Results

By type

          2022-11-21 09:39:52,205 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-11-21 09:39:53,204 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-11-21 09:39:53.909  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Nov 21, 2022 9:39:55 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Nov 21, 2022 9:39:55 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Nov 21, 2022 9:39:55 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Nov 21, 2022 9:39:55 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-11-21 09:39:56.549 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-11-21 09:39:56.834  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-11-21 09:39:57.014  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-11-21 09:39:57.820 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-11-21 09:39:57.823 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
2022-11-21 09:39:57.825 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-11-21 09:39:57.828 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-11-21 09:39:57.868 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
2022-11-21 09:39:57.872 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
	{GET [/docs]}: redirectToUi(HttpServletRequest)
2022-11-21 09:39:57.992 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-11-21 09:39:58.740 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Nov 21, 2022 9:39:59 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-11-21 09:39:59.869  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 8.566 seconds (JVM running for 10.586)
Nov 21, 2022 9:40:26 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-11-21 09:40:46.384  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-21 09:40:46.391 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-21 09:40:46.429 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-11-21 09:40:46.432 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-21 09:40:46.452  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-11-21 09:40:46.454  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-21 09:40:46.455  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-21 09:40:46.457 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-21 09:40:46.458 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-21 09:40:46.462 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-21 09:40:46.471 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-21 09:40:46.475 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-21 09:40:46.530 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-21 09:40:46.536 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-21 09:40:46.536 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-21 09:40:46.540 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-21 09:40:47.100  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-21 09:40:47.103  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-21 09:40:47.103 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-21 09:40:47.105 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-21 09:40:47.113  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-21 09:40:47.114  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-21 09:40:47.115 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-21 09:40:47.115 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-21 09:40:47.116 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-21 09:40:47.132 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-21 09:40:47.133 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-21 09:40:47.133 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-21 09:40:47.139 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-21 09:40:47.140 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-21 09:40:47.140 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-21 09:40:47.141 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-21 09:40:47.172 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 465358164499761521447923423423577604773945153927
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Nov 21 09:37:07 UTC 2022
           Final Date: Sat Nov 20 09:37:06 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [43:f5:0f:52:8d:d2:ad:be:5d:b2:46:a9:04:e9:d8:90:61:57:5f:54],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 60b5adbc728de21955345a60a800ef6558d440a8
                       0a38562bbe9bd1dd7c26bfbd7138bd4271636ff5
                       0968807614d4ec3e674e1fdf0b1f16d8053bc9bf
                       aab775769802dff1022f230549ffdc85fa41fe8f
                       f3cb49b72cdd4bde218dc6a7ac842ef65fd4f726
                       a37c6c1075484b1c51d093f9662c873d8789cd44
                       fa1dd09c9369c24114bbae7c7e3d201ff0e039ba
                       db5ec0a6d8a592d05a9adb87b0af55e5ec7f7fbc
                       3ab0e522509d6c4bd0e69c7ea607266bea772543
                       4d80c7129b035103a9a3b0eb295a3e2ee8e367f7
                       ddbe3640a7f9586d2ce46c39fef6a7fcc6afaf00
                       523ca9c8f1cf0efa216008b3e49110f487e844bd
                       cdda07c958fbe5a6d814596d4c7779c467fd1712
                       6a7fc588cbde2fd51e695b1f40e0918406a995c9
                       dcdb5e063d1f0f309eac985fffbef1ce797ad5ed
                       8906ce605684ea721aa98fb302b6fc00e387bd26
                       e98ab1cbf89d3dd2e0214d5bcc366dcc42bd32f4
                       6485d26b81835b2e3097029b64dc0c4fd06c616f
                       da6eeebf36b6757458791410bee104f85f6d2d2a
                       8fd8b4d0
