8e4fdbe
                       dc1ca7f87cdf960d3a09fa8cb565e4d386efbcdb
                       a94f90b453c1a108a5672869d3b6958c897afcb1
                       08eda90d00f615f8bb0d104be8b5c829dd6f299c
                       4533917848bf25314ef249ca788371b937785d5d
                       5e8149e83017d45658362f6bb969d8819d8967ad
                       b5b0d2db277a0362504f78618bd08cd0cad47d82
                       f773139be5d4b0076d8b3ecae11e7727c758085b
                       f5f58c5193a291dfdbd52025958adf81f78e2d4e
                       58db3094
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [c9:45:33:87:80:e6:54:72:a1:75:0d:17:9d:b3:ee:1c:f2:16:4e:55],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-11-09 06:21:56.302  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-09 06:21:56.313 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-09 06:21:56.315 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-09 06:21:56.316 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-09 06:21:56.317  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-09 06:21:56.318  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-09 06:21:56.318  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-09 06:21:56.319 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-09 06:21:56.320 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-09 06:21:56.320 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-09 06:21:56.326 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-09 06:21:56.328 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-09 06:21:56.328 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-09 06:21:56.329 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-09 06:21:56.491  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-09 06:21:56.492  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-09 06:21:56.493 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-09 06:21:56.493 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-09 06:21:56.494  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-09 06:21:56.495  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-09 06:21:56.495 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-09 06:21:56.496 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-09 06:21:56.496 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-09 06:21:56.497 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-09 06:21:56.498 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-09 06:21:56.498 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-09 06:21:56.499 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-09 06:21:56.499 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-09 06:21:56.500 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-09 06:21:56.501 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-09 06:21:56.504 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 278444683596101070385710211879529582979721449986
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Nov 09 04:56:21 UTC 2022
           Final Date: Mon Nov 08 04:56:20 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [53:37:7c:d5:ac:48:9c:8b:bc:ee:3a:2b:ad:f2:e8:2a:d5:b3:09:24],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3a54dda77af54437b88a6e6c59285ea65fa4d6f6
                       014bfd63fb1c51b09c9a203f1b562b88c3186a3a
                       674e1d090a602c04c2d4a97e7354129cdfbb80fb
                       6d8a1d35ee713696b20221d8c0f31a1aeea2a90c
                       8b6f267cc5e7d8d5c44966c49a439eeecd8dd9e3
                       920173bd9c9245148224878a65c8d1168c6d34db
                       2ea72af3629754789c7cd9b6ea2ad730346c1be5
                       4f427cf3407dc1eee8515dd1299e2e7246c7deff
                       1aa2fc1400dded16bace489dc871162732530c24
                       fbb4853ccabc61b1d197ac548b59f8b5e526026a
                       626d3217cc0e73f6a1ac2de6369a9ae4c8e4fdbe
                       dc1ca7f87cdf960d3a09fa8cb565e4d386efbcdb
                       a94f90b453c1a108a5672869d3b6958c897afcb1
                       08eda90d00f615f8bb0d104be8b5c829dd6f299c
                       4533917848bf25314ef249ca788371b937785d5d
                       5e8149e83017d45658362f6bb969d8819d8967ad
                       b5b0d2db277a0362504f78618bd08cd0cad47d82
                       f773139be5d4b0076d8b3ecae11e7727c758085b
                       f5f58c5193a291dfdbd52025958adf81f78e2d4e
                       58db3094
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [7f:58:84:c0:14:74:97:ce:7f:d4:cb:8f:70:de:bb:c3:33:fc:9d:0e],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-11-09 06:25:50.384  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-09 06:25:50.387 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-09 06:25:50.395 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-09 06:25:50.396 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-09 06:25:50.396  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-09 06:25:50.397  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-09 06:25:50.398  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-09 06:25:50.398 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-09 06:25:50.399 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-09 06:25:50.399 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-09 06:25:50.404 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-09 06:25:50.405 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-09 06:25:50.405 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-09 06:25:50.405 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-09 06:25:50.565  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-09 06:25:50.566  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-09 06:25:50.566 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-09 06:25:50.566 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-09 