Results

By type

          2022-12-03 05:30:15,389 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-12-03 05:30:17,634 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-12-03 05:30:18.751  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Dec 03, 2022 5:30:22 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Dec 03, 2022 5:30:22 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Dec 03, 2022 5:30:22 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Dec 03, 2022 5:30:22 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-12-03 05:30:23.591 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-12-03 05:30:24.037  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-12-03 05:30:24.287  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-12-03 05:30:25.592 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-12-03 05:30:25.598 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
2022-12-03 05:30:25.602 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-12-03 05:30:25.611 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-12-03 05:30:25.669 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2022-12-03 05:30:25.675 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/docs]}: redirectToUi(HttpServletRequest)
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
2022-12-03 05:30:25.902 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-12-03 05:30:26.864 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Dec 03, 2022 5:30:28 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-12-03 05:30:28.773  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 14.996 seconds (JVM running for 47.069)
Dec 03, 2022 5:30:38 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-12-03 06:49:03.179  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-03 06:49:03.198 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-03 06:49:03.312 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-12-03 06:49:03.319 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-03 06:49:03.410  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-12-03 06:49:03.417  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-03 06:49:03.418  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-03 06:49:03.420 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-03 06:49:03.421 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-03 06:49:03.429 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-03 06:49:03.449 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-03 06:49:03.455 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-03 06:49:03.848 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-03 06:49:03.856 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-03 06:49:03.857 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-03 06:49:03.861 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-03 06:49:04.583  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-03 06:49:04.586  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-03 06:49:04.587 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-03 06:49:04.589 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-03 06:49:04.600  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-03 06:49:04.601  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-03 06:49:04.602 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-03 06:49:04.602 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-03 06:49:04.603 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-03 06:49:04.650 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-03 06:49:04.651 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-03 06:49:04.651 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-03 06:49:04.663 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-03 06:49:04.664 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-03 06:49:04.665 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-03 06:49:04.667 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-03 06:49:04.724 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 597377261201910797745788437809442381539148733766
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Dec 03 05:11:15 UTC 2022
           Final Date: Thu Dec 02 05:11:14 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [bf:82:94:a4:03:48:3b:45:68:62:6a:6c:5d:8f:b2:c3:f5:cb:85:ed],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 008179ec1b1392aac4ff268cea1b53223e4fe11f
                       09248bc1a41b8483de482f377b39784cddd09f81
                       4dd069f9056a1a3ae9bfa3a49be521e6a143601f
                       e671f6df2f587cc32bc38fd4a50970de5afc27f2
                       242d3b3b5c901fcdf18a51fd16d8dfbe3a97245a
                       608b9c6f1b23f258fc46c5594772ae235be402b1
                       7c680e7e6d6b64af3bfdad6a717f6259e1274910
                       d858be7c87c90a4b355676d335471ffa6961c3ae
                       e8060d11f967c563c67161e3eaed1fd68c168dc7
                       acbfd7cfbe4d958dc1882967916c8d095778858e
                       2e7a044f14811b3b19542eeeea6acef692409b93
                       9df80ad5175b19af639772b5a3d987d9125bd672
                       ad14b38701674bc94e0cd43212e91bc347b8d4f6
                       7e5ed667068294463ac6d0ab771857806db6d0b9
                       925e26410cd43826e0ba0a9e06cbab686c6f2507
                       84753ea5ce4f66061ec0eb74ad4f1b419d78f0b7
                       43c38c7e4d8271993d0038f56a44437a87f500d2
                       6b33ae595b053a02921b7b842815c445ac2cb50e
                       e057c25bb35acc320bf5bae748f1a86f49b6b85c
                       655b0dcc
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [d9:c3:72:31:9e:bb:fd:1e:e2:cd:ef:82:67:d6:9a:bd:38:8c:54:c8],[56:66:d1:a4]