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [4b:58:a6:37:0a:6b:1b:fe:74:32:a6:20:11:82:12:a5:21:ea:64:bc],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-11-21 10:59:25.571  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-21 10:59:25.575 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-21 10:59:25.581 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-21 10:59:25.582 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-21 10:59:25.583  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-21 10:59:25.584  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-21 10:59:25.585  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-21 10:59:25.585 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-21 10:59:25.586 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-21 10:59:25.586 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-21 10:59:25.592 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-21 10:59:25.593 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-21 10:59:25.594 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-21 10:59:25.594 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-21 10:59:25.805  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-21 10:59:25.806  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-21 10:59:25.806 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-21 10:59:25.807 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-21 10:59:25.811  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-21 10:59:25.811  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-21 10:59:25.812 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-21 10:59:25.812 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-21 10:59:25.812 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-21 10:59:25.813 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-21 10:59:25.814 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-21 10:59:25.814 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-21 10:59:25.815 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-21 10:59:25.816 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-21 10:59:25.816 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-21 10:59:25.818 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-21 10:59:25.824 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 465358164499761521447923423423577604773945153927
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Nov 21 09:37:07 UTC 2022
           Final Date: Sat Nov 20 09:37:06 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [43:f5:0f:52:8d:d2:ad:be:5d:b2:46:a9:04:e9:d8:90:61:57:5f:54],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 60b5adbc728de21955345a60a800ef6558d440a8
                       0a38562bbe9bd1dd7c26bfbd7138bd4271636ff5
                       0968807614d4ec3e674e1fdf0b1f16d8053bc9bf
                       aab775769802dff1022f230549ffdc85fa41fe8f
                       f3cb49b72cdd4bde218dc6a7ac842ef65fd4f726
                       a37c6c1075484b1c51d093f9662c873d8789cd44
                       fa1dd09c9369c24114bbae7c7e3d201ff0e039ba
                       db5ec0a6d8a592d05a9adb87b0af55e5ec7f7fbc
                       3ab0e522509d6c4bd0e69c7ea607266bea772543
                       4d80c7129b035103a9a3b0eb295a3e2ee8e367f7
                       ddbe3640a7f9586d2ce46c39fef6a7fcc6afaf00
                       523ca9c8f1cf0efa216008b3e49110f487e844bd
                       cdda07c958fbe5a6d814596d4c7779c467fd1712
                       6a7fc588cbde2fd51e695b1f40e0918406a995c9
                       dcdb5e063d1f0f309eac985fffbef1ce797ad5ed
                       8906ce605684ea721aa98fb302b6fc00e387bd26
                       e98ab1cbf89d3dd2e0214d5bcc366dcc42bd32f4
                       6485d26b81835b2e3097029b64dc0c4fd06c616f
                       da6eeebf36b6757458791410bee104f85f6d2d2a
                       8fd8b4d0
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [30:b7:43:18:c4:02:88:14:a8:91:0d:be:5d:00:ab:01:ac:4a:6b:09],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-11-21 11:01:11.308  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-21 11:01:11.312 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-21 11:01:11.315 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-11-21 11:01:11.315 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-21 11:01:11.316  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-11-21 11:01:11.316  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-21 11:01:11.317  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-21 11:01:11.317 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-21 11:01:11.318 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-21 11:01:11.319 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-21 11:01:11.326 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-21 11:01:11.326 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-21 11:01:11.326 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-21 11:01:11.327 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-21 11:01:11.553  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-21 11:01:11.554  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-21 11:01:11.555 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-21 11:01:11.556 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-21 11:01:11.558  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-21 11:01:11.559  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-21 11:01:11.559 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-21 11:01:11.561 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-21 11:01:11.561 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-21 11:01:11.563 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-21 11:01:11.563 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-21 11:01:11.564 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-21 11:01:11.565 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-21 11:01:11.566 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-21 11:01:11.566 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-21 11:01:11.567 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-21 11:01:11.571 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 465358164499761521447923423423577604773945153927
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Nov 21 09:37:07 UTC 2022
           Final Date: Sat Nov 20 09:37:06 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [43:f5:0f:52:8d:d2:ad:be:5d:b2:46:a9:04:e9:d8:90:61:57:5f:54],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 60b5adbc728de21955345a60a800ef6558d440a8
                       0a38562bbe9bd1dd7c26bfbd7138bd4271636ff5
                       0968807614d4ec3e674e1fdf0b1f16d8053bc9bf
                       aab775769802dff1022f230549ffdc85fa41fe8f
                       f3cb49b72cdd4bde218dc6a7ac842ef65fd4f726
                       a37c6c1075484b1c51d093f9662c873d8789cd44
                       fa1dd09c9369c24114bbae7c7e3d201ff0e039ba
                       db5ec0a6d8a592d05a9adb87b0af55e5ec7f7fbc
                       3ab0e522509d6c4bd0e69c7ea607266bea772543
                       4d80c7129b035103a9a3b0eb295a3e2ee8e367f7
