Results

By type

          2022-11-27 05:01:42,117 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-11-27 05:01:43,727 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-11-27 05:01:44.479  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Nov 27, 2022 5:01:46 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Nov 27, 2022 5:01:46 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Nov 27, 2022 5:01:46 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Nov 27, 2022 5:01:46 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-11-27 05:01:47.131 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-11-27 05:01:47.402  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-11-27 05:01:47.596  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-11-27 05:01:48.325 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-11-27 05:01:48.328 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
2022-11-27 05:01:48.330 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-11-27 05:01:48.333 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-11-27 05:01:48.371 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2022-11-27 05:01:48.375 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/docs]}: redirectToUi(HttpServletRequest)
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
2022-11-27 05:01:48.503 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-11-27 05:01:49.150 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Nov 27, 2022 5:01:49 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-11-27 05:01:50.086  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 8.786 seconds (JVM running for 10.426)
Nov 27, 2022 5:02:13 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-11-27 05:02:44.185  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-27 05:02:44.198 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-27 05:02:44.249 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-11-27 05:02:44.253 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-27 05:02:44.277  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-11-27 05:02:44.279  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-27 05:02:44.280  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-27 05:02:44.282 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-27 05:02:44.282 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-27 05:02:44.287 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-27 05:02:44.296 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-27 05:02:44.300 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-27 05:02:44.359 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-27 05:02:44.367 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-27 05:02:44.368 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-27 05:02:44.371 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-27 05:02:44.974  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-27 05:02:44.977  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-27 05:02:44.978 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-27 05:02:44.979 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-27 05:02:44.989  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-27 05:02:44.990  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-27 05:02:44.990 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-27 05:02:44.991 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-27 05:02:44.991 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-27 05:02:45.009 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-27 05:02:45.010 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-27 05:02:45.010 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-27 05:02:45.016 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-27 05:02:45.016 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-27 05:02:45.017 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-27 05:02:45.018 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-27 05:02:45.052 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 251864911341875577134378407116028011186295292088
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Nov 27 04:58:53 UTC 2022
           Final Date: Fri Nov 26 04:58:52 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d3:ee:67:9d:05:3b:dc:dc:06:8a:f1:56:b0:2e:45:fa:2f:0b:b1:c8],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 291b26aac3baefab157b9267c9c764a24589b455
                       f004c678dc5109a0d1b1250204194c533eee774d
                       7c7e52a9b057351c04a694ca28423b2ec3d02a2e
                       bb258e8a270dda3f933277f1fc8416eb39e4bae9
                       87e515821769b512db5f14ec2fad7223a8f21eef
                       41a9f9525f0ce74546dd89cd50c3b72ae9a900af
                       83cbb885c2e4029ae489ebde8ecfc33358cda660
                       fa9570acc8660696c0297dc40b34e83ad6415bb3
                       839e37b79786b85f6cd7b09869008ece469301a2
                       d069e76ef87b25fbe7c7093de0608f547ba12b2a
                       6513f6237beb4b1e1ee4e73edb1bd5326892adf8
                       12108ba58e7d10be1b6c21e7e1f7393304a566b4
                       e44f34d1a94efad5788ef4cef249f406e277b99e
                       f41b269bf1f7e5ddc4bd7e4e440af939f11fcc66
                       3b705aca465355f6945dafb04a38b5637000562b
                       5040bfd9fbb6b5afbd49e4504197e17b0e886539
                       276fc4fbb4c786dcc60c2cfa3357fec5b66180f8
                       44d8379e5cb96cb37104512eb31fbdadc07d329d
                       b76d4a9f4c5249497d41bc7141a140f54cd52349
                       c1526187
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [96:24:66:4a:a6:5d:3b:0b:fa:04:70:01:3d:6f:36:f9:03:4f:ce:e2],[56:66:d1:a4]
        modulus: ca68bfe9fa48b79d164f27609293fb1e51f143d8d3e826dd200aff985f1d7700c999576dc5b3322eebacfaf1870f34ae8ecafdcea3e0ffeb8a45e03d12a1d19c8a7d1e7ccb08fd7b72801e20d0f1f44ecce8ad8ecb606cde262a316c8222b52d1400171d63398ee264382c1d6ae740b7890461f2a56a9a9da2c7a68da5a8eaee397832a943ef07cc6770c97c3e06af89c788e6c3e1cb9552cadc326532994c53dd893ae21401829fcd0ff187fde25219ec3a3aa1f21ea438db4168bcf5dff0ce0f4d1ac32bfad6ce91c455586c1f6e3e196c45a7cfbaf35696911f8c8f2aa2ba269f07b09098d2473d71d0f0d1f0f2cbfdcfc2c516d249ce4bb2c18039fc2981
public exponent: 10001

] 