        modulus: b493aaa0eeef4ca7e13a3d364290db291aafcc739c1359083eff39c54257e9f9b77a920a342eca0c3018fef7851c80a1e8c6efdc69b5ae737e3012e08d68cc560af9e8a0af9017827408099bfdc6de1e6b1d9e12e7a2b2f63145376fe66557bd0b6a5f00dbd178f1d737cb86fab7260575fc665c82cd5d8d3909f4b72984c872acb4d1e68df56b45de679cbe8d7d9c125525871c6bbe6074286e8b06176426720ed955268da3cc253d67d9dd940783ba23d9724e0284ecf870457ab8323f9223f493bf27a8da8c350b907386ab62a6dd04442794291611ad6bf7cd40fedde1039e7fa7a83b1f9c54f2118f0c70fbf21bd3355e4fcf60c02978a68893ed88a057
public exponent: 10001

] 
2022-12-03 06:50:50.428  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-03 06:50:50.430 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-03 06:50:50.439 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-12-03 06:50:50.440 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-03 06:50:50.441  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-12-03 06:50:50.442  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-03 06:50:50.443  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-03 06:50:50.443 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-03 06:50:50.444 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-03 06:50:50.444 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-03 06:50:50.454 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-03 06:50:50.455 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-03 06:50:50.456 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-03 06:50:50.458 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-03 06:50:50.705  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-03 06:50:50.707  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-03 06:50:50.708 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-03 06:50:50.709 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-03 06:50:50.713  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-03 06:50:50.714  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-03 06:50:50.715 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-03 06:50:50.715 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-03 06:50:50.716 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-03 06:50:50.717 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-03 06:50:50.718 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-03 06:50:50.718 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-03 06:50:50.719 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-03 06:50:50.720 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-03 06:50:50.720 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-03 06:50:50.722 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-03 06:50:50.728 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 597377261201910797745788437809442381539148733766
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Dec 03 05:11:15 UTC 2022
           Final Date: Thu Dec 02 05:11:14 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [bf:82:94:a4:03:48:3b:45:68:62:6a:6c:5d:8f:b2:c3:f5:cb:85:ed],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 008179ec1b1392aac4ff268cea1b53223e4fe11f
                       09248bc1a41b8483de482f377b39784cddd09f81
                       4dd069f9056a1a3ae9bfa3a49be521e6a143601f
                       e671f6df2f587cc32bc38fd4a50970de5afc27f2
                       242d3b3b5c901fcdf18a51fd16d8dfbe3a97245a
                       608b9c6f1b23f258fc46c5594772ae235be402b1
                       7c680e7e6d6b64af3bfdad6a717f6259e1274910
                       d858be7c87c90a4b355676d335471ffa6961c3ae
                       e8060d11f967c563c67161e3eaed1fd68c168dc7
                       acbfd7cfbe4d958dc1882967916c8d095778858e
                       2e7a044f14811b3b19542eeeea6acef692409b93
                       9df80ad5175b19af639772b5a3d987d9125bd672
                       ad14b38701674bc94e0cd43212e91bc347b8d4f6
                       7e5ed667068294463ac6d0ab771857806db6d0b9
                       925e26410cd43826e0ba0a9e06cbab686c6f2507
                       84753ea5ce4f66061ec0eb74ad4f1b419d78f0b7
                       43c38c7e4d8271993d0038f56a44437a87f500d2
                       6b33ae595b053a02921b7b842815c445ac2cb50e
                       e057c25bb35acc320bf5bae748f1a86f49b6b85c
                       655b0dcc
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [d7:00:df:e5:6a:94:a1:3c:2a:76:91:0b:ad:5c:41:6d:83:2f:cb:09],[56:66:d1:a4]
        modulus: 9f9ec2ec7e17ee049ebb3f2b0f547489e883bac75d3cb28495374d7121e7ffba773b02c76944270c8aeff9df0a663e71b9fcd69683da0a87d5a212362dc2183797e279c0a37aa2fe66eb48b54a80126a0e34a12a0dd34dd2a32088e0b0822637d2d593d20d86c34268a730afdcbd7c7e3ed7fdee37b5091353ed4913ba30918f3fc88d79f76a44e1b75bfca398b38da888e55417514f00f0e8167da90a8ae54a8c3f4fb2b2ce9f277f3e4ee792540cd2d2048b2583ff01d24343e5f247f4c41260722d418ea404f3ef12f6ecbcac1fb7ff1aeeb1bd5eccbd63b88d70da8f6501e2ee115b4ea9614b15ba573543450414b6a4fc60af1173749f28266e024288c7
public exponent: 10001

] 
2022-12-03 06:53:06.419  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-03 06:53:06.422 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-03 06:53:06.424 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-12-03 06:53:06.425 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-03 06:53:06.426  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-12-03 06:53:06.428  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-03 06:53:06.429  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-03 06:53:06.430 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-03 06:53:06.437 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-03 06:53:06.440 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-03 06:53:06.445 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-03 06:53:06.446 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-03 06:53:06.446 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-03 06:53:06.447 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-03 