                       ddbe3640a7f9586d2ce46c39fef6a7fcc6afaf00
                       523ca9c8f1cf0efa216008b3e49110f487e844bd
                       cdda07c958fbe5a6d814596d4c7779c467fd1712
                       6a7fc588cbde2fd51e695b1f40e0918406a995c9
                       dcdb5e063d1f0f309eac985fffbef1ce797ad5ed
                       8906ce605684ea721aa98fb302b6fc00e387bd26
                       e98ab1cbf89d3dd2e0214d5bcc366dcc42bd32f4
                       6485d26b81835b2e3097029b64dc0c4fd06c616f
                       da6eeebf36b6757458791410bee104f85f6d2d2a
                       8fd8b4d0
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [82:fb:84:ef:a0:ee:5b:9f:1f:85:b8:5c:9e:1a:03:ac:5c:29:0e:d8],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-11-21 11:02:55.362  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-21 11:02:55.363 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-21 11:02:55.365 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-11-21 11:02:55.365 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-21 11:02:55.366  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-11-21 11:02:55.367  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-21 11:02:55.367  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-21 11:02:55.367 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-21 11:02:55.368 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-21 11:02:55.368 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-21 11:02:55.372 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-21 11:02:55.373 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-21 11:02:55.373 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-21 11:02:55.374 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-21 11:02:55.554  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-21 11:02:55.555  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-21 11:02:55.555 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-21 11:02:55.555 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-21 11:02:55.557  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-21 11:02:55.558  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-21 11:02:55.558 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-21 11:02:55.559 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-21 11:02:55.559 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-21 11:02:55.560 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-21 11:02:55.560 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-21 11:02:55.563 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-21 11:02:55.564 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-21 11:02:55.564 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-21 11:02:55.565 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-21 11:02:55.565 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-21 11:02:55.572 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 465358164499761521447923423423577604773945153927
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Nov 21 09:37:07 UTC 2022
           Final Date: Sat Nov 20 09:37:06 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [43:f5:0f:52:8d:d2:ad:be:5d:b2:46:a9:04:e9:d8:90:61:57:5f:54],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 60b5adbc728de21955345a60a800ef6558d440a8
                       0a38562bbe9bd1dd7c26bfbd7138bd4271636ff5
                       0968807614d4ec3e674e1fdf0b1f16d8053bc9bf
                       aab775769802dff1022f230549ffdc85fa41fe8f
                       f3cb49b72cdd4bde218dc6a7ac842ef65fd4f726
                       a37c6c1075484b1c51d093f9662c873d8789cd44
                       fa1dd09c9369c24114bbae7c7e3d201ff0e039ba
                       db5ec0a6d8a592d05a9adb87b0af55e5ec7f7fbc
                       3ab0e522509d6c4bd0e69c7ea607266bea772543
                       4d80c7129b035103a9a3b0eb295a3e2ee8e367f7
                       ddbe3640a7f9586d2ce46c39fef6a7fcc6afaf00
                       523ca9c8f1cf0efa216008b3e49110f487e844bd
                       cdda07c958fbe5a6d814596d4c7779c467fd1712
                       6a7fc588cbde2fd51e695b1f40e0918406a995c9
                       dcdb5e063d1f0f309eac985fffbef1ce797ad5ed
                       8906ce605684ea721aa98fb302b6fc00e387bd26
                       e98ab1cbf89d3dd2e0214d5bcc366dcc42bd32f4
                       6485d26b81835b2e3097029b64dc0c4fd06c616f
                       da6eeebf36b6757458791410bee104f85f6d2d2a
                       8fd8b4d0
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [82:7a:df:81:6a:a0:e8:a2:29:5f:87:d2:92:1e:9c:c0:fa:7e:25:c5],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-11-21 11:05:06.359  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-21 11:05:06.362 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-21 11:05:06.364 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-21 11:05:06.365 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-21 11:05:06.366  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-21 11:05:06.366  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-21 11:05:06.367  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-21 11:05:06.368 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-21 11:05:06.368 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-21 11:05:06.369 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-21 11:05:06.373 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-21 11:05:06.374 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-21 11:05:06.374 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-21 11:05:06.374 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-21 11:05:06.520  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-21 11:05:06.521  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-21 11:05:06.521 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-21 11:05:06.522 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-21 11:05:06.524  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-21 11:05:06.526  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-21 11:05:06.528 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-21 11:05:06.528 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-21 11:05:06.528 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-21 11:05:06.531 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-21 11:05:06.531 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-21 11:05:06.532 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-21 11:05:06.532 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-21 11:05:06.533 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-21 11:05:06.533 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-21 11:05:06.534 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-21 11:05:06.537 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 465358164499761521447923423423577604773945153927
