Results

By type

          2022-11-16 04:59:22,788 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-11-16 04:59:24,186 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-11-16 04:59:24.970  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Nov 16, 2022 4:59:26 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Nov 16, 2022 4:59:26 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Nov 16, 2022 4:59:26 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Nov 16, 2022 4:59:26 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-11-16 04:59:27.476 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-11-16 04:59:27.765  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-11-16 04:59:27.935  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-11-16 04:59:28.648 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-11-16 04:59:28.650 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
2022-11-16 04:59:28.652 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-11-16 04:59:28.656 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-11-16 04:59:28.698 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2022-11-16 04:59:28.701 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
	{GET [/docs]}: redirectToUi(HttpServletRequest)
2022-11-16 04:59:28.841 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-11-16 04:59:29.459 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Nov 16, 2022 4:59:30 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-11-16 04:59:30.475  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 8.565 seconds (JVM running for 10.359)
Nov 16, 2022 4:59:50 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-11-16 05:00:06.375  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-16 05:00:06.382 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-16 05:00:06.419 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-11-16 05:00:06.422 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-16 05:00:06.438  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-11-16 05:00:06.440  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-16 05:00:06.440  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-16 05:00:06.442 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-16 05:00:06.442 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-16 05:00:06.446 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-16 05:00:06.454 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-16 05:00:06.457 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-16 05:00:06.510 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-16 05:00:06.516 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-16 05:00:06.516 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-16 05:00:06.519 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-16 05:00:07.104  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-16 05:00:07.107  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-16 05:00:07.107 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-16 05:00:07.109 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-16 05:00:07.119  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-16 05:00:07.120  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-16 05:00:07.121 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-16 05:00:07.121 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-16 05:00:07.122 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-16 05:00:07.139 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-16 05:00:07.140 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-16 05:00:07.140 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-16 05:00:07.146 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-16 05:00:07.147 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-16 05:00:07.147 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-16 05:00:07.149 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-16 05:00:07.184 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 413390169427257302193341568586567007919836384503
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Nov 16 04:57:15 UTC 2022
           Final Date: Mon Nov 15 04:57:14 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [27:68:37:71:f2:e8:30:d5:4d:08:3b:b5:e9:43:47:cb:7e:70:1e:3d],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8b1b1e5854c1c42a18025786f98ef5a2230188e7
                       5a4118de683cdd1831feaa906438d59db32efc33
                       a8cccabcc7c4f901469940cd5095e50c3880ee52
                       c8f15d5d8a2d1fbf7f91ca8b262a4fa51b8d0e31
                       6ec828cc0bb9d11f01b673dbde093fcca02ce7f8
                       ef38935095b81f67cbaea9aa213985e709250721
                       f5970e832ae8fa5e5a5e4413cf25b94fa9b5234b
                       24d8293d9bb701658fb98efdbae838f3a46daeeb
                       8e211852aa2f4b9f6f71e24ff4cd77f272b23a1a
                       81c0edb42b753f4c8f855557c88db34539b4239b
                       c7f6ff2c1fc2afead1105194c9357f8611956113
                       0186d7d6f3b7772abd900a21d286234e6cc2696f
                       18b10b1148aea1299c4b36982cc971fbc3a673a1
                       8c8c96ff28ef2e3d08fc9ad924d7bd0a27e0cb57
                       e3da12774d65b39ed68f916d9e3dc32080242f66
                       7cf7f5776009829df6b785e977e94acddbda01de
                       99853c818493e4172769d9c9bbb9029033a4bc3c
                       7a861a8197e498aee0c78b74d2aacd889e36238d
                       8a6cf3599f8bd7f6dfae32b4b0c20a7bb69a8b9a
                       e0b85818
