Results

By type

          2022-11-28 05:13:27,344 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-11-28 05:13:28,321 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-11-28 05:13:28.978  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Nov 28, 2022 5:13:30 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Nov 28, 2022 5:13:30 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Nov 28, 2022 5:13:30 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Nov 28, 2022 5:13:30 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-11-28 05:13:31.327 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-11-28 05:13:31.602  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-11-28 05:13:31.766  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-11-28 05:13:32.432 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-11-28 05:13:32.434 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
2022-11-28 05:13:32.436 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-11-28 05:13:32.439 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-11-28 05:13:32.475 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2022-11-28 05:13:32.479 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
	{GET [/docs]}: redirectToUi(HttpServletRequest)
2022-11-28 05:13:32.588 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-11-28 05:13:33.164 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Nov 28, 2022 5:13:33 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-11-28 05:13:34.159  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 7.626 seconds (JVM running for 9.426)
Nov 28, 2022 5:13:59 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-11-28 05:14:15.329  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-28 05:14:15.335 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-28 05:14:15.372 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-11-28 05:14:15.375 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-28 05:14:15.391  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-11-28 05:14:15.393  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-28 05:14:15.394  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-28 05:14:15.395 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-28 05:14:15.395 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-28 05:14:15.399 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-28 05:14:15.408 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-28 05:14:15.412 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-28 05:14:15.477 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-28 05:14:15.484 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-28 05:14:15.485 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-28 05:14:15.490 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-28 05:14:16.068  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-28 05:14:16.071  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-28 05:14:16.072 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-28 05:14:16.073 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-28 05:14:16.082  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-28 05:14:16.083  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-28 05:14:16.083 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-28 05:14:16.084 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-28 05:14:16.084 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-28 05:14:16.101 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-28 05:14:16.101 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-28 05:14:16.102 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-28 05:14:16.109 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-28 05:14:16.110 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-28 05:14:16.110 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-28 05:14:16.111 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-28 05:14:16.144 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 543051447905705040191545164155858015808237615077
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Nov 28 05:10:58 UTC 2022
           Final Date: Sat Nov 27 05:10:57 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [34:87:10:bf:69:94:03:a1:44:7b:08:28:e3:df:f8:c1:d9:41:08:a4],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 4fd7b436708070d3495c7888da743ceb901bf96e
                       008e8618608a34edf08e0e108ec9e46fb905eefc
                       3823b1ea64915caef0815ece5b2160af318b53c6
                       47c5439a2a9c7882a0c816367b677e7fc87e2c4e
                       12e62c10e982c02da2072c7e8a8be2e8d9f5024a
                       25630abdcd643371356d6fd9e5d4d6bb7913072a
                       acde9df1cf7ba01ad213311449385f4ca6fdc6cb
                       a00601371c7398c8d7e6a83c62a97b9f95ae255f
                       21a35bb64d4d634f936fd6b03ecbc68d0e687f73
                       2f5610d20d93471053030383d5173419edc3088c
                       d061a524b01cbb36ef93c9e6290f7c8679958bf4
                       c88740b68f614557d50b7f278c5d5b9a60c556a3
                       7707a2f6913cc70f0cd90fba7a872603d63f9ed5
                       b3e16a20c0fec759fcdb32600aa72b495096a0b6
                       d8eaea31089639e8dafb7176a6b7a786fb90fc3d
                       0b562d198f9977c75f13f1108ef30b1496798640
                       9c02057edd486f89abcda5d0b6e402fae0660807
                       df2627813a1d966a76d48725dc3d23a1106f1e2f
                       606109342a288b9e7b7fa240f936cb4f5164c9fc
                       d730ff07
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [74:5e:58:eb:06:58:0a:71:82:8a:51:ce:9f:fe:ce:f6:80:c4:69:27],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-11-28 06:45:24.290  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-28 06:45:24.296 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-28 06:45:24.302 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-28 06:45:24.304 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-28 06:45:24.305  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-28 06:45:24.306  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-28 06:45:24.306  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-28 06:45:24.307 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-28 06:45:24.308 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-28 06:45:24.308 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-28 06:45:24.316 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-28 06:45:24.319 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-28 06:45:24.320 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-28 06:45:24.321 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-28 06:45:24.591  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-28 06:45:24.592  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-28 06:45:24.593 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-28 06:45:24.594 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-28 06:45:24.596  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-28 06:45:24.597  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-28 06:45:24.598 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-28 06:45:24.598 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-28 06:45:24.599 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-28 06:45:24.604 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-28 06:45:24.604 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-28 06:45:24.605 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-28 06:45:24.606 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-28 06:45:24.606 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-28 06:45:24.607 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-28 06:45:24.610 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-28 06:45:24.618 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 543051447905705040191545164155858015808237615077