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Nov 21 09:37:07 UTC 2022
           Final Date: Sat Nov 20 09:37:06 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [43:f5:0f:52:8d:d2:ad:be:5d:b2:46:a9:04:e9:d8:90:61:57:5f:54],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 60b5adbc728de21955345a60a800ef6558d440a8
                       0a38562bbe9bd1dd7c26bfbd7138bd4271636ff5
                       0968807614d4ec3e674e1fdf0b1f16d8053bc9bf
                       aab775769802dff1022f230549ffdc85fa41fe8f
                       f3cb49b72cdd4bde218dc6a7ac842ef65fd4f726
                       a37c6c1075484b1c51d093f9662c873d8789cd44
                       fa1dd09c9369c24114bbae7c7e3d201ff0e039ba
                       db5ec0a6d8a592d05a9adb87b0af55e5ec7f7fbc
                       3ab0e522509d6c4bd0e69c7ea607266bea772543
                       4d80c7129b035103a9a3b0eb295a3e2ee8e367f7
                       ddbe3640a7f9586d2ce46c39fef6a7fcc6afaf00
                       523ca9c8f1cf0efa216008b3e49110f487e844bd
                       cdda07c958fbe5a6d814596d4c7779c467fd1712
                       6a7fc588cbde2fd51e695b1f40e0918406a995c9
                       dcdb5e063d1f0f309eac985fffbef1ce797ad5ed
                       8906ce605684ea721aa98fb302b6fc00e387bd26
                       e98ab1cbf89d3dd2e0214d5bcc366dcc42bd32f4
                       6485d26b81835b2e3097029b64dc0c4fd06c616f
                       da6eeebf36b6757458791410bee104f85f6d2d2a
                       8fd8b4d0
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [f9:a2:06:8d:c1:e9:2e:0b:80:c6:3a:5c:44:12:2b:52:e2:3d:3a:64],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-11-21 11:11:46.434  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-21 11:11:46.437 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-21 11:11:46.439 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-21 11:11:46.439 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-21 11:11:46.440  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-21 11:11:46.441  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-21 11:11:46.441  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-21 11:11:46.441 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-21 11:11:46.442 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-21 11:11:46.442 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-21 11:11:46.447 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-21 11:11:46.448 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-21 11:11:46.449 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-21 11:11:46.450 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-21 11:11:46.614  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-21 11:11:46.614  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-21 11:11:46.615 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-21 11:11:46.616 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-21 11:11:46.617  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-21 11:11:46.617  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-21 11:11:46.618 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-21 11:11:46.618 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-21 11:11:46.618 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-21 11:11:46.619 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-21 11:11:46.619 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-21 11:11:46.620 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-21 11:11:46.620 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-21 11:11:46.621 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-21 11:11:46.621 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-21 11:11:46.622 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-21 11:11:46.625 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 465358164499761521447923423423577604773945153927
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Nov 21 09:37:07 UTC 2022
           Final Date: Sat Nov 20 09:37:06 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [43:f5:0f:52:8d:d2:ad:be:5d:b2:46:a9:04:e9:d8:90:61:57:5f:54],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 60b5adbc728de21955345a60a800ef6558d440a8
                       0a38562bbe9bd1dd7c26bfbd7138bd4271636ff5
                       0968807614d4ec3e674e1fdf0b1f16d8053bc9bf
                       aab775769802dff1022f230549ffdc85fa41fe8f
                       f3cb49b72cdd4bde218dc6a7ac842ef65fd4f726
                       a37c6c1075484b1c51d093f9662c873d8789cd44
                       fa1dd09c9369c24114bbae7c7e3d201ff0e039ba
                       db5ec0a6d8a592d05a9adb87b0af55e5ec7f7fbc
                       3ab0e522509d6c4bd0e69c7ea607266bea772543
                       4d80c7129b035103a9a3b0eb295a3e2ee8e367f7
                       ddbe3640a7f9586d2ce46c39fef6a7fcc6afaf00
                       523ca9c8f1cf0efa216008b3e49110f487e844bd
                       cdda07c958fbe5a6d814596d4c7779c467fd1712
                       6a7fc588cbde2fd51e695b1f40e0918406a995c9
                       dcdb5e063d1f0f309eac985fffbef1ce797ad5ed
                       8906ce605684ea721aa98fb302b6fc00e387bd26
                       e98ab1cbf89d3dd2e0214d5bcc366dcc42bd32f4
                       6485d26b81835b2e3097029b64dc0c4fd06c616f
                       da6eeebf36b6757458791410bee104f85f6d2d2a
                       8fd8b4d0