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [36:a6:5b:9b:9e:76:98:ed:e1:c8:5e:11:f4:ff:94:27:b4:bd:2c:ed],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-11-16 06:25:53.429  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-16 06:25:53.433 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-16 06:25:53.436 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-16 06:25:53.437 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-16 06:25:53.438  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-16 06:25:53.438  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-16 06:25:53.439  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-16 06:25:53.439 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-16 06:25:53.440 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-16 06:25:53.441 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-16 06:25:53.445 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-16 06:25:53.447 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-16 06:25:53.447 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-16 06:25:53.447 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-16 06:25:53.642  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-16 06:25:53.643  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-16 06:25:53.643 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-16 06:25:53.643 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-16 06:25:53.648  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-16 06:25:53.649  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-16 06:25:53.650 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-16 06:25:53.651 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-16 06:25:53.651 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-16 06:25:53.653 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-16 06:25:53.654 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-16 06:25:53.655 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-16 06:25:53.657 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-16 06:25:53.657 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-16 06:25:53.659 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-16 06:25:53.660 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-16 06:25:53.669 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 413390169427257302193341568586567007919836384503
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Nov 16 04:57:15 UTC 2022
           Final Date: Mon Nov 15 04:57:14 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [27:68:37:71:f2:e8:30:d5:4d:08:3b:b5:e9:43:47:cb:7e:70:1e:3d],[56:66:d1:a4]
        modulus: bf1484fc0bd901fedac40cae26736a12c70f7e08b73d9840663f8eb8128e9d43dcb5f487b51536070621f42d80f563b05536fbdb5345ef69199c68640a08ebad6426c6a89486da990a56b1b6e1e9f8e47a97202141addc741f85ee651c3b50c3788bef24a22297c09a5040548acc9c0469dc2c85cbb0f60f0c2c61e3000ff7132e2366c6933f743aba22df10471bb46dc8e6bc4569f10b6f4e93fe2bcc61f854e0b48329a6150b2640f00406da0f1ef7bf4bbd15ccf15add4cf8eb10811a53d4e229e91633151be40ae15a5eb5df80da691b02fdec3b26e66b9db7b60aa4c9bc8b04d5786910d5c1238ed5b14a434411b3ea93599e25c86b538a9eb6b0ac284792f253fd60d69e3b1e64cf9005d48208dcf96f438aaeda57bdc2a609358513d5beb47a614060270aa87f854d67e26fe5d8a61adc74d57c4a5e435003fdd33e440c083e3eb995a4bca30345ac8175005213f5a286bc148cfd971f626fd4af18e245cbee7088e17ae2a8d037cb93ab5de9cce18b72dfefb7fd9676fc767c85f885
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8b1b1e5854c1c42a18025786f98ef5a2230188e7
                       5a4118de683cdd1831feaa906438d59db32efc33
                       a8cccabcc7c4f901469940cd5095e50c3880ee52
                       c8f15d5d8a2d1fbf7f91ca8b262a4fa51b8d0e31
                       6ec828cc0bb9d11f01b673dbde093fcca02ce7f8
                       ef38935095b81f67cbaea9aa213985e709250721
                       f5970e832ae8fa5e5a5e4413cf25b94fa9b5234b
                       24d8293d9bb701658fb98efdbae838f3a46daeeb
                       8e211852aa2f4b9f6f71e24ff4cd77f272b23a1a
                       81c0edb42b753f4c8f855557c88db34539b4239b
                       c7f6ff2c1fc2afead1105194c9357f8611956113
                       0186d7d6f3b7772abd900a21d286234e6cc2696f
                       18b10b1148aea1299c4b36982cc971fbc3a673a1
                       8c8c96ff28ef2e3d08fc9ad924d7bd0a27e0cb57
                       e3da12774d65b39ed68f916d9e3dc32080242f66
                       7cf7f5776009829df6b785e977e94acddbda01de
                       99853c818493e4172769d9c9bbb9029033a4bc3c
                       7a861a8197e498aee0c78b74d2aacd889e36238d
                       8a6cf3599f8bd7f6dfae32b4b0c20a7bb69a8b9a
                       e0b85818
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [4b:ef:7b:bf:56:26:a9:46:a3:8c:e5:61:fa:6a:39:6f:a4:c4:90:14],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-11-16 06:27:24.889  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-16 06:27:24.891 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-16 06:27:24.894 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-11-16 06:27:24.895 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-16 06:27:24.896  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-11-16 06:27:24.904  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-16 06:27:24.905  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-16 06:27:24.906 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-16 06:27:24.906 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-16 06:27:24.908 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-16 06:27:24.919 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-16 06:27:24.920 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-16 06:27:24.921 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-16 06:27:24.921 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-16 06:27:25.080  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-16 06:27:25.081  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-16 06:27:25.082 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-16 06:27:25.082 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-16 06:27:25.084  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-16 06:27:25.085  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-16 06:27:25.086 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-16 06:27:25.086 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-16 06:27:25.087 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-16 06:27:25.088 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-16 06:27:25.088 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-16 06:27:25.089 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-16 06:27:25.089 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-16 06:27:25.090 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-16 06:27:25.090 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-16 06:27:25.091 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-16 06:27:25.095 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 413390169427257302193341568586567007919836384503
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Nov 16 04:57:15 UTC 2022