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Nov 28 05:10:58 UTC 2022
           Final Date: Sat Nov 27 05:10:57 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [34:87:10:bf:69:94:03:a1:44:7b:08:28:e3:df:f8:c1:d9:41:08:a4],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 4fd7b436708070d3495c7888da743ceb901bf96e
                       008e8618608a34edf08e0e108ec9e46fb905eefc
                       3823b1ea64915caef0815ece5b2160af318b53c6
                       47c5439a2a9c7882a0c816367b677e7fc87e2c4e
                       12e62c10e982c02da2072c7e8a8be2e8d9f5024a
                       25630abdcd643371356d6fd9e5d4d6bb7913072a
                       acde9df1cf7ba01ad213311449385f4ca6fdc6cb
                       a00601371c7398c8d7e6a83c62a97b9f95ae255f
                       21a35bb64d4d634f936fd6b03ecbc68d0e687f73
                       2f5610d20d93471053030383d5173419edc3088c
                       d061a524b01cbb36ef93c9e6290f7c8679958bf4
                       c88740b68f614557d50b7f278c5d5b9a60c556a3
                       7707a2f6913cc70f0cd90fba7a872603d63f9ed5
                       b3e16a20c0fec759fcdb32600aa72b495096a0b6
                       d8eaea31089639e8dafb7176a6b7a786fb90fc3d
                       0b562d198f9977c75f13f1108ef30b1496798640
                       9c02057edd486f89abcda5d0b6e402fae0660807
                       df2627813a1d966a76d48725dc3d23a1106f1e2f
                       606109342a288b9e7b7fa240f936cb4f5164c9fc
                       d730ff07
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [97:a2:36:97:d6:0d:f0:40:62:3b:91:34:ac:78:cf:d9:bb:72:14:08],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-11-28 06:47:09.505  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-28 06:47:09.508 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-28 06:47:09.510 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-11-28 06:47:09.510 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-28 06:47:09.511  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-11-28 06:47:09.514  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-28 06:47:09.514  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-28 06:47:09.515 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-28 06:47:09.515 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-28 06:47:09.522 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-28 06:47:09.531 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-28 06:47:09.531 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-28 06:47:09.532 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-28 06:47:09.532 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-28 06:47:09.947  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-28 06:47:09.948  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-28 06:47:09.949 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-28 06:47:09.950 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-28 06:47:09.955  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-28 06:47:09.958  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-28 06:47:09.959 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-28 06:47:09.959 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-28 06:47:09.960 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-28 06:47:09.964 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-28 06:47:09.966 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-28 06:47:09.968 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-28 06:47:09.972 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-28 06:47:09.973 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-28 06:47:09.974 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-28 06:47:09.976 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-28 06:47:09.979 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 543051447905705040191545164155858015808237615077
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Nov 28 05:10:58 UTC 2022
           Final Date: Sat Nov 27 05:10:57 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [34:87:10:bf:69:94:03:a1:44:7b:08:28:e3:df:f8:c1:d9:41:08:a4],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 4fd7b436708070d3495c7888da743ceb901bf96e
                       008e8618608a34edf08e0e108ec9e46fb905eefc
                       3823b1ea64915caef0815ece5b2160af318b53c6
                       47c5439a2a9c7882a0c816367b677e7fc87e2c4e
                       12e62c10e982c02da2072c7e8a8be2e8d9f5024a
                       25630abdcd643371356d6fd9e5d4d6bb7913072a
                       acde9df1cf7ba01ad213311449385f4ca6fdc6cb
                       a00601371c7398c8d7e6a83c62a97b9f95ae255f
                       21a35bb64d4d634f936fd6b03ecbc68d0e687f73
                       2f5610d20d93471053030383d5173419edc3088c
                       d061a524b01cbb36ef93c9e6290f7c8679958bf4
                       c88740b68f614557d50b7f278c5d5b9a60c556a3
                       7707a2f6913cc70f0cd90fba7a872603d63f9ed5
                       b3e16a20c0fec759fcdb32600aa72b495096a0b6
                       d8eaea31089639e8dafb7176a6b7a786fb90fc3d
                       0b562d198f9977c75f13f1108ef30b1496798640
                       9c02057edd486f89abcda5d0b6e402fae0660807
                       df2627813a1d966a76d48725dc3d23a1106f1e2f
                       606109342a288b9e7b7fa240f936cb4f5164c9fc
                       d730ff07
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [aa:dc:5b:ca:9e:99:f7:83:c9:8c:0f:14:09:c3:41:b2:01:9d:f1:79],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-11-28 06:49:21.655  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-28 06:49:21.657 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-28 06:49:21.662 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-11-28 06:49:21.663 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-28 06:49:21.663  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-11-28 06:49:21.664  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-28 06:49:21.664  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-28 06:49:21.665 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-28 06:49:21.665 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-28 06:49:21.666 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-28 06:49:21.669 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-28 06:49:21.670 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-28 06:49:21.671 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-28 06:49:21.671 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-28 06:49:21.974  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-28 06:49:21.975  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-28 06:49:21.975 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-28 06:49:21.976 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-28 06:49:21.979  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-28 06:49:21.980  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-28 06:49:21.982 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-28 06:49:21.984 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-28 06:49:21.984 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-28 06:49:21.985 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-28 06:49:21.986 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-28 06:49:21.989 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-28 06:49:21.990 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-28 06:49:21.991 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-28 06:49:21.991 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-28 06:49:21.993 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-28 06:49:21.999 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 543051447905705040191545164155858015808237615077