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ba:da:da:17:e1:a1:c2:d0:f0:3e:7b:a6:e0:3a:4a:a1:e9:07:eb:c4],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-11-21 11:16:40.165  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-21 11:16:40.167 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-21 11:16:40.170 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-21 11:16:40.170 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-21 11:16:40.171  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-21 11:16:40.171  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-21 11:16:40.172  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-21 11:16:40.172 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-21 11:16:40.173 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-21 11:16:40.173 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-21 11:16:40.178 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-21 11:16:40.179 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-21 11:16:40.179 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-21 11:16:40.179 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-21 11:16:40.316  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-21 11:16:40.317  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-21 11:16:40.317 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-21 11:16:40.318 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-21 11:16:40.319  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-21 11:16:40.320  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-21 11:16:40.320 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-21 11:16:40.320 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-21 11:16:40.321 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-21 11:16:40.321 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-21 11:16:40.322 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-21 11:16:40.322 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-21 11:16:40.323 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-21 11:16:40.323 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-21 11:16:40.323 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-21 11:16:40.324 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-21 11:16:40.328 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 465358164499761521447923423423577604773945153927
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Nov 21 09:37:07 UTC 2022
           Final Date: Sat Nov 20 09:37:06 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [43:f5:0f:52:8d:d2:ad:be:5d:b2:46:a9:04:e9:d8:90:61:57:5f:54],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 60b5adbc728de21955345a60a800ef6558d440a8
                       0a38562bbe9bd1dd7c26bfbd7138bd4271636ff5
                       0968807614d4ec3e674e1fdf0b1f16d8053bc9bf
                       aab775769802dff1022f230549ffdc85fa41fe8f
                       f3cb49b72cdd4bde218dc6a7ac842ef65fd4f726
                       a37c6c1075484b1c51d093f9662c873d8789cd44
                       fa1dd09c9369c24114bbae7c7e3d201ff0e039ba
                       db5ec0a6d8a592d05a9adb87b0af55e5ec7f7fbc
                       3ab0e522509d6c4bd0e69c7ea607266bea772543
                       4d80c7129b035103a9a3b0eb295a3e2ee8e367f7
                       ddbe3640a7f9586d2ce46c39fef6a7fcc6afaf00
                       523ca9c8f1cf0efa216008b3e49110f487e844bd
                       cdda07c958fbe5a6d814596d4c7779c467fd1712
                       6a7fc588cbde2fd51e695b1f40e0918406a995c9
                       dcdb5e063d1f0f309eac985fffbef1ce797ad5ed
                       8906ce605684ea721aa98fb302b6fc00e387bd26
                       e98ab1cbf89d3dd2e0214d5bcc366dcc42bd32f4
                       6485d26b81835b2e3097029b64dc0c4fd06c616f
                       da6eeebf36b6757458791410bee104f85f6d2d2a
                       8fd8b4d0
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [76:65:88:60:30:e4:fe:78:60:dd:b9:97:5e:3c:17:91:86:94:5c:fb],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-11-21 11:23:18.413  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-21 11:23:18.416 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-21 11:23:18.419 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-11-21 11:23:18.421 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-21 11:23:18.421  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-11-21 11:23:18.422  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-21 11:23:18.422  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-21 11:23:18.422 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-21 11:23:18.423 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-21 11:23:18.424 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-21 11:23:18.428 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-21 11:23:18.429 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-21 11:23:18.430 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-21 11:23:18.430 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-21 11:23:18.586  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-21 11:23:18.587  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-21 11:23:18.588 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-21 11:23:18.588 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-21 11:23:18.591  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-21 11:23:18.592  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-21 11:23:18.592 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-21 11:23:18.593 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-21 11:23:18.593 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-21 11:23:18.594 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-21 11:23:18.595 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-21 11:23:18.595 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-21 11:23:18.599 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-21 11:23:18.600 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-21 11:23:18.600 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-21 11:23:18.601 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-21 11:23:18.606 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 465358164499761521447923423423577604773945153927
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Nov 21 09:37:07 UTC 2022
           Final Date: Sat Nov 20 09:37:06 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [43:f5:0f:52:8d:d2:ad:be:5d:b2:46:a9:04:e9:d8:90:61:57:5f:54],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 60b5adbc728de21955345a60a800ef6558d440a8
                       0a38562bbe9bd1dd7c26bfbd7138bd4271636ff5
                       0968807614d4ec3e674e1fdf0b1f16d8053bc9bf
                       aab775769802dff1022f230549ffdc85fa41fe8f