           Final Date: Mon Nov 15 04:57:14 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [27:68:37:71:f2:e8:30:d5:4d:08:3b:b5:e9:43:47:cb:7e:70:1e:3d],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8b1b1e5854c1c42a18025786f98ef5a2230188e7
                       5a4118de683cdd1831feaa906438d59db32efc33
                       a8cccabcc7c4f901469940cd5095e50c3880ee52
                       c8f15d5d8a2d1fbf7f91ca8b262a4fa51b8d0e31
                       6ec828cc0bb9d11f01b673dbde093fcca02ce7f8
                       ef38935095b81f67cbaea9aa213985e709250721
                       f5970e832ae8fa5e5a5e4413cf25b94fa9b5234b
                       24d8293d9bb701658fb98efdbae838f3a46daeeb
                       8e211852aa2f4b9f6f71e24ff4cd77f272b23a1a
                       81c0edb42b753f4c8f855557c88db34539b4239b
                       c7f6ff2c1fc2afead1105194c9357f8611956113
                       0186d7d6f3b7772abd900a21d286234e6cc2696f
                       18b10b1148aea1299c4b36982cc971fbc3a673a1
                       8c8c96ff28ef2e3d08fc9ad924d7bd0a27e0cb57
                       e3da12774d65b39ed68f916d9e3dc32080242f66
                       7cf7f5776009829df6b785e977e94acddbda01de
                       99853c818493e4172769d9c9bbb9029033a4bc3c
                       7a861a8197e498aee0c78b74d2aacd889e36238d
                       8a6cf3599f8bd7f6dfae32b4b0c20a7bb69a8b9a
                       e0b85818
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [01:7b:09:ba:a5:5a:59:41:1d:6c:63:1d:4d:9f:0e:45:d7:85:75:5c],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-11-16 06:29:17.938  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-16 06:29:17.942 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-16 06:29:17.944 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-11-16 06:29:17.945 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-16 06:29:17.946  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-11-16 06:29:17.947  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-16 06:29:17.947  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-16 06:29:17.948 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-16 06:29:17.948 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-16 06:29:17.948 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-16 06:29:17.953 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-16 06:29:17.954 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-16 06:29:17.955 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-16 06:29:17.955 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-16 06:29:18.104  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-16 06:29:18.109  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-16 06:29:18.109 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-16 06:29:18.109 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-16 06:29:18.118  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-16 06:29:18.119  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-16 06:29:18.119 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-16 06:29:18.120 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-16 06:29:18.123 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-16 06:29:18.124 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-16 06:29:18.125 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-16 06:29:18.125 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-16 06:29:18.126 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-16 06:29:18.126 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-16 06:29:18.127 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-16 06:29:18.128 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-16 06:29:18.133 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 413390169427257302193341568586567007919836384503
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Nov 16 04:57:15 UTC 2022
           Final Date: Mon Nov 15 04:57:14 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [27:68:37:71:f2:e8:30:d5:4d:08:3b:b5:e9:43:47:cb:7e:70:1e:3d],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8b1b1e5854c1c42a18025786f98ef5a2230188e7
                       5a4118de683cdd1831feaa906438d59db32efc33
                       a8cccabcc7c4f901469940cd5095e50c3880ee52
                       c8f15d5d8a2d1fbf7f91ca8b262a4fa51b8d0e31
                       6ec828cc0bb9d11f01b673dbde093fcca02ce7f8
                       ef38935095b81f67cbaea9aa213985e709250721
                       f5970e832ae8fa5e5a5e4413cf25b94fa9b5234b
                       24d8293d9bb701658fb98efdbae838f3a46daeeb
                       8e211852aa2f4b9f6f71e24ff4cd77f272b23a1a
                       81c0edb42b753f4c8f855557c88db34539b4239b
                       c7f6ff2c1fc2afead1105194c9357f8611956113
                       0186d7d6f3b7772abd900a21d286234e6cc2696f
                       18b10b1148aea1299c4b36982cc971fbc3a673a1
                       8c8c96ff28ef2e3d08fc9ad924d7bd0a27e0cb57
                       e3da12774d65b39ed68f916d9e3dc32080242f66
                       7cf7f5776009829df6b785e977e94acddbda01de
                       99853c818493e4172769d9c9bbb9029033a4bc3c
                       7a861a8197e498aee0c78b74d2aacd889e36238d
                       8a6cf3599f8bd7f6dfae32b4b0c20a7bb69a8b9a
                       e0b85818
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [39:d4:52:07:c1:1f:a2:00:5c:75:6a:e7:d2:15:3b:07:2a:5d:b9:a9],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-11-16 06:31:48.245  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-16 06:31:48.246 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-16 06:31:48.248 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-16 06:31:48.248 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-16 06:31:48.249  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-16 06:31:48.249  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-16 06:31:48.250  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-16 06:31:48.251 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-16 06:31:48.251 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-16 06:31:48.251 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-16 06:31:48.255 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-16 06:31:48.256 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-16 06:31:48.256 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-16 06:31:48.257 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-16 06:31:48.450  