06:53:06.812  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-03 06:53:06.813  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-03 06:53:06.817 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-03 06:53:06.817 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-03 06:53:06.820  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-03 06:53:06.822  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-03 06:53:06.823 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-03 06:53:06.824 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-03 06:53:06.824 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-03 06:53:06.826 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-03 06:53:06.826 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-03 06:53:06.827 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-03 06:53:06.828 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-03 06:53:06.828 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-03 06:53:06.829 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-03 06:53:06.830 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-03 06:53:06.835 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 597377261201910797745788437809442381539148733766
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Dec 03 05:11:15 UTC 2022
           Final Date: Thu Dec 02 05:11:14 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [bf:82:94:a4:03:48:3b:45:68:62:6a:6c:5d:8f:b2:c3:f5:cb:85:ed],[56:66:d1:a4]
        modulus: f8c0149590b921db924582c60ea1fe37828e98259155390f3293c132d7707dcf8ca0f1730fb1e0e1c2fe2495b28106ccf08922d4d64e88c97f6d5df6acf9a13cc99968d9cadf60afad18c33166d27d5cf4177b4782efadefa032b6a3461825c964bbf5efde14df59e3bb0dc9ffd62c60bc58a8df2c3eb9e39229a3809e1f7616f7aa794fe0823f356a5ed70a23eb482f542d8f755a1582b46c4f38f051ffe44e138a63d98d2a7081e1cb4f6a26acab5b29e7c4467d52da102549c50fe48ab0dde7e68215eac2ea7b48e55f684ac997830bcd0c268cd29f9729077151da335d7e970ab528a4ca1908d0e0522ada6567c1b1ed5871cc85bc684426124f61e3794ec8dbc230c35d2d88ab9158bc5be88d5f5c9e11902dfbc5ad15a8c69682eca72e2772eca8c075b281c00dc3026106b13b88d22306e2a1c612aa7b3e22177331f786e0e42d3882621ac20514596d86653914f463ac424916d9bcccf017dfdbd06f7fc31ab82071cac3bf4584f96bbc13aa58d30e7b56287e292bacf35bfe570f53
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 008179ec1b1392aac4ff268cea1b53223e4fe11f
                       09248bc1a41b8483de482f377b39784cddd09f81
                       4dd069f9056a1a3ae9bfa3a49be521e6a143601f
                       e671f6df2f587cc32bc38fd4a50970de5afc27f2
                       242d3b3b5c901fcdf18a51fd16d8dfbe3a97245a
                       608b9c6f1b23f258fc46c5594772ae235be402b1
                       7c680e7e6d6b64af3bfdad6a717f6259e1274910
                       d858be7c87c90a4b355676d335471ffa6961c3ae
                       e8060d11f967c563c67161e3eaed1fd68c168dc7
                       acbfd7cfbe4d958dc1882967916c8d095778858e
                       2e7a044f14811b3b19542eeeea6acef692409b93
                       9df80ad5175b19af639772b5a3d987d9125bd672
                       ad14b38701674bc94e0cd43212e91bc347b8d4f6
                       7e5ed667068294463ac6d0ab771857806db6d0b9
                       925e26410cd43826e0ba0a9e06cbab686c6f2507
                       84753ea5ce4f66061ec0eb74ad4f1b419d78f0b7
                       43c38c7e4d8271993d0038f56a44437a87f500d2
                       6b33ae595b053a02921b7b842815c445ac2cb50e
                       e057c25bb35acc320bf5bae748f1a86f49b6b85c
                       655b0dcc
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [e3:a0:e1:a5:63:97:39:60:e8:50:32:4b:0a:a6:f4:52:ad:80:cb:ab],[56:66:d1:a4]
        modulus: c0f4b8ddd748f29da9b08583ef961f6055e1da48c550795e48a383fccc11161bbf42c6ad01d62bc4ff77b11e7f0492d5d3e4404cf4d85cc91589a5edda6ed421fce28214f974f96e60e029b8ae2ebba1229082baa43c143d48d7006ad84b11bedce029abc033f73466bb1a41c0baf2fb40dd66c5615c83f03c85c42898ab78d61d9b1eb4bdf78d1941b505180636378909b39ca24a476a999d9945864b5aaecbcbaaacddbb84d4110e48b9cf4d8167eea4fae02e8b740c13c258636b1b034b7545359fd17d1b87f3469d8f317fc8eed6d69f427c3606726351929291ad0b1fa41446f1c5c2049f592e33267c8a2a16df288983464f9ae866baeeb24fbad19c1d
public exponent: 10001

] 
2022-12-03 06:56:00.816  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-03 06:56:00.819 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-03 06:56:00.822 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-12-03 06:56:00.822 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-03 06:56:00.823  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-12-03 06:56:00.824  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-03 06:56:00.824  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-03 06:56:00.825 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-03 06:56:00.825 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-03 06:56:00.826 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-03 06:56:00.832 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-03 06:56:00.833 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-03 06:56:00.834 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-03 06:56:00.834 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-03 06:56:01.100  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-03 06:56:01.101  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-03 06:56:01.101 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-03 06:56:01.102 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-03 06:56:01.104  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-03 06:56:01.104  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-03 06:56:01.105 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-03 06:56:01.106 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-03 06:56:01.107 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-03 06:56:01.108 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-03 06:56:01.109 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-03 06:56:01.109 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-03 06:56:01.111 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-03 06:56:01.111 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-03 06:56:01.112 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-03 06:56:01.113 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-03 06:56:01.120 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 597377261201910797745788437809442381539148733766