2022-11-27 06:37:21.167  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-27 06:37:21.173 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-27 06:37:21.182 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-27 06:37:21.184 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-27 06:37:21.185  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-27 06:37:21.186  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-27 06:37:21.187  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-27 06:37:21.188 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-27 06:37:21.189 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-27 06:37:21.189 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-27 06:37:21.199 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-27 06:37:21.201 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-27 06:37:21.202 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-27 06:37:21.203 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-27 06:37:21.421  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-27 06:37:21.422  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-27 06:37:21.422 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-27 06:37:21.423 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-27 06:37:21.425  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-27 06:37:21.426  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-27 06:37:21.427 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-27 06:37:21.428 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-27 06:37:21.428 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-27 06:37:21.429 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-27 06:37:21.430 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-27 06:37:21.431 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-27 06:37:21.432 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-27 06:37:21.432 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-27 06:37:21.432 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-27 06:37:21.433 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-27 06:37:21.438 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 251864911341875577134378407116028011186295292088
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Nov 27 04:58:53 UTC 2022
           Final Date: Fri Nov 26 04:58:52 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d3:ee:67:9d:05:3b:dc:dc:06:8a:f1:56:b0:2e:45:fa:2f:0b:b1:c8],[56:66:d1:a4]
        modulus: a8f8ed0092f4d9993635016bb095a84d0cc1f376b5f47318271061d658d7e2fbc6c80ae215ad8c6ef10cac0ee4e29063b42748eade6ead050abb2c4f1d591150b7e95618167e0860413438ed709782b952b1ac406c95e05be9054226dd6271005475d45b0a295d5131d5d2464bb28137ee4b22cade0adcfe82ee4eb747a57340ff70c26712103cc1d7d00e91f838d93a7fd87323039a85ddd7f9eabd1426dc5c2c5777c758100b0d3456b0b10eb88d13ed399c856b387d0841496dd09c88ea12c5ef7039e5eeb9ba012e83cb6877160814e02d22ad45e600ca8e80351ac7c7ff4f97000ce01f19f33cbf68ad6ab7bfcbcc5ff4b318102223d07bfa1f9e6a965a3be33c64eb0bbbf5fa5e858816f59b0d08f9b3b93ef7ff1826803513b86571a1734dd7cc42014227f49e78fb9843197aed32622c40706e9fef7a52aea6809cf0e6b8d1972e634db9f16532d5baa15507300c71ec5b68690d87e14bff49780b3421500cb57662f66ccb0ce56b89026b15bbb09b28e9e6e5b02d55eba06ca3cd8f
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 291b26aac3baefab157b9267c9c764a24589b455
                       f004c678dc5109a0d1b1250204194c533eee774d
                       7c7e52a9b057351c04a694ca28423b2ec3d02a2e
                       bb258e8a270dda3f933277f1fc8416eb39e4bae9
                       87e515821769b512db5f14ec2fad7223a8f21eef
                       41a9f9525f0ce74546dd89cd50c3b72ae9a900af
                       83cbb885c2e4029ae489ebde8ecfc33358cda660
                       fa9570acc8660696c0297dc40b34e83ad6415bb3
                       839e37b79786b85f6cd7b09869008ece469301a2
                       d069e76ef87b25fbe7c7093de0608f547ba12b2a
                       6513f6237beb4b1e1ee4e73edb1bd5326892adf8
                       12108ba58e7d10be1b6c21e7e1f7393304a566b4
                       e44f34d1a94efad5788ef4cef249f406e277b99e
                       f41b269bf1f7e5ddc4bd7e4e440af939f11fcc66
                       3b705aca465355f6945dafb04a38b5637000562b
                       5040bfd9fbb6b5afbd49e4504197e17b0e886539
                       276fc4fbb4c786dcc60c2cfa3357fec5b66180f8
                       44d8379e5cb96cb37104512eb31fbdadc07d329d
                       b76d4a9f4c5249497d41bc7141a140f54cd52349
                       c1526187
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [81:51:c6:b5:be:d7:99:95:1b:a3:72:18:f8:ef:4a:96:f9:e3:15:2d],[56:66:d1:a4]
        modulus: bf8d6e755189716f11a0b93ca7774c33d1a5fcca6c378c5311dc57bbfd95246593cf743aac6ba2cb6502a52b291d1073068d875bc4ad8b1f0d714945d944d9eaf80e127cf2a2fc88ebfa1e0163b7b8a286f1f6c7c6b2c04f49a426c04f4838f94d6549219ce290fb4061e196138155bff9707aa0e1ad17af5e768ed84e4cd6e113f9ddd521c957c89cf0ba63b0a0924d47282afac18d152cdb8a20d9a506aac945c0e07995b179c3cc27a100758c201eee71edfd2ac169d085f54574018545bdfd00773f91ffbb7156bacc370c4e208e52d429f2784c453f49c4f22ddeb492563d38dad190e1c19b940a01f803e14a6c9fb88a6b9b37ce38bc46036f0fedec93
public exponent: 10001

] 
2022-11-27 06:39:09.444  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-27 06:39:09.447 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-27 06:39:09.453 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-11-27 06:39:09.455 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-27 06:39:09.455  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-11-27 06:39:09.456  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-27 06:39:09.457  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-27 06:39:09.458 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-27 06:39:09.458 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-27 06:39:09.459 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-27 06:39:09.466 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-27 06:39:09.468 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-27 06:39:09.469 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-27 06:39:09.469 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-27 06:39:09.635  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-27 06:39:09.636  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-27 06:39:09.636 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-27 06:39:09.637 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-27 06:39:09.641  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-27 06:39:09.641  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-27 06:39:09.642 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-27 06:39:09.642 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-27 06:39:09.643 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-27 06:39:09.644 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-27 06:39:09.644 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-27 06:39:09.645 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-27 06:39:09.645 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-27 06:39:09.646 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-27 06:39:09.646 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-27 06:39:09.647 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-27 06:39:09.651 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 251864911341875577134378407116028011186295292088