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-16 06:31:48.450  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-16 06:31:48.451 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-16 06:31:48.451 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-16 06:31:48.452  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-16 06:31:48.453  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-16 06:31:48.453 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-16 06:31:48.454 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-16 06:31:48.454 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-16 06:31:48.455 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-16 06:31:48.455 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-16 06:31:48.455 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-16 06:31:48.456 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-16 06:31:48.456 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-16 06:31:48.457 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-16 06:31:48.457 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-16 06:31:48.467 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 413390169427257302193341568586567007919836384503
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Nov 16 04:57:15 UTC 2022
           Final Date: Mon Nov 15 04:57:14 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [27:68:37:71:f2:e8:30:d5:4d:08:3b:b5:e9:43:47:cb:7e:70:1e:3d],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8b1b1e5854c1c42a18025786f98ef5a2230188e7
                       5a4118de683cdd1831feaa906438d59db32efc33
                       a8cccabcc7c4f901469940cd5095e50c3880ee52
                       c8f15d5d8a2d1fbf7f91ca8b262a4fa51b8d0e31
                       6ec828cc0bb9d11f01b673dbde093fcca02ce7f8
                       ef38935095b81f67cbaea9aa213985e709250721
                       f5970e832ae8fa5e5a5e4413cf25b94fa9b5234b
                       24d8293d9bb701658fb98efdbae838f3a46daeeb
                       8e211852aa2f4b9f6f71e24ff4cd77f272b23a1a
                       81c0edb42b753f4c8f855557c88db34539b4239b
                       c7f6ff2c1fc2afead1105194c9357f8611956113
                       0186d7d6f3b7772abd900a21d286234e6cc2696f
                       18b10b1148aea1299c4b36982cc971fbc3a673a1
                       8c8c96ff28ef2e3d08fc9ad924d7bd0a27e0cb57
                       e3da12774d65b39ed68f916d9e3dc32080242f66
                       7cf7f5776009829df6b785e977e94acddbda01de
                       99853c818493e4172769d9c9bbb9029033a4bc3c
                       7a861a8197e498aee0c78b74d2aacd889e36238d
                       8a6cf3599f8bd7f6dfae32b4b0c20a7bb69a8b9a
                       e0b85818
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [29:33:6d:f7:16:d4:8e:ec:27:88:8a:e1:b1:46:fc:06:01:5c:28:26],[56:66:d1:a4]
        modulus: 9df4b7fbf7d3c975d61af44709ef1c7040c9fc7343e318f6aa208dda1591a185def5c369ed46a08268c0bf42f632161bffc54d7122f6e33a67da6c35e706d214e94db236425734edb864a8902cc2ed9821e4428fa76bca4e99575096df9675b48bbb8ddb91e6eb4ad804332ea0ee97b6b31d8243c87904555b8e9a369b33e681b1d8b344a70b47450209dffbaead5fcd838cc905ed1313afa4c88d696e2f73dab59d15d830ac5dd13ba2dc32ce0b25be76c645be347793cfd0580ca3334064b79088601fecc196c25bc983aad65f6712cbe7d2bee3d439d1b02950f05fba35d06412d74eab3b94efde80bdaa109109e414bcb9fd051fe4f5843592922f29fb27
public exponent: 10001

] 
2022-11-16 06:38:23.315  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-16 06:38:23.320 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-16 06:38:23.322 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-16 06:38:23.324 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-16 06:38:23.324  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-16 06:38:23.325  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-16 06:38:23.325  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-16 06:38:23.326 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-16 06:38:23.326 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-16 06:38:23.327 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-16 06:38:23.334 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-16 06:38:23.335 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-16 06:38:23.335 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-16 06:38:23.336 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-16 06:38:23.506  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-16 06:38:23.507  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-16 06:38:23.508 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-16 06:38:23.508 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-16 06:38:23.510  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-16 06:38:23.510  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-16 06:38:23.510 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-16 06:38:23.511 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-16 06:38:23.511 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-16 06:38:23.512 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-16 06:38:23.514 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-16 06:38:23.514 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-16 06:38:23.515 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-16 06:38:23.515 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-16 06:38:23.515 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-16 06:38:23.516 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-16 06:38:23.520 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 413390169427257302193341568586567007919836384503
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Nov 16 04:57:15 UTC 2022
           Final Date: Mon Nov 15 04:57:14 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [27:68:37:71:f2:e8:30:d5:4d:08:3b:b5:e9:43:47:cb:7e:70:1e:3d],[56:66:d1:a4]
        modulus: bf1484fc0bd901fedac40cae26736a12c70f7e08b73d9840663f8eb8128e9d43dcb5f487b51536070621f42d80f563b05536fbdb5345ef69199c68640a08ebad6426c6a89486da990a56b1b6e1e9f8e47a97202141addc741f85ee651c3b50c3788bef24a22297c09a5040548acc9c0469dc2c85cbb0f60f0c2c61e3000ff7132e2366c6933f743aba22df10471bb46dc8e6bc4569f10b6f4e93fe2bcc61f854e0b48329a6150b2640f00406da0f1ef7bf4bbd15ccf15add4cf8eb10811a53d4e229e91633151be40ae15a5eb5df80da691b02fdec3b26e66b9db7b60aa4c9bc8b04d5786910d5c1238ed5b14a434411b3ea93599e25c86b538a9eb6b0ac284792f253fd60d69e3b1e64cf9005d48208dcf96f438aaeda57bdc2a609358513d5beb47a614060270aa87f854d67e26fe5d8a61adc74d57c4a5e435003fdd33e440c083e3eb995a4bca30345ac8175005213f5a286bc148cfd971f626fd4af18e245cbee7088e17ae2a8d037cb93ab5de9cce18b72dfefb7fd9676fc767c85f885