                       f3cb49b72cdd4bde218dc6a7ac842ef65fd4f726
                       a37c6c1075484b1c51d093f9662c873d8789cd44
                       fa1dd09c9369c24114bbae7c7e3d201ff0e039ba
                       db5ec0a6d8a592d05a9adb87b0af55e5ec7f7fbc
                       3ab0e522509d6c4bd0e69c7ea607266bea772543
                       4d80c7129b035103a9a3b0eb295a3e2ee8e367f7
                       ddbe3640a7f9586d2ce46c39fef6a7fcc6afaf00
                       523ca9c8f1cf0efa216008b3e49110f487e844bd
                       cdda07c958fbe5a6d814596d4c7779c467fd1712
                       6a7fc588cbde2fd51e695b1f40e0918406a995c9
                       dcdb5e063d1f0f309eac985fffbef1ce797ad5ed
                       8906ce605684ea721aa98fb302b6fc00e387bd26
                       e98ab1cbf89d3dd2e0214d5bcc366dcc42bd32f4
                       6485d26b81835b2e3097029b64dc0c4fd06c616f
                       da6eeebf36b6757458791410bee104f85f6d2d2a
                       8fd8b4d0
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [66:c6:65:09:47:01:3c:09:a0:46:e0:5f:65:c1:bf:81:e9:62:5c:ed],[56:66:d1:a4]
        modulus: d18cb1afd0b6182557cc9b52e83b517ec30707045c9b93038c824296d9be93949e2c76c3de7a7ad34ea4522ba569614a130ee007d25c02cf956ec62a4a15625f4fc61699ca8fddb6e686fdb9fb224e250bc4a84f4db90701ef006cb95b268023d563bbad86e43ae857c1f32e41334426f3236d7b6d41aa488c24e1505459473fe7930bd90561713dc7523fa3880ae7f5389647b5d94e07d836d2b196b27042ad31aff88c3cf0444e6f34a3386e13e85d2c70d40232feb8074c29429870222ac32123361e598ce09cd75281ac679a16952379d20dcce10795c64680f09c1d6754ed4d5bfd61087e8a5f96518bd67e8bd8d0a568f999549452f8c0d1a263aad17f
public exponent: 10001

] 
2022-11-21 11:28:47.112  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-21 11:28:47.114 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-21 11:28:47.117 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-11-21 11:28:47.117 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-21 11:28:47.118  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-11-21 11:28:47.118  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-21 11:28:47.119  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-21 11:28:47.119 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-21 11:28:47.120 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-21 11:28:47.120 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-21 11:28:47.125 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-21 11:28:47.126 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-21 11:28:47.126 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-21 11:28:47.126 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-21 11:28:47.292  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-21 11:28:47.293  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-21 11:28:47.293 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-21 11:28:47.293 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-21 11:28:47.295  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-21 11:28:47.295  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-21 11:28:47.295 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-21 11:28:47.296 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-21 11:28:47.296 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-21 11:28:47.297 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-21 11:28:47.297 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-21 11:28:47.298 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-21 11:28:47.299 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-21 11:28:47.299 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-21 11:28:47.299 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-21 11:28:47.300 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-21 11:28:47.303 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 465358164499761521447923423423577604773945153927
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Nov 21 09:37:07 UTC 2022
           Final Date: Sat Nov 20 09:37:06 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [43:f5:0f:52:8d:d2:ad:be:5d:b2:46:a9:04:e9:d8:90:61:57:5f:54],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 60b5adbc728de21955345a60a800ef6558d440a8
                       0a38562bbe9bd1dd7c26bfbd7138bd4271636ff5
                       0968807614d4ec3e674e1fdf0b1f16d8053bc9bf
                       aab775769802dff1022f230549ffdc85fa41fe8f
                       f3cb49b72cdd4bde218dc6a7ac842ef65fd4f726
                       a37c6c1075484b1c51d093f9662c873d8789cd44
                       fa1dd09c9369c24114bbae7c7e3d201ff0e039ba
                       db5ec0a6d8a592d05a9adb87b0af55e5ec7f7fbc
                       3ab0e522509d6c4bd0e69c7ea607266bea772543
                       4d80c7129b035103a9a3b0eb295a3e2ee8e367f7
                       ddbe3640a7f9586d2ce46c39fef6a7fcc6afaf00
                       523ca9c8f1cf0efa216008b3e49110f487e844bd
                       cdda07c958fbe5a6d814596d4c7779c467fd1712
                       6a7fc588cbde2fd51e695b1f40e0918406a995c9
                       dcdb5e063d1f0f309eac985fffbef1ce797ad5ed
                       8906ce605684ea721aa98fb302b6fc00e387bd26
                       e98ab1cbf89d3dd2e0214d5bcc366dcc42bd32f4
                       6485d26b81835b2e3097029b64dc0c4fd06c616f
                       da6eeebf36b6757458791410bee104f85f6d2d2a
                       8fd8b4d0
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [6c:54:8d:69:63:0f:be:96:60:c7:aa:db:03:21:94:78:49:e4:d7:12],[56:66:d1:a4]
        modulus: c4c6920db938102d164dbaf1928c851f8f895e9d30351e4d29bb4f295955cbd47340d08d83364463e20638fbabb747cd5c753c55ce2a6470ba3e2460e64a037660a54a65c56b52c94bb95ab3e13fd07385307b8dda8d68408885f7b2e86273c79be485873e5dd92d30104319ddbf9b96563f759e0dfbef936ec6136692d144937f2f6af88e8b856c1d380e02d25ab85bf45325ae4e72bc3955f1455629da6691453dba2d96bf96aacd90a760606a7a143f30e23b597f7bed04dfdf3524726815f7a5b4e2dbb11cdf667e7296926d559a35b5d69270a6083f25bd2f8c8f0b998ee418ca9a0756a01f9df35b2adc832a6b6a41fe04855284434acc83109735bd77
public exponent: 10001

] 