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Nov 27 04:58:53 UTC 2022
           Final Date: Fri Nov 26 04:58:52 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d3:ee:67:9d:05:3b:dc:dc:06:8a:f1:56:b0:2e:45:fa:2f:0b:b1:c8],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 291b26aac3baefab157b9267c9c764a24589b455
                       f004c678dc5109a0d1b1250204194c533eee774d
                       7c7e52a9b057351c04a694ca28423b2ec3d02a2e
                       bb258e8a270dda3f933277f1fc8416eb39e4bae9
                       87e515821769b512db5f14ec2fad7223a8f21eef
                       41a9f9525f0ce74546dd89cd50c3b72ae9a900af
                       83cbb885c2e4029ae489ebde8ecfc33358cda660
                       fa9570acc8660696c0297dc40b34e83ad6415bb3
                       839e37b79786b85f6cd7b09869008ece469301a2
                       d069e76ef87b25fbe7c7093de0608f547ba12b2a
                       6513f6237beb4b1e1ee4e73edb1bd5326892adf8
                       12108ba58e7d10be1b6c21e7e1f7393304a566b4
                       e44f34d1a94efad5788ef4cef249f406e277b99e
                       f41b269bf1f7e5ddc4bd7e4e440af939f11fcc66
                       3b705aca465355f6945dafb04a38b5637000562b
                       5040bfd9fbb6b5afbd49e4504197e17b0e886539
                       276fc4fbb4c786dcc60c2cfa3357fec5b66180f8
                       44d8379e5cb96cb37104512eb31fbdadc07d329d
                       b76d4a9f4c5249497d41bc7141a140f54cd52349
                       c1526187
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [88:ae:fb:b1:07:76:2a:73:35:12:ff:12:9e:ad:e8:61:eb:20:6b:71],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-11-27 06:41:10.517  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-27 06:41:10.518 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-27 06:41:10.519 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-11-27 06:41:10.520 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-27 06:41:10.521  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-11-27 06:41:10.522  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-27 06:41:10.523  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-27 06:41:10.523 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-27 06:41:10.524 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-27 06:41:10.524 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-27 06:41:10.528 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-27 06:41:10.528 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-27 06:41:10.529 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-27 06:41:10.529 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-27 06:41:10.663  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-27 06:41:10.664  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-27 06:41:10.664 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-27 06:41:10.665 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-27 06:41:10.667  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-27 06:41:10.667  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-27 06:41:10.668 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-27 06:41:10.668 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-27 06:41:10.669 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-27 06:41:10.669 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-27 06:41:10.670 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-27 06:41:10.670 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-27 06:41:10.672 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-27 06:41:10.672 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-27 06:41:10.673 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-27 06:41:10.674 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-27 06:41:10.678 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 251864911341875577134378407116028011186295292088
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Nov 27 04:58:53 UTC 2022
           Final Date: Fri Nov 26 04:58:52 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d3:ee:67:9d:05:3b:dc:dc:06:8a:f1:56:b0:2e:45:fa:2f:0b:b1:c8],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 291b26aac3baefab157b9267c9c764a24589b455
                       f004c678dc5109a0d1b1250204194c533eee774d
                       7c7e52a9b057351c04a694ca28423b2ec3d02a2e
                       bb258e8a270dda3f933277f1fc8416eb39e4bae9
                       87e515821769b512db5f14ec2fad7223a8f21eef
                       41a9f9525f0ce74546dd89cd50c3b72ae9a900af
                       83cbb885c2e4029ae489ebde8ecfc33358cda660
                       fa9570acc8660696c0297dc40b34e83ad6415bb3
                       839e37b79786b85f6cd7b09869008ece469301a2
                       d069e76ef87b25fbe7c7093de0608f547ba12b2a
                       6513f6237beb4b1e1ee4e73edb1bd5326892adf8
                       12108ba58e7d10be1b6c21e7e1f7393304a566b4
                       e44f34d1a94efad5788ef4cef249f406e277b99e
                       f41b269bf1f7e5ddc4bd7e4e440af939f11fcc66
                       3b705aca465355f6945dafb04a38b5637000562b
                       5040bfd9fbb6b5afbd49e4504197e17b0e886539
                       276fc4fbb4c786dcc60c2cfa3357fec5b66180f8
                       44d8379e5cb96cb37104512eb31fbdadc07d329d
                       b76d4a9f4c5249497d41bc7141a140f54cd52349
                       c1526187
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [81:49:80:a5:e0:dc:6a:5c:86:49:6a:31:12:c4:54:02:ca:e8:e3:b4],[56:66:d1:a4]
        modulus: be6f17ce80b7a925f5cc39d2916eddc3fe5277f6432e71bc464e4fd7eaf3df31630f755d04da97e50fea20b3fcfa24a8ce8e25f6c6f057a46d1ac968fd542300fa95999b994b40cea47875d69f4d0d297b126836bc372e324a8595dc85d542f7caeb23496dd33c70670a27b151c5ffbb76d8908ec40f0c6e873398a7de1dd08ceb03ccee88ab044d5ec21d3c951aac268e9869e4bd61a8eb88caf68e8e880a9c50319ec98a6e92d565be6a69201747b37d77142578d9ec54b18fc83db2428b7207e1b48fcccf2deb501a13bc30432822e977f95d6ea74be211e356ea9aec03c840a9096b739c87969ad4d8b638db1437b48719624c961f3ea228cb7d18a94143