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8b1b1e5854c1c42a18025786f98ef5a2230188e7
                       5a4118de683cdd1831feaa906438d59db32efc33
                       a8cccabcc7c4f901469940cd5095e50c3880ee52
                       c8f15d5d8a2d1fbf7f91ca8b262a4fa51b8d0e31
                       6ec828cc0bb9d11f01b673dbde093fcca02ce7f8
                       ef38935095b81f67cbaea9aa213985e709250721
                       f5970e832ae8fa5e5a5e4413cf25b94fa9b5234b
                       24d8293d9bb701658fb98efdbae838f3a46daeeb
                       8e211852aa2f4b9f6f71e24ff4cd77f272b23a1a
                       81c0edb42b753f4c8f855557c88db34539b4239b
                       c7f6ff2c1fc2afead1105194c9357f8611956113
                       0186d7d6f3b7772abd900a21d286234e6cc2696f
                       18b10b1148aea1299c4b36982cc971fbc3a673a1
                       8c8c96ff28ef2e3d08fc9ad924d7bd0a27e0cb57
                       e3da12774d65b39ed68f916d9e3dc32080242f66
                       7cf7f5776009829df6b785e977e94acddbda01de
                       99853c818493e4172769d9c9bbb9029033a4bc3c
                       7a861a8197e498aee0c78b74d2aacd889e36238d
                       8a6cf3599f8bd7f6dfae32b4b0c20a7bb69a8b9a
                       e0b85818
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [d9:85:d6:38:e8:97:60:63:ee:3f:27:32:ba:04:32:4b:20:3d:93:44],[56:66:d1:a4]
        modulus: bc6bf1ec1691d045b6b50050396a0d9e0e1457f471b5456c56ee86dc2d68f98c1efee1f848e4805c2ea97bea76477c238827688269db7e7f86f1472c7d34a8b65ea84e5ac94512dc56565e78d1f101db5c900a095fde2de793ff1116d94e49bff9f2c55d76258ed7f59fe2a38d271cff43a33f98027adad03e60984113ac2b40ffcd6a67e1b436f3885ed6dd45f70519290ac0b8d666c81e6165fde78778088a32617615b0c0de37a63a757fa390f3c6a821f41403955efde73c17b9aa0390b142bdc71603301ace715a9bbc2b93d4208fb8fbbeb6f60319c56e2fb019061ddb0fa59bd0ef1e63e825deddde3941de461a7ed679882bc1db4fa7381fb0d0aaaf
public exponent: 10001

] 
2022-11-16 06:43:48.357  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-16 06:43:48.363 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-16 06:43:48.367 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-16 06:43:48.369 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-16 06:43:48.369  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-16 06:43:48.371  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-16 06:43:48.372  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-16 06:43:48.373 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-16 06:43:48.374 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-16 06:43:48.374 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-16 06:43:48.380 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-16 06:43:48.382 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-16 06:43:48.382 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-16 06:43:48.383 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-16 06:43:48.548  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-16 06:43:48.549  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-16 06:43:48.549 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-16 06:43:48.549 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-16 06:43:48.551  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-16 06:43:48.551  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-16 06:43:48.552 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-16 06:43:48.552 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-16 06:43:48.553 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-16 06:43:48.554 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-16 06:43:48.554 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-16 06:43:48.555 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-16 06:43:48.555 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-16 06:43:48.556 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-16 06:43:48.556 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-16 06:43:48.557 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-16 06:43:48.561 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 413390169427257302193341568586567007919836384503
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Nov 16 04:57:15 UTC 2022
           Final Date: Mon Nov 15 04:57:14 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [27:68:37:71:f2:e8:30:d5:4d:08:3b:b5:e9:43:47:cb:7e:70:1e:3d],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8b1b1e5854c1c42a18025786f98ef5a2230188e7
                       5a4118de683cdd1831feaa906438d59db32efc33
                       a8cccabcc7c4f901469940cd5095e50c3880ee52
                       c8f15d5d8a2d1fbf7f91ca8b262a4fa51b8d0e31
                       6ec828cc0bb9d11f01b673dbde093fcca02ce7f8
                       ef38935095b81f67cbaea9aa213985e709250721
                       f5970e832ae8fa5e5a5e4413cf25b94fa9b5234b
                       24d8293d9bb701658fb98efdbae838f3a46daeeb
                       8e211852aa2f4b9f6f71e24ff4cd77f272b23a1a
                       81c0edb42b753f4c8f855557c88db34539b4239b
                       c7f6ff2c1fc2afead1105194c9357f8611956113
                       0186d7d6f3b7772abd900a21d286234e6cc2696f
                       18b10b1148aea1299c4b36982cc971fbc3a673a1
                       8c8c96ff28ef2e3d08fc9ad924d7bd0a27e0cb57
                       e3da12774d65b39ed68f916d9e3dc32080242f66
                       7cf7f5776009829df6b785e977e94acddbda01de
                       99853c818493e4172769d9c9bbb9029033a4bc3c
                       7a861a8197e498aee0c78b74d2aacd889e36238d
                       8a6cf3599f8bd7f6dfae32b4b0c20a7bb69a8b9a
                       e0b85818