06:25:50.568  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-09 06:25:50.568  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-09 06:25:50.569 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-09 06:25:50.569 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-09 06:25:50.570 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-09 06:25:50.571 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-09 06:25:50.571 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-09 06:25:50.572 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-09 06:25:50.572 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-09 06:25:50.573 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-09 06:25:50.573 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-09 06:25:50.574 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-09 06:25:50.578 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 278444683596101070385710211879529582979721449986
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Nov 09 04:56:21 UTC 2022
           Final Date: Mon Nov 08 04:56:20 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [53:37:7c:d5:ac:48:9c:8b:bc:ee:3a:2b:ad:f2:e8:2a:d5:b3:09:24],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3a54dda77af54437b88a6e6c59285ea65fa4d6f6
                       014bfd63fb1c51b09c9a203f1b562b88c3186a3a
                       674e1d090a602c04c2d4a97e7354129cdfbb80fb
                       6d8a1d35ee713696b20221d8c0f31a1aeea2a90c
                       8b6f267cc5e7d8d5c44966c49a439eeecd8dd9e3
                       920173bd9c9245148224878a65c8d1168c6d34db
                       2ea72af3629754789c7cd9b6ea2ad730346c1be5
                       4f427cf3407dc1eee8515dd1299e2e7246c7deff
                       1aa2fc1400dded16bace489dc871162732530c24
                       fbb4853ccabc61b1d197ac548b59f8b5e526026a
                       626d3217cc0e73f6a1ac2de6369a9ae4c8e4fdbe
                       dc1ca7f87cdf960d3a09fa8cb565e4d386efbcdb
                       a94f90b453c1a108a5672869d3b6958c897afcb1
                       08eda90d00f615f8bb0d104be8b5c829dd6f299c
                       4533917848bf25314ef249ca788371b937785d5d
                       5e8149e83017d45658362f6bb969d8819d8967ad
                       b5b0d2db277a0362504f78618bd08cd0cad47d82
                       f773139be5d4b0076d8b3ecae11e7727c758085b
                       f5f58c5193a291dfdbd52025958adf81f78e2d4e
                       58db3094
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [aa:dd:c0:a5:3e:01:66:ab:94:e5:98:87:e0:df:ce:ae:e0:23:ac:cc],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-11-09 06:31:04.558  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-09 06:31:04.560 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-09 06:31:04.562 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-11-09 06:31:04.563 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-09 06:31:04.563  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-11-09 06:31:04.564  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-09 06:31:04.565  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-09 06:31:04.565 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-09 06:31:04.566 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-09 06:31:04.566 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-09 06:31:04.570 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-09 06:31:04.571 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-09 06:31:04.571 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-09 06:31:04.571 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-09 06:31:04.749  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-09 06:31:04.750  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-09 06:31:04.750 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-09 06:31:04.751 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-09 06:31:04.752  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-09 06:31:04.753  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-09 06:31:04.753 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-09 06:31:04.753 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-09 06:31:04.754 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-09 06:31:04.754 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-09 06:31:04.754 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-09 06:31:04.755 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-09 06:31:04.755 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-09 06:31:04.756 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-09 06:31:04.756 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-09 06:31:04.756 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-09 06:31:04.760 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 278444683596101070385710211879529582979721449986
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Nov 09 04:56:21 UTC 2022
           Final Date: Mon Nov 08 04:56:20 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [53:37:7c:d5:ac:48:9c:8b:bc:ee:3a:2b:ad:f2:e8:2a:d5:b3:09:24],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3a54dda77af54437b88a6e6c59285ea65fa4d6f6
                       014bfd63fb1c51b09c9a203f1b562b88c3186a3a
                       674e1d090a602c04c2d4a97e7354129cdfbb80fb
                       6d8a1d35ee713696b20221d8c0f31a1aeea2a90c
                       8b6f267cc5e7d8d5c44966c49a439eeecd8dd9e3
                       920173bd9c9245148224878a65c8d1168c6d34db
                       2ea72af3629754789c7cd9b6ea2ad730346c1be5
                       4f427cf3407dc1eee8515dd1299e2e7246c7deff
                       1aa2fc1400dded16bace489dc871162732530c24
                       fbb4853ccabc61b1d197ac548b59f8b5e526026a
                       626d3217cc0e73f6a1ac2de6369a9ae4c8e4fdbe
                       dc1ca7f87cdf960d3a09fa8cb565e4d386efbcdb