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Nov 28 05:10:58 UTC 2022
           Final Date: Sat Nov 27 05:10:57 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [34:87:10:bf:69:94:03:a1:44:7b:08:28:e3:df:f8:c1:d9:41:08:a4],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 4fd7b436708070d3495c7888da743ceb901bf96e
                       008e8618608a34edf08e0e108ec9e46fb905eefc
                       3823b1ea64915caef0815ece5b2160af318b53c6
                       47c5439a2a9c7882a0c816367b677e7fc87e2c4e
                       12e62c10e982c02da2072c7e8a8be2e8d9f5024a
                       25630abdcd643371356d6fd9e5d4d6bb7913072a
                       acde9df1cf7ba01ad213311449385f4ca6fdc6cb
                       a00601371c7398c8d7e6a83c62a97b9f95ae255f
                       21a35bb64d4d634f936fd6b03ecbc68d0e687f73
                       2f5610d20d93471053030383d5173419edc3088c
                       d061a524b01cbb36ef93c9e6290f7c8679958bf4
                       c88740b68f614557d50b7f278c5d5b9a60c556a3
                       7707a2f6913cc70f0cd90fba7a872603d63f9ed5
                       b3e16a20c0fec759fcdb32600aa72b495096a0b6
                       d8eaea31089639e8dafb7176a6b7a786fb90fc3d
                       0b562d198f9977c75f13f1108ef30b1496798640
                       9c02057edd486f89abcda5d0b6e402fae0660807
                       df2627813a1d966a76d48725dc3d23a1106f1e2f
                       606109342a288b9e7b7fa240f936cb4f5164c9fc
                       d730ff07
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [f5:67:07:00:98:8b:fc:63:10:1f:76:3a:30:fd:9b:30:b2:c7:b2:76],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-11-28 06:52:02.819  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-28 06:52:02.822 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-28 06:52:02.823 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-28 06:52:02.824 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-28 06:52:02.825  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-28 06:52:02.826  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-28 06:52:02.826  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-28 06:52:02.827 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-28 06:52:02.827 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-28 06:52:02.828 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-28 06:52:02.832 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-28 06:52:02.833 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-28 06:52:02.834 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-28 06:52:02.834 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-28 06:52:03.096  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-28 06:52:03.098  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-28 06:52:03.098 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-28 06:52:03.099 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-28 06:52:03.100  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-28 06:52:03.100  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-28 06:52:03.101 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-28 06:52:03.101 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-28 06:52:03.102 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-28 06:52:03.102 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-28 06:52:03.103 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-28 06:52:03.103 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-28 06:52:03.104 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-28 06:52:03.104 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-28 06:52:03.105 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-28 06:52:03.105 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-28 06:52:03.108 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 543051447905705040191545164155858015808237615077
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Nov 28 05:10:58 UTC 2022
           Final Date: Sat Nov 27 05:10:57 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [34:87:10:bf:69:94:03:a1:44:7b:08:28:e3:df:f8:c1:d9:41:08:a4],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 4fd7b436708070d3495c7888da743ceb901bf96e
                       008e8618608a34edf08e0e108ec9e46fb905eefc
                       3823b1ea64915caef0815ece5b2160af318b53c6
                       47c5439a2a9c7882a0c816367b677e7fc87e2c4e
                       12e62c10e982c02da2072c7e8a8be2e8d9f5024a
                       25630abdcd643371356d6fd9e5d4d6bb7913072a
                       acde9df1cf7ba01ad213311449385f4ca6fdc6cb
                       a00601371c7398c8d7e6a83c62a97b9f95ae255f
                       21a35bb64d4d634f936fd6b03ecbc68d0e687f73
                       2f5610d20d93471053030383d5173419edc3088c
                       d061a524b01cbb36ef93c9e6290f7c8679958bf4
                       c88740b68f614557d50b7f278c5d5b9a60c556a3
                       7707a2f6913cc70f0cd90fba7a872603d63f9ed5
                       b3e16a20c0fec759fcdb32600aa72b495096a0b6
                       d8eaea31089639e8dafb7176a6b7a786fb90fc3d
                       0b562d198f9977c75f13f1108ef30b1496798640
                       9c02057edd486f89abcda5d0b6e402fae0660807
                       df2627813a1d966a76d48725dc3d23a1106f1e2f
                       606109342a288b9e7b7fa240f936cb4f5164c9fc
                       d730ff07