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [4e:11:0b:7c:fe:d1:f2:a4:53:92:97:a4:42:aa:44:de:82:0e:13:a2],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-11-16 06:50:20.294  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-16 06:50:20.299 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-16 06:50:20.302 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-11-16 06:50:20.303 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-16 06:50:20.304  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-11-16 06:50:20.305  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-16 06:50:20.305  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-16 06:50:20.306 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-16 06:50:20.306 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-16 06:50:20.307 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-16 06:50:20.312 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-16 06:50:20.313 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-16 06:50:20.313 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-16 06:50:20.314 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-16 06:50:20.474  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-16 06:50:20.475  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-16 06:50:20.476 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-16 06:50:20.476 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-16 06:50:20.478  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-16 06:50:20.479  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-16 06:50:20.479 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-16 06:50:20.480 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-16 06:50:20.480 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-16 06:50:20.482 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-16 06:50:20.482 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-16 06:50:20.482 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-16 06:50:20.483 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-16 06:50:20.484 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-16 06:50:20.484 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-16 06:50:20.485 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-16 06:50:20.489 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 413390169427257302193341568586567007919836384503
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Nov 16 04:57:15 UTC 2022
           Final Date: Mon Nov 15 04:57:14 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [27:68:37:71:f2:e8:30:d5:4d:08:3b:b5:e9:43:47:cb:7e:70:1e:3d],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8b1b1e5854c1c42a18025786f98ef5a2230188e7
                       5a4118de683cdd1831feaa906438d59db32efc33
                       a8cccabcc7c4f901469940cd5095e50c3880ee52
                       c8f15d5d8a2d1fbf7f91ca8b262a4fa51b8d0e31
                       6ec828cc0bb9d11f01b673dbde093fcca02ce7f8
                       ef38935095b81f67cbaea9aa213985e709250721
                       f5970e832ae8fa5e5a5e4413cf25b94fa9b5234b
                       24d8293d9bb701658fb98efdbae838f3a46daeeb
                       8e211852aa2f4b9f6f71e24ff4cd77f272b23a1a
                       81c0edb42b753f4c8f855557c88db34539b4239b
                       c7f6ff2c1fc2afead1105194c9357f8611956113
                       0186d7d6f3b7772abd900a21d286234e6cc2696f
                       18b10b1148aea1299c4b36982cc971fbc3a673a1
                       8c8c96ff28ef2e3d08fc9ad924d7bd0a27e0cb57
                       e3da12774d65b39ed68f916d9e3dc32080242f66
                       7cf7f5776009829df6b785e977e94acddbda01de
                       99853c818493e4172769d9c9bbb9029033a4bc3c
                       7a861a8197e498aee0c78b74d2aacd889e36238d
                       8a6cf3599f8bd7f6dfae32b4b0c20a7bb69a8b9a
                       e0b85818
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [7e:0a:2f:cd:ff:b0:4b:23:ea:04:d6:f9:cc:f0:e0:38:5b:a0:38:d9],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-11-16 06:55:49.833  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-16 06:55:49.835 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-16 06:55:49.837 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-11-16 06:55:49.838 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-16 06:55:49.838  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-11-16 06:55:49.839  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-16 06:55:49.839  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-16 06:55:49.840 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-16 06:55:49.840 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-16 06:55:49.841 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-16 06:55:49.845 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-16 06:55:49.845 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-16 06:55:49.846 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-16 06:55:49.846 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-16 06:55:49.968  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-16 06:55:49.968  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-16 06:55:49.969 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-16 06:55:49.969 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-16 06:55:49.971  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-16 06:55:49.971  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-16 06:55:49.972 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-16 06:55:49.972 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-16 06:55:49.972 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-16 06:55:49.973 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-16 06:55:49.973 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-16 06:55:49.974 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-16 06:55:49.975 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-16 06:55:49.975 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-16 06:55:49.975 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-16 06:55:49.976 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-16 06:55:49.979 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 413390169427257302193341568586567007919836384503
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Nov 16 04:57:15 UTC 2022
           Final Date: Mon Nov 15 04:57:14 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [27:68:37:71:f2:e8:30:d5:4d:08:3b:b5:e9:43:47:cb:7e:70:1e:3d],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8b1b1e5854c1c42a18025786f98ef5a2230188e7
                       5a4118de683cdd1831feaa906438d59db32efc33
                       a8cccabcc7c4f901469940cd5095e50c3880ee52
                       c8f15d5d8a2d1fbf7f91ca8b262a4fa51b8d0e31
                       6ec828cc0bb9d11f01b673dbde093fcca02ce7f8