2022-11-21 11:29:04.181  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-21 11:29:04.183 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-21 11:29:04.185 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-11-21 11:29:04.186 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-21 11:29:04.186  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-11-21 11:29:04.187  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-21 11:29:04.187  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-21 11:29:04.187 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-21 11:29:04.188 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-21 11:29:04.188 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-21 11:29:04.192 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-21 11:29:04.192 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-21 11:29:04.192 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-21 11:29:04.193 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-21 11:29:04.291  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-21 11:29:04.292  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-21 11:29:04.292 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-21 11:29:04.293 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-21 11:29:04.294  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-21 11:29:04.294  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-21 11:29:04.295 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-21 11:29:04.295 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-21 11:29:04.295 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-21 11:29:04.296 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-21 11:29:04.296 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-21 11:29:04.296 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-21 11:29:04.297 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-21 11:29:04.297 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-21 11:29:04.298 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-21 11:29:04.299 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-21 11:29:04.302 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 465358164499761521447923423423577604773945153927
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Nov 21 09:37:07 UTC 2022
           Final Date: Sat Nov 20 09:37:06 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [43:f5:0f:52:8d:d2:ad:be:5d:b2:46:a9:04:e9:d8:90:61:57:5f:54],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 60b5adbc728de21955345a60a800ef6558d440a8
                       0a38562bbe9bd1dd7c26bfbd7138bd4271636ff5
                       0968807614d4ec3e674e1fdf0b1f16d8053bc9bf
                       aab775769802dff1022f230549ffdc85fa41fe8f
                       f3cb49b72cdd4bde218dc6a7ac842ef65fd4f726
                       a37c6c1075484b1c51d093f9662c873d8789cd44
                       fa1dd09c9369c24114bbae7c7e3d201ff0e039ba
                       db5ec0a6d8a592d05a9adb87b0af55e5ec7f7fbc
                       3ab0e522509d6c4bd0e69c7ea607266bea772543
                       4d80c7129b035103a9a3b0eb295a3e2ee8e367f7
                       ddbe3640a7f9586d2ce46c39fef6a7fcc6afaf00
                       523ca9c8f1cf0efa216008b3e49110f487e844bd
                       cdda07c958fbe5a6d814596d4c7779c467fd1712
                       6a7fc588cbde2fd51e695b1f40e0918406a995c9
                       dcdb5e063d1f0f309eac985fffbef1ce797ad5ed
                       8906ce605684ea721aa98fb302b6fc00e387bd26
                       e98ab1cbf89d3dd2e0214d5bcc366dcc42bd32f4
                       6485d26b81835b2e3097029b64dc0c4fd06c616f
                       da6eeebf36b6757458791410bee104f85f6d2d2a
                       8fd8b4d0
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [27:d8:6b:4e:d1:f4:aa:03:07:e7:0d:ec:de:5a:1b:40:83:20:a0:32],[56:66:d1:a4]
        modulus: c8cf667a07e72ff1156e8b0846d7613da114931bc9f52dca3893d2fbae3f94b75a71618c3cd410cd99844b9aff16b5bc40ac4dcaba062d09c438e5b541606dcf20f24a1ef586aed721e7e5ba6dc8c47ab526944eb776d465d986d5314e5e64c5a4d89d89ee172515d92184e9c507c2ac3d740b3ec7d52f77b38902740cc4c42f8a298b8f32b1bcf493e017d659057d0e81c850249be8785df203c1d2244c2391abcce47fc213489db25b44a1da54748ee4f3ae3eda911decfc9cdf7d2dc3137d3cf50b58c20ac30a3df99560b6b118b1a707e2d15d8f35a474e69ffcf040e4375bec238d36518620dd242ae909fbc513b803c4685cc8ab05bc5d313f1f5df84d
public exponent: 10001

] 
2022-11-21 11:53:25.630  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-21 11:53:25.634 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-21 11:53:25.637 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-11-21 11:53:25.638 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-21 11:53:25.639  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-11-21 11:53:25.640  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-21 11:53:25.640  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-21 11:53:25.641 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-21 11:53:25.641 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-21 11:53:25.642 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-21 11:53:25.647 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-21 11:53:25.648 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-21 11:53:25.649 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-21 11:53:25.649 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-21 11:53:25.835  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-21 11:53:25.836  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-21 11:53:25.836 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-21 11:53:25.836 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-21 11:53:25.838  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-21 11:53:25.838  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-21 11:53:25.839 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-21 11:53:25.839 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-21 11:53:25.839 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-21 11:53:25.840 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-21 11:53:25.841 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-21 11:53:25.841 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-21 11:53:25.842 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-21 11:53:25.842 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-21 11:53:25.842 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-21 11:53:25.843 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-21 11:53:25.847 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 465358164499761521447923423423577604773945153927