public exponent: 10001

] 
2022-11-27 06:43:53.466  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-27 06:43:53.470 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-27 06:43:53.472 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-27 06:43:53.473 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-27 06:43:53.474  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-27 06:43:53.475  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-27 06:43:53.477  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-27 06:43:53.478 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-27 06:43:53.479 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-27 06:43:53.479 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-27 06:43:53.485 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-27 06:43:53.486 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-27 06:43:53.487 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-27 06:43:53.487 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-27 06:43:53.662  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-27 06:43:53.663  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-27 06:43:53.663 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-27 06:43:53.664 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-27 06:43:53.665  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-27 06:43:53.666  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-27 06:43:53.667 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-27 06:43:53.670 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-27 06:43:53.670 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-27 06:43:53.671 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-27 06:43:53.672 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-27 06:43:53.672 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-27 06:43:53.673 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-27 06:43:53.673 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-27 06:43:53.673 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-27 06:43:53.674 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-27 06:43:53.679 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 251864911341875577134378407116028011186295292088
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Nov 27 04:58:53 UTC 2022
           Final Date: Fri Nov 26 04:58:52 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d3:ee:67:9d:05:3b:dc:dc:06:8a:f1:56:b0:2e:45:fa:2f:0b:b1:c8],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 291b26aac3baefab157b9267c9c764a24589b455
                       f004c678dc5109a0d1b1250204194c533eee774d
                       7c7e52a9b057351c04a694ca28423b2ec3d02a2e
                       bb258e8a270dda3f933277f1fc8416eb39e4bae9
                       87e515821769b512db5f14ec2fad7223a8f21eef
                       41a9f9525f0ce74546dd89cd50c3b72ae9a900af
                       83cbb885c2e4029ae489ebde8ecfc33358cda660
                       fa9570acc8660696c0297dc40b34e83ad6415bb3
                       839e37b79786b85f6cd7b09869008ece469301a2
                       d069e76ef87b25fbe7c7093de0608f547ba12b2a
                       6513f6237beb4b1e1ee4e73edb1bd5326892adf8
                       12108ba58e7d10be1b6c21e7e1f7393304a566b4
                       e44f34d1a94efad5788ef4cef249f406e277b99e
                       f41b269bf1f7e5ddc4bd7e4e440af939f11fcc66
                       3b705aca465355f6945dafb04a38b5637000562b
                       5040bfd9fbb6b5afbd49e4504197e17b0e886539
                       276fc4fbb4c786dcc60c2cfa3357fec5b66180f8
                       44d8379e5cb96cb37104512eb31fbdadc07d329d
                       b76d4a9f4c5249497d41bc7141a140f54cd52349
                       c1526187
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [6e:f0:3f:e0:19:a8:61:46:07:0e:99:75:c3:56:ff:84:d3:77:2f:90],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-11-27 06:50:52.574  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-27 06:50:52.576 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-27 06:50:52.578 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-27 06:50:52.579 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-27 06:50:52.580  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-27 06:50:52.580  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-27 06:50:52.581  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-27 06:50:52.582 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-27 06:50:52.582 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-27 06:50:52.583 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-27 06:50:52.589 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-27 06:50:52.590 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-27 06:50:52.590 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-27 06:50:52.591 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-27 06:50:52.764  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-27 06:50:52.765  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-27 06:50:52.766 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-27 06:50:52.766 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-27 06:50:52.768  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-27 06:50:52.768  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-27 06:50:52.769 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-27 06:50:52.769 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-27 06:50:52.769 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-27 06:50:52.770 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-27 06:50:52.771 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-27 06:50:52.771 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-27 06:50:52.772 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-27 06:50:52.772 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-27 06:50:52.773 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-27 06:50:52.773 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-27 06:50:52.776 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 251864911341875577134378407116028011186295292088
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Nov 27 04:58:53 UTC 2022
           Final Date: Fri Nov 26 04:58:52 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d3:ee:67:9d:05:3b:dc:dc:06:8a:f1:56:b0:2e:45:fa:2f:0b:b1:c8],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 291b26aac3baefab157b9267c9c764a24589b455