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [e9:dd:f7:7b:ae:34:55:c7:ee:ca:7f:91:f7:b7:6a:77:c6:19:89:cc],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-11-28 06:58:39.965  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-28 06:58:39.968 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-28 06:58:39.972 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-28 06:58:39.973 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-28 06:58:39.973  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-28 06:58:39.974  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-28 06:58:39.975  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-28 06:58:39.975 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-28 06:58:39.976 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-28 06:58:39.976 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-28 06:58:39.982 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-28 06:58:39.984 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-28 06:58:39.985 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-28 06:58:39.986 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-28 06:58:40.193  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-28 06:58:40.194  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-28 06:58:40.194 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-28 06:58:40.194 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-28 06:58:40.196  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-28 06:58:40.196  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-28 06:58:40.196 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-28 06:58:40.197 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-28 06:58:40.197 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-28 06:58:40.198 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-28 06:58:40.198 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-28 06:58:40.199 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-28 06:58:40.199 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-28 06:58:40.200 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-28 06:58:40.200 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-28 06:58:40.201 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-28 06:58:40.205 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 543051447905705040191545164155858015808237615077
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Nov 28 05:10:58 UTC 2022
           Final Date: Sat Nov 27 05:10:57 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [34:87:10:bf:69:94:03:a1:44:7b:08:28:e3:df:f8:c1:d9:41:08:a4],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 4fd7b436708070d3495c7888da743ceb901bf96e
                       008e8618608a34edf08e0e108ec9e46fb905eefc
                       3823b1ea64915caef0815ece5b2160af318b53c6
                       47c5439a2a9c7882a0c816367b677e7fc87e2c4e
                       12e62c10e982c02da2072c7e8a8be2e8d9f5024a
                       25630abdcd643371356d6fd9e5d4d6bb7913072a
                       acde9df1cf7ba01ad213311449385f4ca6fdc6cb
                       a00601371c7398c8d7e6a83c62a97b9f95ae255f
                       21a35bb64d4d634f936fd6b03ecbc68d0e687f73
                       2f5610d20d93471053030383d5173419edc3088c
                       d061a524b01cbb36ef93c9e6290f7c8679958bf4
                       c88740b68f614557d50b7f278c5d5b9a60c556a3
                       7707a2f6913cc70f0cd90fba7a872603d63f9ed5
                       b3e16a20c0fec759fcdb32600aa72b495096a0b6
                       d8eaea31089639e8dafb7176a6b7a786fb90fc3d
                       0b562d198f9977c75f13f1108ef30b1496798640
                       9c02057edd486f89abcda5d0b6e402fae0660807
                       df2627813a1d966a76d48725dc3d23a1106f1e2f
                       606109342a288b9e7b7fa240f936cb4f5164c9fc
                       d730ff07
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [55:c1:d5:5d:ad:72:05:48:5a:9d:01:ae:a2:16:84:80:46:f6:15:e9],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-11-28 07:04:20.041  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-28 07:04:20.044 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-28 07:04:20.048 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-28 07:04:20.049 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-28 07:04:20.049  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-28 07:04:20.050  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-28 07:04:20.050  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-28 07:04:20.051 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-28 07:04:20.051 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-28 07:04:20.052 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-28 07:04:20.056 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-28 07:04:20.057 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-28 07:04:20.057 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-28 07:04:20.057 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-28 07:04:20.239  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-28 07:04:20.240  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-28 07:04:20.240 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-28 07:04:20.240 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-28 07:04:20.241  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-28 07:04:20.242  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-28 07:04:20.243 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-28 07:04:20.243 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-28 07:04:20.243 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-28 07:04:20.244 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-28 07:04:20.244 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-28 07:04:20.245 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-28 07:04:20.245 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-28 07:04:20.246 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-28 07:04:20.246 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-28 07:04:20.246 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-28 07:04:20.250 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 543051447905705040191545164155858015808237615077
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Nov 28 05:10:58 UTC 2022
           Final Date: Sat Nov 27 05:10:57 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [34:87:10:bf:69:94:03:a1:44:7b:08:28:e3:df:f8:c1:d9:41:08:a4],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 4fd7b436708070d3495c7888da743ceb901bf96e
                       008e8618608a34edf08e0e108ec9e46fb905eefc
                       3823b1ea64915caef0815ece5b2160af318b53c6
                       47c5439a2a9c7882a0c816367b677e7fc87e2c4e
                       12e62c10e982c02da2072c7e8a8be2e8d9f5024a
                       25630abdcd643371356d6fd9e5d4d6bb7913072a
                       acde9df1cf7ba01ad213311449385f4ca6fdc6cb
                       a00601371c7398c8d7e6a83c62a97b9f95ae255f
                       21a35bb64d4d634f936fd6b03ecbc68d0e687f73
                       2f5610d20d93471053030383d5173419edc3088c
                       d061a524b01cbb36ef93c9e6290f7c8679958bf4
                       c88740b68f614557d50b7f278c5d5b9a60c556a3
                       7707a2f6913cc70f0cd90fba7a872603d63f9ed5
                       b3e16a20c0fec759fcdb32600aa72b495096a0b6
                       d8eaea31089639e8dafb7176a6b7a786fb90fc3d
                       0b562d198f9977c75f13f1108ef30b1496798640
                       9c02057edd486f89abcda5d0b6e402fae0660807
                       df2627813a1d966a76d48725dc3d23a1106f1e2f
                       606109342a288b9e7b7fa240f936cb4f5164c9fc
                       d730ff07