                       ef38935095b81f67cbaea9aa213985e709250721
                       f5970e832ae8fa5e5a5e4413cf25b94fa9b5234b
                       24d8293d9bb701658fb98efdbae838f3a46daeeb
                       8e211852aa2f4b9f6f71e24ff4cd77f272b23a1a
                       81c0edb42b753f4c8f855557c88db34539b4239b
                       c7f6ff2c1fc2afead1105194c9357f8611956113
                       0186d7d6f3b7772abd900a21d286234e6cc2696f
                       18b10b1148aea1299c4b36982cc971fbc3a673a1
                       8c8c96ff28ef2e3d08fc9ad924d7bd0a27e0cb57
                       e3da12774d65b39ed68f916d9e3dc32080242f66
                       7cf7f5776009829df6b785e977e94acddbda01de
                       99853c818493e4172769d9c9bbb9029033a4bc3c
                       7a861a8197e498aee0c78b74d2aacd889e36238d
                       8a6cf3599f8bd7f6dfae32b4b0c20a7bb69a8b9a
                       e0b85818
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [e5:72:1e:b8:08:62:12:e4:a6:e0:ae:23:a6:6a:d6:3b:9a:a8:28:50],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-11-16 06:56:10.902  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-16 06:56:10.905 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-16 06:56:10.908 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-11-16 06:56:10.909 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-16 06:56:10.909  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-11-16 06:56:10.910  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-16 06:56:10.910  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-16 06:56:10.911 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-16 06:56:10.912 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-16 06:56:10.912 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-16 06:56:10.916 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-16 06:56:10.917 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-16 06:56:10.917 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-16 06:56:10.918 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-16 06:56:11.036  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-16 06:56:11.037  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-16 06:56:11.037 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-16 06:56:11.037 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-16 06:56:11.039  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-16 06:56:11.039  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-16 06:56:11.039 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-16 06:56:11.040 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-16 06:56:11.040 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-16 06:56:11.041 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-16 06:56:11.041 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-16 06:56:11.041 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-16 06:56:11.042 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-16 06:56:11.042 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-16 06:56:11.043 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-16 06:56:11.043 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-16 06:56:11.047 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 413390169427257302193341568586567007919836384503
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Nov 16 04:57:15 UTC 2022
           Final Date: Mon Nov 15 04:57:14 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [27:68:37:71:f2:e8:30:d5:4d:08:3b:b5:e9:43:47:cb:7e:70:1e:3d],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8b1b1e5854c1c42a18025786f98ef5a2230188e7
                       5a4118de683cdd1831feaa906438d59db32efc33
                       a8cccabcc7c4f901469940cd5095e50c3880ee52
                       c8f15d5d8a2d1fbf7f91ca8b262a4fa51b8d0e31
                       6ec828cc0bb9d11f01b673dbde093fcca02ce7f8
                       ef38935095b81f67cbaea9aa213985e709250721
                       f5970e832ae8fa5e5a5e4413cf25b94fa9b5234b
                       24d8293d9bb701658fb98efdbae838f3a46daeeb
                       8e211852aa2f4b9f6f71e24ff4cd77f272b23a1a
                       81c0edb42b753f4c8f855557c88db34539b4239b
                       c7f6ff2c1fc2afead1105194c9357f8611956113
                       0186d7d6f3b7772abd900a21d286234e6cc2696f
                       18b10b1148aea1299c4b36982cc971fbc3a673a1
                       8c8c96ff28ef2e3d08fc9ad924d7bd0a27e0cb57
                       e3da12774d65b39ed68f916d9e3dc32080242f66
                       7cf7f5776009829df6b785e977e94acddbda01de
                       99853c818493e4172769d9c9bbb9029033a4bc3c
                       7a861a8197e498aee0c78b74d2aacd889e36238d
                       8a6cf3599f8bd7f6dfae32b4b0c20a7bb69a8b9a
                       e0b85818
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [2b:c5:d6:ae:b5:f7:32:75:9f:4c:66:98:a5:46:5c:14:4f:7f:a6:fd],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-11-16 07:20:12.112  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-16 07:20:12.115 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-16 07:20:12.118 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-11-16 07:20:12.119 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-16 07:20:12.120  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-11-16 07:20:12.120  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-16 07:20:12.121  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-16 07:20:12.121 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-16 07:20:12.122 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-16 07:20:12.122 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-16 07:20:12.127 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-16 07:20:12.129 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-16 07:20:12.129 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-16 07:20:12.130 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-16 07:20:12.285  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-16 07:20:12.285  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-16 07:20:12.286 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-16 07:20:12.286 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-16 07:20:12.292  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-16 07:20:12.293  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-16 07:20:12.293 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-16 07:20:12.293 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-16 07:20:12.294 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-16 07:20:12.295 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-16 07:20:12.295 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-16 07:20:12.296 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-16 07:20:12.302 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-16 07:20:12.302 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-16 07:20:12.303 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-16 07:20:12.303 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-16 07:20:12.307 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 413390169427257302193341568586567007919836384503