                       f004c678dc5109a0d1b1250204194c533eee774d
                       7c7e52a9b057351c04a694ca28423b2ec3d02a2e
                       bb258e8a270dda3f933277f1fc8416eb39e4bae9
                       87e515821769b512db5f14ec2fad7223a8f21eef
                       41a9f9525f0ce74546dd89cd50c3b72ae9a900af
                       83cbb885c2e4029ae489ebde8ecfc33358cda660
                       fa9570acc8660696c0297dc40b34e83ad6415bb3
                       839e37b79786b85f6cd7b09869008ece469301a2
                       d069e76ef87b25fbe7c7093de0608f547ba12b2a
                       6513f6237beb4b1e1ee4e73edb1bd5326892adf8
                       12108ba58e7d10be1b6c21e7e1f7393304a566b4
                       e44f34d1a94efad5788ef4cef249f406e277b99e
                       f41b269bf1f7e5ddc4bd7e4e440af939f11fcc66
                       3b705aca465355f6945dafb04a38b5637000562b
                       5040bfd9fbb6b5afbd49e4504197e17b0e886539
                       276fc4fbb4c786dcc60c2cfa3357fec5b66180f8
                       44d8379e5cb96cb37104512eb31fbdadc07d329d
                       b76d4a9f4c5249497d41bc7141a140f54cd52349
                       c1526187
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [7f:28:cd:45:dd:07:3e:56:ad:8a:7e:a2:5a:d6:bb:a1:55:6b:c3:71],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-11-27 06:56:40.917  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-27 06:56:40.922 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-27 06:56:40.926 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-27 06:56:40.927 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-27 06:56:40.927  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-27 06:56:40.928  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-27 06:56:40.929  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-27 06:56:40.929 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-27 06:56:40.930 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-27 06:56:40.931 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-27 06:56:40.935 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-27 06:56:40.935 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-27 06:56:40.936 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-27 06:56:40.936 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-27 06:56:41.131  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-27 06:56:41.131  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-27 06:56:41.132 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-27 06:56:41.132 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-27 06:56:41.133  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-27 06:56:41.134  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-27 06:56:41.134 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-27 06:56:41.134 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-27 06:56:41.135 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-27 06:56:41.136 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-27 06:56:41.136 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-27 06:56:41.137 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-27 06:56:41.137 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-27 06:56:41.138 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-27 06:56:41.138 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-27 06:56:41.139 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-27 06:56:41.143 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 251864911341875577134378407116028011186295292088
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Nov 27 04:58:53 UTC 2022
           Final Date: Fri Nov 26 04:58:52 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d3:ee:67:9d:05:3b:dc:dc:06:8a:f1:56:b0:2e:45:fa:2f:0b:b1:c8],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 291b26aac3baefab157b9267c9c764a24589b455
                       f004c678dc5109a0d1b1250204194c533eee774d
                       7c7e52a9b057351c04a694ca28423b2ec3d02a2e
                       bb258e8a270dda3f933277f1fc8416eb39e4bae9
                       87e515821769b512db5f14ec2fad7223a8f21eef
                       41a9f9525f0ce74546dd89cd50c3b72ae9a900af
                       83cbb885c2e4029ae489ebde8ecfc33358cda660
                       fa9570acc8660696c0297dc40b34e83ad6415bb3
                       839e37b79786b85f6cd7b09869008ece469301a2
                       d069e76ef87b25fbe7c7093de0608f547ba12b2a
                       6513f6237beb4b1e1ee4e73edb1bd5326892adf8
                       12108ba58e7d10be1b6c21e7e1f7393304a566b4
                       e44f34d1a94efad5788ef4cef249f406e277b99e
                       f41b269bf1f7e5ddc4bd7e4e440af939f11fcc66
                       3b705aca465355f6945dafb04a38b5637000562b
                       5040bfd9fbb6b5afbd49e4504197e17b0e886539
                       276fc4fbb4c786dcc60c2cfa3357fec5b66180f8
                       44d8379e5cb96cb37104512eb31fbdadc07d329d
                       b76d4a9f4c5249497d41bc7141a140f54cd52349
                       c1526187
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [d6:b8:05:b1:e6:81:eb:a5:9b:83:d9:f3:a8:b4:35:2f:a5:88:ba:d9],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-11-27 07:03:35.874  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-27 07:03:35.876 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-27 07:03:35.880 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-11-27 07:03:35.881 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-27 07:03:35.882  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-11-27 07:03:35.883  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-27 07:03:35.883  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-27 07:03:35.883 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-27 07:03:35.884 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-27 07:03:35.884 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-27 07:03:35.888 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-27 07:03:35.890 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-27 07:03:35.890 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-27 07:03:35.890 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-27 07:03:36.085  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-27 07:03:36.086  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-27 07:03:36.086 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-27 