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [fe:7c:90:c9:2f:6b:83:e9:34:71:4d:67:86:fd:db:ca:bd:9e:52:56],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-11-28 07:10:49.322  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-28 07:10:49.325 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-28 07:10:49.330 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-28 07:10:49.334 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-28 07:10:49.334  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-28 07:10:49.336  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-28 07:10:49.336  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-28 07:10:49.337 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-28 07:10:49.337 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-28 07:10:49.338 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-28 07:10:49.343 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-28 07:10:49.344 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-28 07:10:49.344 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-28 07:10:49.345 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-28 07:10:49.578  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-28 07:10:49.580  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-28 07:10:49.580 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-28 07:10:49.581 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-28 07:10:49.583  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-28 07:10:49.585  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-28 07:10:49.586 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-28 07:10:49.586 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-28 07:10:49.586 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-28 07:10:49.589 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-28 07:10:49.589 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-28 07:10:49.589 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-28 07:10:49.590 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-28 07:10:49.590 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-28 07:10:49.591 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-28 07:10:49.591 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-28 07:10:49.595 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 543051447905705040191545164155858015808237615077
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Nov 28 05:10:58 UTC 2022
           Final Date: Sat Nov 27 05:10:57 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [34:87:10:bf:69:94:03:a1:44:7b:08:28:e3:df:f8:c1:d9:41:08:a4],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 4fd7b436708070d3495c7888da743ceb901bf96e
                       008e8618608a34edf08e0e108ec9e46fb905eefc
                       3823b1ea64915caef0815ece5b2160af318b53c6
                       47c5439a2a9c7882a0c816367b677e7fc87e2c4e
                       12e62c10e982c02da2072c7e8a8be2e8d9f5024a
                       25630abdcd643371356d6fd9e5d4d6bb7913072a
                       acde9df1cf7ba01ad213311449385f4ca6fdc6cb
                       a00601371c7398c8d7e6a83c62a97b9f95ae255f
                       21a35bb64d4d634f936fd6b03ecbc68d0e687f73
                       2f5610d20d93471053030383d5173419edc3088c
                       d061a524b01cbb36ef93c9e6290f7c8679958bf4
                       c88740b68f614557d50b7f278c5d5b9a60c556a3
                       7707a2f6913cc70f0cd90fba7a872603d63f9ed5
                       b3e16a20c0fec759fcdb32600aa72b495096a0b6
                       d8eaea31089639e8dafb7176a6b7a786fb90fc3d
                       0b562d198f9977c75f13f1108ef30b1496798640
                       9c02057edd486f89abcda5d0b6e402fae0660807
                       df2627813a1d966a76d48725dc3d23a1106f1e2f
                       606109342a288b9e7b7fa240f936cb4f5164c9fc
                       d730ff07
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [51:29:52:8b:c4:0c:ea:2d:04:1f:94:08:20:36:c0:22:82:91:fb:87],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-11-28 07:16:21.457  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-28 07:16:21.460 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-28 07:16:21.462 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-28 07:16:21.463 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-28 07:16:21.464  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-28 07:16:21.464  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-28 07:16:21.465  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-28 07:16:21.465 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-28 07:16:21.465 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-28 07:16:21.466 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-28 07:16:21.470 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-28 07:16:21.471 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-28 07:16:21.471 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-28 07:16:21.471 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-28 07:16:21.652  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-28 07:16:21.653  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-28 07:16:21.653 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-28 07:16:21.654 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-28 07:16:21.655  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-28 07:16:21.656  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-28 07:16:21.656 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-28 07:16:21.657 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-28 07:16:21.657 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-28 07:16:21.669 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-28 07:16:21.669 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-28 07:16:21.670 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-28 07:16:21.671 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-28 07:16:21.672 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-28 07:16:21.672 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-28 07:16:21.673 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-28 07:16:21.677 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 543051447905705040191545164155858015808237615077
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Nov 28 05:10:58 UTC 2022
           Final Date: Sat Nov 27 05:10:57 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [34:87:10:bf:69:94:03:a1:44:7b:08:28:e3:df:f8:c1:d9:41:08:a4],[56:66:d1:a4]
        modulus: c935c3bcb2193d3285f34887fd06fe5a93a02c356295c9d01cdd3f410171cc5e50ca5f0627b90a5739e979e4c2cbb8f45f516f6ead9a18591b85a8c5505f956945837775bda0e241616e734cbc6905552ade2e653e3eeca4f81fc0549d14117fb4db3138b38a3e613898bc2a76f5665f08b33d919ddf10ff39e6b580612d258e5034f758290b28afefc6b38b16330c608f09f750a6c49b51f53a109e06fbdad8379eca2036388d41657a2d8fcfd0bcef1c7042376dcc84ae14e062fa27c117b3bf1ff72333df6b0cdac725a9d44bcdcf1add0c9dbd416cf4e3b3ce0a10bbd6f6f4ed1be2b7f33ffdf6a31d54d9b49ae237db2f82c9bc421a5ea968551d655d17b0ec4298b0a75d54e95ee4400d2a57b9e536d65bf09f14e305b40290d9761911303b64f731ed0490249629484d023a581b41c7a8ff3117e41eac0fae4b2024858c113c78159091fc2ade2e41c4b532d6cd77c85e675cfae50d349666298a6098c457686806cb301c7ff0f215f8c114095d0527eea604d5975a2b70cc7326c871
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 4fd7b436708070d3495c7888da743ceb901bf96e
                       008e8618608a34edf08e0e108ec9e46fb905eefc
                       3823b1ea64915caef0815ece5b2160af318b53c6
                       47c5439a2a9c7882a0c816367b677e7fc87e2c4e
                       12e62c10e982c02da2072c7e8a8be2e8d9f5024a
                       25630abdcd643371356d6fd9e5d4d6bb7913072a
                       acde9df1cf7ba01ad213311449385f4ca6fdc6cb