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Nov 16 04:57:15 UTC 2022
           Final Date: Mon Nov 15 04:57:14 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [27:68:37:71:f2:e8:30:d5:4d:08:3b:b5:e9:43:47:cb:7e:70:1e:3d],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8b1b1e5854c1c42a18025786f98ef5a2230188e7
                       5a4118de683cdd1831feaa906438d59db32efc33
                       a8cccabcc7c4f901469940cd5095e50c3880ee52
                       c8f15d5d8a2d1fbf7f91ca8b262a4fa51b8d0e31
                       6ec828cc0bb9d11f01b673dbde093fcca02ce7f8
                       ef38935095b81f67cbaea9aa213985e709250721
                       f5970e832ae8fa5e5a5e4413cf25b94fa9b5234b
                       24d8293d9bb701658fb98efdbae838f3a46daeeb
                       8e211852aa2f4b9f6f71e24ff4cd77f272b23a1a
                       81c0edb42b753f4c8f855557c88db34539b4239b
                       c7f6ff2c1fc2afead1105194c9357f8611956113
                       0186d7d6f3b7772abd900a21d286234e6cc2696f
                       18b10b1148aea1299c4b36982cc971fbc3a673a1
                       8c8c96ff28ef2e3d08fc9ad924d7bd0a27e0cb57
                       e3da12774d65b39ed68f916d9e3dc32080242f66
                       7cf7f5776009829df6b785e977e94acddbda01de
                       99853c818493e4172769d9c9bbb9029033a4bc3c
                       7a861a8197e498aee0c78b74d2aacd889e36238d
                       8a6cf3599f8bd7f6dfae32b4b0c20a7bb69a8b9a
                       e0b85818
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [34:0b:b5:76:b8:3e:ac:c6:87:16:92:f2:ce:9a:d3:09:11:61:d5:ba],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-11-16 07:20:24.878  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-16 07:20:24.879 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-16 07:20:24.880 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-11-16 07:20:24.881 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-16 07:20:24.881  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-11-16 07:20:24.882  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-16 07:20:24.882  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-16 07:20:24.882 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-16 07:20:24.882 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-16 07:20:24.883 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-16 07:20:24.886 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-16 07:20:24.887 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-16 07:20:24.887 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-16 07:20:24.887 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-16 07:20:24.984  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-16 07:20:24.985  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-16 07:20:24.986 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-16 07:20:24.986 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-16 07:20:24.988  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-16 07:20:24.988  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-16 07:20:24.989 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-16 07:20:24.989 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-16 07:20:24.989 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-16 07:20:24.989 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-16 07:20:24.990 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-16 07:20:24.990 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-16 07:20:24.990 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-16 07:20:24.991 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-16 07:20:24.991 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-16 07:20:24.991 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-16 07:20:24.994 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 413390169427257302193341568586567007919836384503
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Nov 16 04:57:15 UTC 2022
           Final Date: Mon Nov 15 04:57:14 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [27:68:37:71:f2:e8:30:d5:4d:08:3b:b5:e9:43:47:cb:7e:70:1e:3d],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8b1b1e5854c1c42a18025786f98ef5a2230188e7
                       5a4118de683cdd1831feaa906438d59db32efc33
                       a8cccabcc7c4f901469940cd5095e50c3880ee52
                       c8f15d5d8a2d1fbf7f91ca8b262a4fa51b8d0e31
                       6ec828cc0bb9d11f01b673dbde093fcca02ce7f8
                       ef38935095b81f67cbaea9aa213985e709250721
                       f5970e832ae8fa5e5a5e4413cf25b94fa9b5234b
                       24d8293d9bb701658fb98efdbae838f3a46daeeb
                       8e211852aa2f4b9f6f71e24ff4cd77f272b23a1a
                       81c0edb42b753f4c8f855557c88db34539b4239b
                       c7f6ff2c1fc2afead1105194c9357f8611956113
                       0186d7d6f3b7772abd900a21d286234e6cc2696f
                       18b10b1148aea1299c4b36982cc971fbc3a673a1
                       8c8c96ff28ef2e3d08fc9ad924d7bd0a27e0cb57
                       e3da12774d65b39ed68f916d9e3dc32080242f66
                       7cf7f5776009829df6b785e977e94acddbda01de
                       99853c818493e4172769d9c9bbb9029033a4bc3c
                       7a861a8197e498aee0c78b74d2aacd889e36238d
                       8a6cf3599f8bd7f6dfae32b4b0c20a7bb69a8b9a
                       e0b85818
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [17:da:61:13:19:ff:19:99:53:20:3e:43:82:dd:8d:c5:f6:10:be:f8],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

]