                       a94f90b453c1a108a5672869d3b6958c897afcb1
                       08eda90d00f615f8bb0d104be8b5c829dd6f299c
                       4533917848bf25314ef249ca788371b937785d5d
                       5e8149e83017d45658362f6bb969d8819d8967ad
                       b5b0d2db277a0362504f78618bd08cd0cad47d82
                       f773139be5d4b0076d8b3ecae11e7727c758085b
                       f5f58c5193a291dfdbd52025958adf81f78e2d4e
                       58db3094
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [63:e1:e0:e2:2a:ae:f8:c6:3e:4b:d5:e9:5b:0f:a5:4a:02:39:d8:7b],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-11-09 06:36:35.033  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-09 06:36:35.036 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-09 06:36:35.039 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-11-09 06:36:35.040 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-09 06:36:35.040  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-11-09 06:36:35.041  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-09 06:36:35.041  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-09 06:36:35.042 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-09 06:36:35.042 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-09 06:36:35.043 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-09 06:36:35.046 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-09 06:36:35.047 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-09 06:36:35.048 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-09 06:36:35.048 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-09 06:36:35.230  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-09 06:36:35.231  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-09 06:36:35.231 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-09 06:36:35.231 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-09 06:36:35.233  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-09 06:36:35.234  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-09 06:36:35.234 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-09 06:36:35.235 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-09 06:36:35.235 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-09 06:36:35.236 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-09 06:36:35.237 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-09 06:36:35.237 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-09 06:36:35.238 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-09 06:36:35.239 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-09 06:36:35.239 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-09 06:36:35.241 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-09 06:36:35.245 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 278444683596101070385710211879529582979721449986
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Nov 09 04:56:21 UTC 2022
           Final Date: Mon Nov 08 04:56:20 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [53:37:7c:d5:ac:48:9c:8b:bc:ee:3a:2b:ad:f2:e8:2a:d5:b3:09:24],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3a54dda77af54437b88a6e6c59285ea65fa4d6f6
                       014bfd63fb1c51b09c9a203f1b562b88c3186a3a
                       674e1d090a602c04c2d4a97e7354129cdfbb80fb
                       6d8a1d35ee713696b20221d8c0f31a1aeea2a90c
                       8b6f267cc5e7d8d5c44966c49a439eeecd8dd9e3
                       920173bd9c9245148224878a65c8d1168c6d34db
                       2ea72af3629754789c7cd9b6ea2ad730346c1be5
                       4f427cf3407dc1eee8515dd1299e2e7246c7deff
                       1aa2fc1400dded16bace489dc871162732530c24
                       fbb4853ccabc61b1d197ac548b59f8b5e526026a
                       626d3217cc0e73f6a1ac2de6369a9ae4c8e4fdbe
                       dc1ca7f87cdf960d3a09fa8cb565e4d386efbcdb
                       a94f90b453c1a108a5672869d3b6958c897afcb1
                       08eda90d00f615f8bb0d104be8b5c829dd6f299c
                       4533917848bf25314ef249ca788371b937785d5d
                       5e8149e83017d45658362f6bb969d8819d8967ad
                       b5b0d2db277a0362504f78618bd08cd0cad47d82
                       f773139be5d4b0076d8b3ecae11e7727c758085b
                       f5f58c5193a291dfdbd52025958adf81f78e2d4e
                       58db3094
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [3d:2e:35:10:61:5c:df:54:f6:80:69:59:2b:44:45:7e:f2:c0:0f:b7],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-11-09 06:36:55.770  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-09 06:36:55.771 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-09 06:36:55.773 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-11-09 06:36:55.774 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-09 06:36:55.774  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-11-09 06:36:55.774  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-09 06:36:55.775  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-09 06:36:55.775 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-09 06:36:55.775 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-09 06:36:55.776 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-09 06:36:55.779 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-09 06:36:55.780 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-09 06:36:55.780 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-09 06:36:55.781 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-09 06:36:56.000  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-09 06:36:56.001  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-09 06:36:56.001 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-09 06:36:56.001 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-09 06:36:56.002  