                       a00601371c7398c8d7e6a83c62a97b9f95ae255f
                       21a35bb64d4d634f936fd6b03ecbc68d0e687f73
                       2f5610d20d93471053030383d5173419edc3088c
                       d061a524b01cbb36ef93c9e6290f7c8679958bf4
                       c88740b68f614557d50b7f278c5d5b9a60c556a3
                       7707a2f6913cc70f0cd90fba7a872603d63f9ed5
                       b3e16a20c0fec759fcdb32600aa72b495096a0b6
                       d8eaea31089639e8dafb7176a6b7a786fb90fc3d
                       0b562d198f9977c75f13f1108ef30b1496798640
                       9c02057edd486f89abcda5d0b6e402fae0660807
                       df2627813a1d966a76d48725dc3d23a1106f1e2f
                       606109342a288b9e7b7fa240f936cb4f5164c9fc
                       d730ff07
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [4c:5d:e1:55:1f:88:44:ec:17:e9:94:40:c7:5a:ad:30:40:3b:c7:fe],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-11-28 07:23:07.768  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-28 07:23:07.772 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-28 07:23:07.782 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-11-28 07:23:07.784 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-28 07:23:07.786  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-11-28 07:23:07.786  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-28 07:23:07.787  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-28 07:23:07.787 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-28 07:23:07.788 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-28 07:23:07.788 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-28 07:23:07.793 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-28 07:23:07.794 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-28 07:23:07.794 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-28 07:23:07.795 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-28 07:23:08.224  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-28 07:23:08.224  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-28 07:23:08.225 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-28 07:23:08.225 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-28 07:23:08.226  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-28 07:23:08.227  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-28 07:23:08.227 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-28 07:23:08.228 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-28 07:23:08.228 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-28 07:23:08.229 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-28 07:23:08.229 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-28 07:23:08.229 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-28 07:23:08.230 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-28 07:23:08.230 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-28 07:23:08.231 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-28 07:23:08.231 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-28 07:23:08.235 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 543051447905705040191545164155858015808237615077
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Nov 28 05:10:58 UTC 2022
           Final Date: Sat Nov 27 05:10:57 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [34:87:10:bf:69:94:03:a1:44:7b:08:28:e3:df:f8:c1:d9:41:08:a4],[56:66:d1:a4]
        modulus: c935c3bcb2193d3285f34887fd06fe5a93a02c356295c9d01cdd3f410171cc5e50ca5f0627b90a5739e979e4c2cbb8f45f516f6ead9a18591b85a8c5505f956945837775bda0e241616e734cbc6905552ade2e653e3eeca4f81fc0549d14117fb4db3138b38a3e613898bc2a76f5665f08b33d919ddf10ff39e6b580612d258e5034f758290b28afefc6b38b16330c608f09f750a6c49b51f53a109e06fbdad8379eca2036388d41657a2d8fcfd0bcef1c7042376dcc84ae14e062fa27c117b3bf1ff72333df6b0cdac725a9d44bcdcf1add0c9dbd416cf4e3b3ce0a10bbd6f6f4ed1be2b7f33ffdf6a31d54d9b49ae237db2f82c9bc421a5ea968551d655d17b0ec4298b0a75d54e95ee4400d2a57b9e536d65bf09f14e305b40290d9761911303b64f731ed0490249629484d023a581b41c7a8ff3117e41eac0fae4b2024858c113c78159091fc2ade2e41c4b532d6cd77c85e675cfae50d349666298a6098c457686806cb301c7ff0f215f8c114095d0527eea604d5975a2b70cc7326c871
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 4fd7b436708070d3495c7888da743ceb901bf96e
                       008e8618608a34edf08e0e108ec9e46fb905eefc
                       3823b1ea64915caef0815ece5b2160af318b53c6
                       47c5439a2a9c7882a0c816367b677e7fc87e2c4e
                       12e62c10e982c02da2072c7e8a8be2e8d9f5024a
                       25630abdcd643371356d6fd9e5d4d6bb7913072a
                       acde9df1cf7ba01ad213311449385f4ca6fdc6cb
                       a00601371c7398c8d7e6a83c62a97b9f95ae255f
                       21a35bb64d4d634f936fd6b03ecbc68d0e687f73
                       2f5610d20d93471053030383d5173419edc3088c
                       d061a524b01cbb36ef93c9e6290f7c8679958bf4
                       c88740b68f614557d50b7f278c5d5b9a60c556a3
                       7707a2f6913cc70f0cd90fba7a872603d63f9ed5
                       b3e16a20c0fec759fcdb32600aa72b495096a0b6
                       d8eaea31089639e8dafb7176a6b7a786fb90fc3d
                       0b562d198f9977c75f13f1108ef30b1496798640
                       9c02057edd486f89abcda5d0b6e402fae0660807
                       df2627813a1d966a76d48725dc3d23a1106f1e2f
                       606109342a288b9e7b7fa240f936cb4f5164c9fc
                       d730ff07
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [f7:9f:93:6d:e4:2d:a3:63:9c:2d:d5:17:73:ec:08:58:a1:ee:0e:60],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-11-28 07:29:42.801  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-28 07:29:42.821 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-28 07:29:42.824 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-11-28 07:29:42.824 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-28 07:29:42.825  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-11-28 07:29:42.826  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-28 07:29:42.826  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-28 07:29:42.827 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-28 07:29:42.827 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-28 07:29:42.827 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-28 07:29:42.832 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-28 07:29:42.833 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-28 07:29:42.833 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-28 07:29:42.833 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-28 07:29:43.201  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-28 07:29:43.202  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-28 07:29:43.202 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-28 07:29:43.203 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-28 07:29:43.204  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-28 07:29:43.205  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-28 07:29:43.205 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-28 07:29:43.206 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-28 07:29:43.206 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-28 07:29:43.207 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-28 07:29:43.207 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-28 07:29:43.208 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-28 07:29:43.209 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-28 07:29:43.209 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-28 07:29:43.209 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-28 07:29:43.210 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-28 07:29:43.214 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 543051447905705040191545164155858015808237615077