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Nov 21 09:37:07 UTC 2022
           Final Date: Sat Nov 20 09:37:06 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [43:f5:0f:52:8d:d2:ad:be:5d:b2:46:a9:04:e9:d8:90:61:57:5f:54],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 60b5adbc728de21955345a60a800ef6558d440a8
                       0a38562bbe9bd1dd7c26bfbd7138bd4271636ff5
                       0968807614d4ec3e674e1fdf0b1f16d8053bc9bf
                       aab775769802dff1022f230549ffdc85fa41fe8f
                       f3cb49b72cdd4bde218dc6a7ac842ef65fd4f726
                       a37c6c1075484b1c51d093f9662c873d8789cd44
                       fa1dd09c9369c24114bbae7c7e3d201ff0e039ba
                       db5ec0a6d8a592d05a9adb87b0af55e5ec7f7fbc
                       3ab0e522509d6c4bd0e69c7ea607266bea772543
                       4d80c7129b035103a9a3b0eb295a3e2ee8e367f7
                       ddbe3640a7f9586d2ce46c39fef6a7fcc6afaf00
                       523ca9c8f1cf0efa216008b3e49110f487e844bd
                       cdda07c958fbe5a6d814596d4c7779c467fd1712
                       6a7fc588cbde2fd51e695b1f40e0918406a995c9
                       dcdb5e063d1f0f309eac985fffbef1ce797ad5ed
                       8906ce605684ea721aa98fb302b6fc00e387bd26
                       e98ab1cbf89d3dd2e0214d5bcc366dcc42bd32f4
                       6485d26b81835b2e3097029b64dc0c4fd06c616f
                       da6eeebf36b6757458791410bee104f85f6d2d2a
                       8fd8b4d0
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [9b:1f:92:18:91:4c:27:b6:bc:a6:2e:fc:e5:d5:38:15:c4:6c:dc:8e],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-11-21 11:53:40.746  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-21 11:53:40.747 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-21 11:53:40.749 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-11-21 11:53:40.749 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-21 11:53:40.750  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-11-21 11:53:40.750  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-21 11:53:40.751  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-21 11:53:40.751 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-21 11:53:40.752 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-21 11:53:40.753 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-21 11:53:40.756 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-21 11:53:40.757 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-21 11:53:40.757 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-21 11:53:40.758 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-21 11:53:40.887  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-21 11:53:40.889  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-21 11:53:40.889 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-21 11:53:40.890 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-21 11:53:40.891  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-21 11:53:40.892  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-21 11:53:40.892 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-21 11:53:40.892 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-21 11:53:40.893 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-21 11:53:40.894 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-21 11:53:40.894 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-21 11:53:40.894 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-21 11:53:40.895 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-21 11:53:40.896 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-21 11:53:40.896 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-21 11:53:40.897 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-21 11:53:40.900 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 465358164499761521447923423423577604773945153927
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Nov 21 09:37:07 UTC 2022
           Final Date: Sat Nov 20 09:37:06 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [43:f5:0f:52:8d:d2:ad:be:5d:b2:46:a9:04:e9:d8:90:61:57:5f:54],[56:66:d1:a4]
        modulus: c3a455713498dd1972f4ec13f55ef9ae2a34ae6998b49c60b4ba45afc69de920216d75de06cf90f3fc14534e04d7bf690900403d23e578591e818b043e8209660814bad6ebc0205eee8d6044dcf66a0e125b7b18adee6c3ab1e8ffc2268da78cbbd528795b1430e6349f95f409bc3688d20afe09c852934bacd2ed78cd216da90f5d79c6acdd5f9c736b10e4b4b50c0c992ede36c71f13629731da068061d9b5d14d7e221b55b4d99934bd3e55b5675b66bfb479efae786018cf863fa981e355e958e30f52b6ea76a113a4be06ee6676a60fe93bcacab9970304d4b6b6eafba95200189e27fd9004290441ef2b8c71d47a6bddbc30ed53b53fd8b88b840dec65af71a86c13150ea1d58cf911105ffb1526f5a39639b988fed52ec388e16fa6b566418b63fa03fd46bd6f3637f3ffce1fa1c3290cddd6a7f5111d0dcfe19a3cea577c6cf2d45051d537bc6de1e3fd01abf3ca416be142c30a01888084b3d0f453c8641cd866b41f51b84e173a95ca178d978ed5f72744968d36a9bd31c1ebd167
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 60b5adbc728de21955345a60a800ef6558d440a8
                       0a38562bbe9bd1dd7c26bfbd7138bd4271636ff5
                       0968807614d4ec3e674e1fdf0b1f16d8053bc9bf
                       aab775769802dff1022f230549ffdc85fa41fe8f
                       f3cb49b72cdd4bde218dc6a7ac842ef65fd4f726
                       a37c6c1075484b1c51d093f9662c873d8789cd44
                       fa1dd09c9369c24114bbae7c7e3d201ff0e039ba
                       db5ec0a6d8a592d05a9adb87b0af55e5ec7f7fbc
                       3ab0e522509d6c4bd0e69c7ea607266bea772543
                       4d80c7129b035103a9a3b0eb295a3e2ee8e367f7
                       ddbe3640a7f9586d2ce46c39fef6a7fcc6afaf00
                       523ca9c8f1cf0efa216008b3e49110f487e844bd
                       cdda07c958fbe5a6d814596d4c7779c467fd1712
                       6a7fc588cbde2fd51e695b1f40e0918406a995c9
                       dcdb5e063d1f0f309eac985fffbef1ce797ad5ed
                       8906ce605684ea721aa98fb302b6fc00e387bd26
                       e98ab1cbf89d3dd2e0214d5bcc366dcc42bd32f4
                       6485d26b81835b2e3097029b64dc0c4fd06c616f
                       da6eeebf36b6757458791410bee104f85f6d2d2a
                       8fd8b4d0
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [6f:96:07:68:b3:d3:71:d7:69:aa:b0:79:f0:69:ad:13:55:25:88:28],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

]