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-09 06:36:56.003  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-09 06:36:56.003 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-09 06:36:56.003 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-09 06:36:56.004 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-09 06:36:56.004 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-09 06:36:56.005 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-09 06:36:56.005 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-09 06:36:56.006 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-09 06:36:56.006 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-09 06:36:56.006 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-09 06:36:56.007 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-09 06:36:56.009 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 278444683596101070385710211879529582979721449986
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Nov 09 04:56:21 UTC 2022
           Final Date: Mon Nov 08 04:56:20 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [53:37:7c:d5:ac:48:9c:8b:bc:ee:3a:2b:ad:f2:e8:2a:d5:b3:09:24],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3a54dda77af54437b88a6e6c59285ea65fa4d6f6
                       014bfd63fb1c51b09c9a203f1b562b88c3186a3a
                       674e1d090a602c04c2d4a97e7354129cdfbb80fb
                       6d8a1d35ee713696b20221d8c0f31a1aeea2a90c
                       8b6f267cc5e7d8d5c44966c49a439eeecd8dd9e3
                       920173bd9c9245148224878a65c8d1168c6d34db
                       2ea72af3629754789c7cd9b6ea2ad730346c1be5
                       4f427cf3407dc1eee8515dd1299e2e7246c7deff
                       1aa2fc1400dded16bace489dc871162732530c24
                       fbb4853ccabc61b1d197ac548b59f8b5e526026a
                       626d3217cc0e73f6a1ac2de6369a9ae4c8e4fdbe
                       dc1ca7f87cdf960d3a09fa8cb565e4d386efbcdb
                       a94f90b453c1a108a5672869d3b6958c897afcb1
                       08eda90d00f615f8bb0d104be8b5c829dd6f299c
                       4533917848bf25314ef249ca788371b937785d5d
                       5e8149e83017d45658362f6bb969d8819d8967ad
                       b5b0d2db277a0362504f78618bd08cd0cad47d82
                       f773139be5d4b0076d8b3ecae11e7727c758085b
                       f5f58c5193a291dfdbd52025958adf81f78e2d4e
                       58db3094
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [8d:b7:63:bf:17:c2:dc:ba:33:77:86:f3:20:b0:a1:bf:80:17:e4:1a],[56:66:d1:a4]
        modulus: c1ad1e3fcd47d6a942e2d04930ca9ecaaf7b72797ad9402a5dc45d6e5e2d4be4cc67ea5f4dd0756a36db82d411dda952ee0c1ea96df661b000819e7e21353ab6b9e737e6009df0276a31d2f76bc07020191eee5cbdad2024619190ed5a3135fbbce4d693c85e420c575f35ac7a7bb52fe6a84bc21d6fbe45bff6c1f68a134e009c426164e720877500c7882e9e6f2033b766dae4b65e21593b0e3683ef34494d190d7f53c73c99ddfd6bfa868b824185ead655a188add54d398a7195746b30d9c6eba31ba12795321da7e7c7ef202bbb9330996323592dd4595e7e1b857a6521d24cc3c8d730e5f33b4018b0c2de17c2a2cad0abc0ead3aa953e4e865a8ba239
public exponent: 10001

] 
2022-11-09 06:55:00.661  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-09 06:55:00.664 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-09 06:55:00.667 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-11-09 06:55:00.668 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-09 06:55:00.669  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-11-09 06:55:00.671  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-09 06:55:00.672  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-09 06:55:00.672 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-09 06:55:00.673 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-09 06:55:00.674 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-09 06:55:00.678 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-09 06:55:00.679 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-09 06:55:00.679 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-09 06:55:00.680 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-09 06:55:00.849  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-09 06:55:00.849  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-09 06:55:00.850 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-09 06:55:00.850 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-09 06:55:00.851  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-09 06:55:00.852  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-09 06:55:00.852 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-09 06:55:00.852 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-09 06:55:00.853 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-09 06:55:00.853 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-09 06:55:00.854 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-09 06:55:00.854 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-09 06:55:00.855 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-09 06:55:00.855 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-09 06:55:00.855 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-09 06:55:00.856 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-09 06:55:00.859 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 278444683596101070385710211879529582979721449986
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Nov 09 04:56:21 UTC 2022
           Final Date: Mon Nov 08 04:56:20 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [53:37:7c:d5:ac:48:9c:8b:bc:ee:3a:2b:ad:f2:e8:2a:d5:b3:09:24],[56:66:d1:a4]