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Nov 28 05:10:58 UTC 2022
           Final Date: Sat Nov 27 05:10:57 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [34:87:10:bf:69:94:03:a1:44:7b:08:28:e3:df:f8:c1:d9:41:08:a4],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 4fd7b436708070d3495c7888da743ceb901bf96e
                       008e8618608a34edf08e0e108ec9e46fb905eefc
                       3823b1ea64915caef0815ece5b2160af318b53c6
                       47c5439a2a9c7882a0c816367b677e7fc87e2c4e
                       12e62c10e982c02da2072c7e8a8be2e8d9f5024a
                       25630abdcd643371356d6fd9e5d4d6bb7913072a
                       acde9df1cf7ba01ad213311449385f4ca6fdc6cb
                       a00601371c7398c8d7e6a83c62a97b9f95ae255f
                       21a35bb64d4d634f936fd6b03ecbc68d0e687f73
                       2f5610d20d93471053030383d5173419edc3088c
                       d061a524b01cbb36ef93c9e6290f7c8679958bf4
                       c88740b68f614557d50b7f278c5d5b9a60c556a3
                       7707a2f6913cc70f0cd90fba7a872603d63f9ed5
                       b3e16a20c0fec759fcdb32600aa72b495096a0b6
                       d8eaea31089639e8dafb7176a6b7a786fb90fc3d
                       0b562d198f9977c75f13f1108ef30b1496798640
                       9c02057edd486f89abcda5d0b6e402fae0660807
                       df2627813a1d966a76d48725dc3d23a1106f1e2f
                       606109342a288b9e7b7fa240f936cb4f5164c9fc
                       d730ff07
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [7e:16:97:2c:32:25:bd:ef:75:63:a5:f2:26:be:c9:bd:9e:2f:c5:26],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-11-28 07:30:00.144  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-28 07:30:00.146 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-28 07:30:00.148 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-11-28 07:30:00.149 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-28 07:30:00.149  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-11-28 07:30:00.150  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-28 07:30:00.150  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-28 07:30:00.151 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-28 07:30:00.151 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-28 07:30:00.152 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-28 07:30:00.156 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-28 07:30:00.156 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-28 07:30:00.156 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-28 07:30:00.157 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-28 07:30:00.375  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-28 07:30:00.376  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-28 07:30:00.376 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-28 07:30:00.376 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-28 07:30:00.378  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-28 07:30:00.379  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-28 07:30:00.379 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-28 07:30:00.379 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-28 07:30:00.380 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-28 07:30:00.380 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-28 07:30:00.381 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-28 07:30:00.381 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-28 07:30:00.381 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-28 07:30:00.382 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-28 07:30:00.382 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-28 07:30:00.382 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-28 07:30:00.385 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 543051447905705040191545164155858015808237615077
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Nov 28 05:10:58 UTC 2022
           Final Date: Sat Nov 27 05:10:57 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [34:87:10:bf:69:94:03:a1:44:7b:08:28:e3:df:f8:c1:d9:41:08:a4],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 4fd7b436708070d3495c7888da743ceb901bf96e
                       008e8618608a34edf08e0e108ec9e46fb905eefc
                       3823b1ea64915caef0815ece5b2160af318b53c6
                       47c5439a2a9c7882a0c816367b677e7fc87e2c4e
                       12e62c10e982c02da2072c7e8a8be2e8d9f5024a
                       25630abdcd643371356d6fd9e5d4d6bb7913072a
                       acde9df1cf7ba01ad213311449385f4ca6fdc6cb
                       a00601371c7398c8d7e6a83c62a97b9f95ae255f
                       21a35bb64d4d634f936fd6b03ecbc68d0e687f73
                       2f5610d20d93471053030383d5173419edc3088c
                       d061a524b01cbb36ef93c9e6290f7c8679958bf4
                       c88740b68f614557d50b7f278c5d5b9a60c556a3
                       7707a2f6913cc70f0cd90fba7a872603d63f9ed5
                       b3e16a20c0fec759fcdb32600aa72b495096a0b6
                       d8eaea31089639e8dafb7176a6b7a786fb90fc3d
                       0b562d198f9977c75f13f1108ef30b1496798640
                       9c02057edd486f89abcda5d0b6e402fae0660807
                       df2627813a1d966a76d48725dc3d23a1106f1e2f
                       606109342a288b9e7b7fa240f936cb4f5164c9fc
                       d730ff07
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ac:ba:df:86:e2:2c:44:6f:37:8b:2b:cf:a9:84:2e:90:51:6e:91:16],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-11-28 07:56:25.547  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-28 07:56:25.550 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-28 07:56:25.554 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-11-28 07:56:25.556 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-28 07:56:25.556  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-11-28 07:56:25.557  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-28 07:56:25.558  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-28 07:56:25.558 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-28 07:56:25.559 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-28 07:56:25.560 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-28 07:56:25.565 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-28 07:56:25.567 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-28 07:56:25.567 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-28 07:56:25.567 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-28 07:56:25.734  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-28 07:56:25.735  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-28 07:56:25.735 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-28 07:56:25.736 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-28 07:56:25.737  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-28 07:56:25.738  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-28 07:56:25.738 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-28 07:56:25.739 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-28 07:56:25.739 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-28 07:56:25.740 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-28 07:56:25.741 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-28 07:56:25.741 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-28 07:56:25.742 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-28 07:56:25.743 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-28 07:56:25.743 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-28 07:56:25.744 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-28 07:56:25.747 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 543051447905705040191545164155858015808237615077