07:03:36.086 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-27 07:03:36.088  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-27 07:03:36.088  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-27 07:03:36.088 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-27 07:03:36.089 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-27 07:03:36.089 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-27 07:03:36.090 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-27 07:03:36.090 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-27 07:03:36.091 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-27 07:03:36.091 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-27 07:03:36.092 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-27 07:03:36.092 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-27 07:03:36.092 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-27 07:03:36.096 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 251864911341875577134378407116028011186295292088
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Nov 27 04:58:53 UTC 2022
           Final Date: Fri Nov 26 04:58:52 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d3:ee:67:9d:05:3b:dc:dc:06:8a:f1:56:b0:2e:45:fa:2f:0b:b1:c8],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 291b26aac3baefab157b9267c9c764a24589b455
                       f004c678dc5109a0d1b1250204194c533eee774d
                       7c7e52a9b057351c04a694ca28423b2ec3d02a2e
                       bb258e8a270dda3f933277f1fc8416eb39e4bae9
                       87e515821769b512db5f14ec2fad7223a8f21eef
                       41a9f9525f0ce74546dd89cd50c3b72ae9a900af
                       83cbb885c2e4029ae489ebde8ecfc33358cda660
                       fa9570acc8660696c0297dc40b34e83ad6415bb3
                       839e37b79786b85f6cd7b09869008ece469301a2
                       d069e76ef87b25fbe7c7093de0608f547ba12b2a
                       6513f6237beb4b1e1ee4e73edb1bd5326892adf8
                       12108ba58e7d10be1b6c21e7e1f7393304a566b4
                       e44f34d1a94efad5788ef4cef249f406e277b99e
                       f41b269bf1f7e5ddc4bd7e4e440af939f11fcc66
                       3b705aca465355f6945dafb04a38b5637000562b
                       5040bfd9fbb6b5afbd49e4504197e17b0e886539
                       276fc4fbb4c786dcc60c2cfa3357fec5b66180f8
                       44d8379e5cb96cb37104512eb31fbdadc07d329d
                       b76d4a9f4c5249497d41bc7141a140f54cd52349
                       c1526187
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [3a:09:1f:ba:01:ef:e3:f2:ea:60:98:ec:e1:d2:e3:3f:0f:f9:fe:a4],[56:66:d1:a4]
        modulus: c7f557f3e0580aa980089ba6e20432ae095276b0a6113c7a2c9d169af772160f4aa4289315d8b238cf4060d45e6f377a6e3779f233c04f3a26755da21cc2314ae13ee50218606d11e923a228d3b57dd0cb63e4f43474e3ba67c7f3b658a963992ae1944599ef37329f3f1e3ab290ce7a2b951c10e2a39be453becc2c32a29ee7f2a494e113037a17b6a749385644ab2e70f6c52ecd88aac54ba91d9ae4490c2cbf791b4ce28cee1c0ee1689e63b7bba5cf6809b53927da043fd58f3dfb17f83ae6b8b31b5ccc5bd41c097b9eb6396d5e59fbc951ba910272702b9cc573c1ce7f40f32793ead0f0c82b9779664d2d3ef1448a86c656279a21d7e7e8eef2b31609
public exponent: 10001

] 
2022-11-27 07:09:24.656  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-27 07:09:24.658 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-27 07:09:24.661 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-11-27 07:09:24.662 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-27 07:09:24.662  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-11-27 07:09:24.662  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-27 07:09:24.663  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-27 07:09:24.663 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-27 07:09:24.664 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-27 07:09:24.664 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-27 07:09:24.667 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-27 07:09:24.668 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-27 07:09:24.668 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-27 07:09:24.669 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-27 07:09:24.850  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-27 07:09:24.851  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-27 07:09:24.851 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-27 07:09:24.851 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-27 07:09:24.854  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-27 07:09:24.855  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-27 07:09:24.856 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-27 07:09:24.857 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-27 07:09:24.857 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-27 07:09:24.859 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-27 07:09:24.859 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-27 07:09:24.860 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-27 07:09:24.860 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-27 07:09:24.861 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-27 07:09:24.861 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-27 07:09:24.862 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-27 07:09:24.865 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 251864911341875577134378407116028011186295292088
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Nov 27 04:58:53 UTC 2022
           Final Date: Fri Nov 26 04:58:52 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d3:ee:67:9d:05:3b:dc:dc:06:8a:f1:56:b0:2e:45:fa:2f:0b:b1:c8],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 291b26aac3baefab157b9267c9c764a24589b455
                       f004c678dc5109a0d1b1250204194c533eee774d
                       7c7e52a9b057351c04a694ca28423b2ec3d02a2e
                       bb258e8a270dda3f933277f1fc8416eb39e4bae9
                       87e515821769b512db5f14ec2fad7223a8f21eef
                       41a9f9525f0ce74546dd89cd50c3b72ae9a900af
                       83cbb885c2e4029ae489ebde8ecfc33358cda660
                       fa9570acc8660696c0297dc40b34e83ad6415bb3
                       839e37b79786b85f6cd7b09869008ece469301a2
                       d069e76ef87b25fbe7c7093de0608f547ba12b2a
                       6513f6237beb4b1e1ee4e73edb1bd5326892adf8
                       12108ba58e7d10be1b6c21e7e1f7393304a566b4
                       e44f34d1a94efad5788ef4cef249f406e277b99e