        modulus: c5bc25caa3ed6768a5574e0e716f27f59e385a3766644b134b010131076c4953459c30cace689af71e65e5d84c90e41ad8dbac8dc0397aa92fd670880bbd45450d4a5cfee0822e7a5b6053a0590bcd6c612234616eecb39ca0add9391086bed66417694cc3d408682b9f8909967670e82280166898a49b5749563b4da77a2168fcbd76a6e2c4d6a2e0b2f6bd461bb95458e10188bbbf5eb1229445bee61674921a055b4aa99419535dff8ace6dd106bb25b542f192cba8af9159e06b6562b5734fe0297440ed2aab32443f8aab3a51283e77d48fc9ec6fdabd92bdf94088a1a4f70948f4620a768fe0a70947f5f103b40c5a30baf9304ee7f83a34372bc20427b95192e998af458e673358ad4e9ea7621fc444ce82276fe67d0a5a01de1cf2e4b458648acf40d6cf062b2af14763bce3a1d6ac598eff5e46d67fb4fa851c3b5cd2606c50b6222f8c903fe4a6a7ca2db1a044dc5269d9a05795e7650b22ee2baa52019cbd1688366d1013100a6f5ad1d8f8a8a2b5fc822e3246cf22b124c8a5f9
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3a54dda77af54437b88a6e6c59285ea65fa4d6f6
                       014bfd63fb1c51b09c9a203f1b562b88c3186a3a
                       674e1d090a602c04c2d4a97e7354129cdfbb80fb
                       6d8a1d35ee713696b20221d8c0f31a1aeea2a90c
                       8b6f267cc5e7d8d5c44966c49a439eeecd8dd9e3
                       920173bd9c9245148224878a65c8d1168c6d34db
                       2ea72af3629754789c7cd9b6ea2ad730346c1be5
                       4f427cf3407dc1eee8515dd1299e2e7246c7deff
                       1aa2fc1400dded16bace489dc871162732530c24
                       fbb4853ccabc61b1d197ac548b59f8b5e526026a
                       626d3217cc0e73f6a1ac2de6369a9ae4c8e4fdbe
                       dc1ca7f87cdf960d3a09fa8cb565e4d386efbcdb
                       a94f90b453c1a108a5672869d3b6958c897afcb1
                       08eda90d00f615f8bb0d104be8b5c829dd6f299c
                       4533917848bf25314ef249ca788371b937785d5d
                       5e8149e83017d45658362f6bb969d8819d8967ad
                       b5b0d2db277a0362504f78618bd08cd0cad47d82
                       f773139be5d4b0076d8b3ecae11e7727c758085b
                       f5f58c5193a291dfdbd52025958adf81f78e2d4e
                       58db3094
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [75:5e:c3:1c:4d:f7:b1:d2:fc:f7:c9:90:a3:56:0f:aa:2e:b5:b3:aa],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-11-09 06:55:06.159  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-09 06:55:06.160 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-09 06:55:06.161 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-11-09 06:55:06.161 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-09 06:55:06.162  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-11-09 06:55:06.162  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-09 06:55:06.163  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-09 06:55:06.163 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-09 06:55:06.163 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-09 06:55:06.164 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-09 06:55:06.167 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-09 06:55:06.168 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-09 06:55:06.168 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-09 06:55:06.168 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-09 06:55:06.266  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-09 06:55:06.266  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-09 06:55:06.267 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-09 06:55:06.267 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-09 06:55:06.268  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-09 06:55:06.269  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-09 06:55:06.269 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-09 06:55:06.270 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-09 06:55:06.270 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-09 06:55:06.270 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-09 06:55:06.271 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-09 06:55:06.271 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-09 06:55:06.272 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-09 06:55:06.272 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-09 06:55:06.272 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-09 06:55:06.273 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-09 06:55:06.276 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 278444683596101070385710211879529582979721449986
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Nov 09 04:56:21 UTC 2022
           Final Date: Mon Nov 08 04:56:20 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [53:37:7c:d5:ac:48:9c:8b:bc:ee:3a:2b:ad:f2:e8:2a:d5:b3:09:24],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3a54dda77af54437b88a6e6c59285ea65fa4d6f6
                       014bfd63fb1c51b09c9a203f1b562b88c3186a3a
                       674e1d090a602c04c2d4a97e7354129cdfbb80fb
                       6d8a1d35ee713696b20221d8c0f31a1aeea2a90c
                       8b6f267cc5e7d8d5c44966c49a439eeecd8dd9e3
                       920173bd9c9245148224878a65c8d1168c6d34db
                       2ea72af3629754789c7cd9b6ea2ad730346c1be5
                       4f427cf3407dc1eee8515dd1299e2e7246c7deff
                       1aa2fc1400dded16bace489dc871162732530c24
                       fbb4853ccabc61b1d197ac548b59f8b5e526026a
                       626d3217cc0e73f6a1ac2de6369a9ae4c8e4fdbe
                       dc1ca7f87cdf960d3a09fa8cb565e4d386efbcdb
                       a94f90b453c1a108a5672869d3b6958c897afcb1
                       08eda90d00f615f8bb0d104be8b5c829dd6f299c
                       4533917848bf25314ef249ca788371b937785d5d
                       5e8149e83017d45658362f6bb969d8819d8967ad
                       b5b0d2db277a0362504f78618bd08cd0cad47d82
                       f773139be5d4b0076d8b3ecae11e7727c758085b
                       f5f58c5193a291dfdbd52025958adf81f78e2d4e
                       58db3094
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [0c:28:21:e4:d0:ea:cb:ae:65:93:94:9a:f0:2f:45:1e:34:86:e3:0e],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

]