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Nov 28 05:10:58 UTC 2022
           Final Date: Sat Nov 27 05:10:57 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [34:87:10:bf:69:94:03:a1:44:7b:08:28:e3:df:f8:c1:d9:41:08:a4],[56:66:d1:a4]
        modulus: c935c3bcb2193d3285f34887fd06fe5a93a02c356295c9d01cdd3f410171cc5e50ca5f0627b90a5739e979e4c2cbb8f45f516f6ead9a18591b85a8c5505f956945837775bda0e241616e734cbc6905552ade2e653e3eeca4f81fc0549d14117fb4db3138b38a3e613898bc2a76f5665f08b33d919ddf10ff39e6b580612d258e5034f758290b28afefc6b38b16330c608f09f750a6c49b51f53a109e06fbdad8379eca2036388d41657a2d8fcfd0bcef1c7042376dcc84ae14e062fa27c117b3bf1ff72333df6b0cdac725a9d44bcdcf1add0c9dbd416cf4e3b3ce0a10bbd6f6f4ed1be2b7f33ffdf6a31d54d9b49ae237db2f82c9bc421a5ea968551d655d17b0ec4298b0a75d54e95ee4400d2a57b9e536d65bf09f14e305b40290d9761911303b64f731ed0490249629484d023a581b41c7a8ff3117e41eac0fae4b2024858c113c78159091fc2ade2e41c4b532d6cd77c85e675cfae50d349666298a6098c457686806cb301c7ff0f215f8c114095d0527eea604d5975a2b70cc7326c871
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 4fd7b436708070d3495c7888da743ceb901bf96e
                       008e8618608a34edf08e0e108ec9e46fb905eefc
                       3823b1ea64915caef0815ece5b2160af318b53c6
                       47c5439a2a9c7882a0c816367b677e7fc87e2c4e
                       12e62c10e982c02da2072c7e8a8be2e8d9f5024a
                       25630abdcd643371356d6fd9e5d4d6bb7913072a
                       acde9df1cf7ba01ad213311449385f4ca6fdc6cb
                       a00601371c7398c8d7e6a83c62a97b9f95ae255f
                       21a35bb64d4d634f936fd6b03ecbc68d0e687f73
                       2f5610d20d93471053030383d5173419edc3088c
                       d061a524b01cbb36ef93c9e6290f7c8679958bf4
                       c88740b68f614557d50b7f278c5d5b9a60c556a3
                       7707a2f6913cc70f0cd90fba7a872603d63f9ed5
                       b3e16a20c0fec759fcdb32600aa72b495096a0b6
                       d8eaea31089639e8dafb7176a6b7a786fb90fc3d
                       0b562d198f9977c75f13f1108ef30b1496798640
                       9c02057edd486f89abcda5d0b6e402fae0660807
                       df2627813a1d966a76d48725dc3d23a1106f1e2f
                       606109342a288b9e7b7fa240f936cb4f5164c9fc
                       d730ff07
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [96:65:95:38:01:24:c7:0a:cb:d7:e0:ae:b7:f4:92:fe:86:06:9b:eb],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-11-28 07:56:30.609  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-28 07:56:30.610 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-28 07:56:30.613 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-11-28 07:56:30.614 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-28 07:56:30.614  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-11-28 07:56:30.615  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-28 07:56:30.615  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-28 07:56:30.616 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-28 07:56:30.616 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-28 07:56:30.617 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-28 07:56:30.620 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-28 07:56:30.621 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-28 07:56:30.621 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-28 07:56:30.622 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-28 07:56:30.853  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-28 07:56:30.854  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-28 07:56:30.855 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-28 07:56:30.855 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-28 07:56:30.857  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-28 07:56:30.857  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-28 07:56:30.858 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-28 07:56:30.858 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-28 07:56:30.858 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-28 07:56:30.859 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-28 07:56:30.860 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-28 07:56:30.860 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-28 07:56:30.861 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-28 07:56:30.862 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-28 07:56:30.862 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-28 07:56:30.863 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-28 07:56:30.867 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 543051447905705040191545164155858015808237615077
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Nov 28 05:10:58 UTC 2022
           Final Date: Sat Nov 27 05:10:57 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [34:87:10:bf:69:94:03:a1:44:7b:08:28:e3:df:f8:c1:d9:41:08:a4],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 4fd7b436708070d3495c7888da743ceb901bf96e
                       008e8618608a34edf08e0e108ec9e46fb905eefc
                       3823b1ea64915caef0815ece5b2160af318b53c6
                       47c5439a2a9c7882a0c816367b677e7fc87e2c4e
                       12e62c10e982c02da2072c7e8a8be2e8d9f5024a
                       25630abdcd643371356d6fd9e5d4d6bb7913072a
                       acde9df1cf7ba01ad213311449385f4ca6fdc6cb
                       a00601371c7398c8d7e6a83c62a97b9f95ae255f
                       21a35bb64d4d634f936fd6b03ecbc68d0e687f73
                       2f5610d20d93471053030383d5173419edc3088c
                       d061a524b01cbb36ef93c9e6290f7c8679958bf4
                       c88740b68f614557d50b7f278c5d5b9a60c556a3
                       7707a2f6913cc70f0cd90fba7a872603d63f9ed5
                       b3e16a20c0fec759fcdb32600aa72b495096a0b6
                       d8eaea31089639e8dafb7176a6b7a786fb90fc3d
                       0b562d198f9977c75f13f1108ef30b1496798640
                       9c02057edd486f89abcda5d0b6e402fae0660807
                       df2627813a1d966a76d48725dc3d23a1106f1e2f
                       606109342a288b9e7b7fa240f936cb4f5164c9fc
                       d730ff07
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [4b:b1:75:2e:7e:6c:d3:79:de:09:fb:97:ca:25:2c:94:4f:90:05:93],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

]