                       f41b269bf1f7e5ddc4bd7e4e440af939f11fcc66
                       3b705aca465355f6945dafb04a38b5637000562b
                       5040bfd9fbb6b5afbd49e4504197e17b0e886539
                       276fc4fbb4c786dcc60c2cfa3357fec5b66180f8
                       44d8379e5cb96cb37104512eb31fbdadc07d329d
                       b76d4a9f4c5249497d41bc7141a140f54cd52349
                       c1526187
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [a8:de:3a:31:67:86:c0:14:8f:ee:d2:61:08:f6:73:d6:46:88:cb:ea],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-11-27 07:09:49.339  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-27 07:09:49.341 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-27 07:09:49.342 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-11-27 07:09:49.342 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-27 07:09:49.343  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-11-27 07:09:49.343  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-27 07:09:49.344  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-27 07:09:49.344 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-27 07:09:49.344 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-27 07:09:49.345 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-27 07:09:49.348 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-27 07:09:49.348 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-27 07:09:49.349 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-27 07:09:49.349 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-27 07:09:49.491  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-27 07:09:49.492  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-27 07:09:49.492 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-27 07:09:49.493 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-27 07:09:49.494  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-27 07:09:49.494  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-27 07:09:49.495 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-27 07:09:49.495 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-27 07:09:49.495 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-27 07:09:49.496 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-27 07:09:49.496 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-27 07:09:49.497 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-27 07:09:49.497 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-27 07:09:49.497 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-27 07:09:49.498 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-27 07:09:49.498 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-27 07:09:49.500 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 251864911341875577134378407116028011186295292088
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Nov 27 04:58:53 UTC 2022
           Final Date: Fri Nov 26 04:58:52 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d3:ee:67:9d:05:3b:dc:dc:06:8a:f1:56:b0:2e:45:fa:2f:0b:b1:c8],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 291b26aac3baefab157b9267c9c764a24589b455
                       f004c678dc5109a0d1b1250204194c533eee774d
                       7c7e52a9b057351c04a694ca28423b2ec3d02a2e
                       bb258e8a270dda3f933277f1fc8416eb39e4bae9
                       87e515821769b512db5f14ec2fad7223a8f21eef
                       41a9f9525f0ce74546dd89cd50c3b72ae9a900af
                       83cbb885c2e4029ae489ebde8ecfc33358cda660
                       fa9570acc8660696c0297dc40b34e83ad6415bb3
                       839e37b79786b85f6cd7b09869008ece469301a2
                       d069e76ef87b25fbe7c7093de0608f547ba12b2a
                       6513f6237beb4b1e1ee4e73edb1bd5326892adf8
                       12108ba58e7d10be1b6c21e7e1f7393304a566b4
                       e44f34d1a94efad5788ef4cef249f406e277b99e
                       f41b269bf1f7e5ddc4bd7e4e440af939f11fcc66
                       3b705aca465355f6945dafb04a38b5637000562b
                       5040bfd9fbb6b5afbd49e4504197e17b0e886539
                       276fc4fbb4c786dcc60c2cfa3357fec5b66180f8
                       44d8379e5cb96cb37104512eb31fbdadc07d329d
                       b76d4a9f4c5249497d41bc7141a140f54cd52349
                       c1526187
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [06:da:87:26:1b:23:cc:14:dc:48:be:39:ca:05:67:a1:71:df:68:8e],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-11-27 07:31:32.580  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-27 07:31:32.584 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-27 07:31:32.589 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-11-27 07:31:32.591 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-27 07:31:32.592  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-11-27 07:31:32.593  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-27 07:31:32.594  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-27 07:31:32.594 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-27 07:31:32.594 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-27 07:31:32.595 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-27 07:31:32.600 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-27 07:31:32.601 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-27 07:31:32.601 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-27 07:31:32.602 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-27 07:31:32.808  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-27 07:31:32.809  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-27 07:31:32.809 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-27 07:31:32.809 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-27 07:31:32.811  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-27 07:31:32.811  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-27 07:31:32.812 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-27 07:31:32.812 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-27 07:31:32.812 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-27 07:31:32.813 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-27 07:31:32.814 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-27 07:31:32.814 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-27 07:31:32.815 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-27 07:31:32.815 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-27 07:31:32.815 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-27 07:31:32.816 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-27 07:31:32.821 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 251864911341875577134378407116028011186295292088
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Nov 27 04:58:53 UTC 2022
           Final Date: Fri Nov 26 04:58:52 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d3:ee:67:9d:05:3b:dc:dc:06:8a:f1:56:b0:2e:45:fa:2f:0b:b1:c8],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 291b26aac3baefab157b9267c9c764a24589b455
                       f004c678dc5109a0d1b1250204194c533eee774d
                       7c7e52a9b057351c04a694ca28423b2ec3d02a2e
                       bb258e8a270dda3f933277f1fc8416eb39e4bae9
                       87e515821769b512db5f14ec2fad7223a8f21eef
                       41a9f9525f0ce74546dd89cd50c3b72ae9a900af
                       83cbb885c2e4029ae489ebde8ecfc33358cda660
                       fa9570acc8660696c0297dc40b34e83ad6415bb3
                       839e37b79786b85f6cd7b09869008ece469301a2
                       d069e76ef87b25fbe7c7093de0608f547ba12b2a
                       6513f6237beb4b1e1ee4e73edb1bd5326892adf8
                       12108ba58e7d10be1b6c21e7e1f7393304a566b4
                       e44f34d1a94efad5788ef4cef249f406e277b99e
                       f41b269bf1f7e5ddc4bd7e4e440af939f11fcc66
                       3b705aca465355f6945dafb04a38b5637000562b
                       5040bfd9fbb6b5afbd49e4504197e17b0e886539
                       276fc4fbb4c786dcc60c2cfa3357fec5b66180f8
                       44d8379e5cb96cb37104512eb31fbdadc07d329d
                       b76d4a9f4c5249497d41bc7141a140f54cd52349
                       c1526187
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [2f:85:b4:0c:59:ee:9e:9b:a1:e8:1c:18:59:fa:df:a4:84:b5:16:0f],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-11-27 07:31:38.170  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-27 07:31:38.171 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-27 07:31:38.172 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-11-27 07:31:38.172 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-27 07:31:38.173  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-11-27 07:31:38.173  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-27 07:31:38.173  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-27 07:31:38.174 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-27 07:31:38.174 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-27 07:31:38.174 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-27 07:31:38.177 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-27 07:31:38.178 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-27 07:31:38.178 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-27 07:31:38.178 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-27 07:31:38.280  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-27 07:31:38.281  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-27 07:31:38.281 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-27 07:31:38.281 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-27 07:31:38.283  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-27 07:31:38.283  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-27 07:31:38.284 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-27 07:31:38.284 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-27 07:31:38.284 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-27 07:31:38.285 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-27 07:31:38.285 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-27 07:31:38.286 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-27 07:31:38.287 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-27 07:31:38.287 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-27 07:31:38.288 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-27 07:31:38.289 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-27 07:31:38.292 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 251864911341875577134378407116028011186295292088
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Nov 27 04:58:53 UTC 2022
           Final Date: Fri Nov 26 04:58:52 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d3:ee:67:9d:05:3b:dc:dc:06:8a:f1:56:b0:2e:45:fa:2f:0b:b1:c8],[56:66:d1:a4]
        modulus: a8f8ed0092f4d9993635016bb095a84d0cc1f376b5f47318271061d658d7e2fbc6c80ae215ad8c6ef10cac0ee4e29063b42748eade6ead050abb2c4f1d591150b7e95618167e0860413438ed709782b952b1ac406c95e05be9054226dd6271005475d45b0a295d5131d5d2464bb28137ee4b22cade0adcfe82ee4eb747a57340ff70c26712103cc1d7d00e91f838d93a7fd87323039a85ddd7f9eabd1426dc5c2c5777c758100b0d3456b0b10eb88d13ed399c856b387d0841496dd09c88ea12c5ef7039e5eeb9ba012e83cb6877160814e02d22ad45e600ca8e80351ac7c7ff4f97000ce01f19f33cbf68ad6ab7bfcbcc5ff4b318102223d07bfa1f9e6a965a3be33c64eb0bbbf5fa5e858816f59b0d08f9b3b93ef7ff1826803513b86571a1734dd7cc42014227f49e78fb9843197aed32622c40706e9fef7a52aea6809cf0e6b8d1972e634db9f16532d5baa15507300c71ec5b68690d87e14bff49780b3421500cb57662f66ccb0ce56b89026b15bbb09b28e9e6e5b02d55eba06ca3cd8f
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 291b26aac3baefab157b9267c9c764a24589b455
                       f004c678dc5109a0d1b1250204194c533eee774d
                       7c7e52a9b057351c04a694ca28423b2ec3d02a2e
                       bb258e8a270dda3f933277f1fc8416eb39e4bae9
                       87e515821769b512db5f14ec2fad7223a8f21eef
                       41a9f9525f0ce74546dd89cd50c3b72ae9a900af
                       83cbb885c2e4029ae489ebde8ecfc33358cda660
                       fa9570acc8660696c0297dc40b34e83ad6415bb3
                       839e37b79786b85f6cd7b09869008ece469301a2
                       d069e76ef87b25fbe7c7093de0608f547ba12b2a
                       6513f6237beb4b1e1ee4e73edb1bd5326892adf8
                       12108ba58e7d10be1b6c21e7e1f7393304a566b4
                       e44f34d1a94efad5788ef4cef249f406e277b99e
                       f41b269bf1f7e5ddc4bd7e4e440af939f11fcc66
                       3b705aca465355f6945dafb04a38b5637000562b
                       5040bfd9fbb6b5afbd49e4504197e17b0e886539
                       276fc4fbb4c786dcc60c2cfa3357fec5b66180f8
                       44d8379e5cb96cb37104512eb31fbdadc07d329d
                       b76d4a9f4c5249497d41bc7141a140f54cd52349
                       c1526187
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [34:d0:62:26:d9:a5:8b:df:76:ee:89:f0:e5:5e:ce:27:39:39:06:52],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

]