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Dec 03 05:11:15 UTC 2022
           Final Date: Thu Dec 02 05:11:14 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [bf:82:94:a4:03:48:3b:45:68:62:6a:6c:5d:8f:b2:c3:f5:cb:85:ed],[56:66:d1:a4]
        modulus: f8c0149590b921db924582c60ea1fe37828e98259155390f3293c132d7707dcf8ca0f1730fb1e0e1c2fe2495b28106ccf08922d4d64e88c97f6d5df6acf9a13cc99968d9cadf60afad18c33166d27d5cf4177b4782efadefa032b6a3461825c964bbf5efde14df59e3bb0dc9ffd62c60bc58a8df2c3eb9e39229a3809e1f7616f7aa794fe0823f356a5ed70a23eb482f542d8f755a1582b46c4f38f051ffe44e138a63d98d2a7081e1cb4f6a26acab5b29e7c4467d52da102549c50fe48ab0dde7e68215eac2ea7b48e55f684ac997830bcd0c268cd29f9729077151da335d7e970ab528a4ca1908d0e0522ada6567c1b1ed5871cc85bc684426124f61e3794ec8dbc230c35d2d88ab9158bc5be88d5f5c9e11902dfbc5ad15a8c69682eca72e2772eca8c075b281c00dc3026106b13b88d22306e2a1c612aa7b3e22177331f786e0e42d3882621ac20514596d86653914f463ac424916d9bcccf017dfdbd06f7fc31ab82071cac3bf4584f96bbc13aa58d30e7b56287e292bacf35bfe570f53
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 008179ec1b1392aac4ff268cea1b53223e4fe11f
                       09248bc1a41b8483de482f377b39784cddd09f81
                       4dd069f9056a1a3ae9bfa3a49be521e6a143601f
                       e671f6df2f587cc32bc38fd4a50970de5afc27f2
                       242d3b3b5c901fcdf18a51fd16d8dfbe3a97245a
                       608b9c6f1b23f258fc46c5594772ae235be402b1
                       7c680e7e6d6b64af3bfdad6a717f6259e1274910
                       d858be7c87c90a4b355676d335471ffa6961c3ae
                       e8060d11f967c563c67161e3eaed1fd68c168dc7
                       acbfd7cfbe4d958dc1882967916c8d095778858e
                       2e7a044f14811b3b19542eeeea6acef692409b93
                       9df80ad5175b19af639772b5a3d987d9125bd672
                       ad14b38701674bc94e0cd43212e91bc347b8d4f6
                       7e5ed667068294463ac6d0ab771857806db6d0b9
                       925e26410cd43826e0ba0a9e06cbab686c6f2507
                       84753ea5ce4f66061ec0eb74ad4f1b419d78f0b7
                       43c38c7e4d8271993d0038f56a44437a87f500d2
                       6b33ae595b053a02921b7b842815c445ac2cb50e
                       e057c25bb35acc320bf5bae748f1a86f49b6b85c
                       655b0dcc
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [67:da:ba:e2:98:ad:3d:ee:11:57:e4:1a:c1:3d:3d:55:e0:5a:8e:07],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-12-03 07:03:16.375  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-03 07:03:16.379 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-03 07:03:16.382 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-12-03 07:03:16.384 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-03 07:03:16.385  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-12-03 07:03:16.386  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-03 07:03:16.395  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-03 07:03:16.398 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-03 07:03:16.400 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-03 07:03:16.401 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-03 07:03:16.412 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-03 07:03:16.414 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-03 07:03:16.414 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-03 07:03:16.414 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-03 07:03:16.722  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-03 07:03:16.723  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-03 07:03:16.724 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-03 07:03:16.724 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-03 07:03:16.725  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-03 07:03:16.726  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-03 07:03:16.736 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-03 07:03:16.737 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-03 07:03:16.737 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-03 07:03:16.747 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-03 07:03:16.748 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-03 07:03:16.748 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-03 07:03:16.749 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-03 07:03:16.750 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-03 07:03:16.751 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-03 07:03:16.752 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-03 07:03:16.757 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 597377261201910797745788437809442381539148733766
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Dec 03 05:11:15 UTC 2022
           Final Date: Thu Dec 02 05:11:14 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [bf:82:94:a4:03:48:3b:45:68:62:6a:6c:5d:8f:b2:c3:f5:cb:85:ed],[56:66:d1:a4]
        modulus: f8c0149590b921db924582c60ea1fe37828e98259155390f3293c132d7707dcf8ca0f1730fb1e0e1c2fe2495b28106ccf08922d4d64e88c97f6d5df6acf9a13cc99968d9cadf60afad18c33166d27d5cf4177b4782efadefa032b6a3461825c964bbf5efde14df59e3bb0dc9ffd62c60bc58a8df2c3eb9e39229a3809e1f7616f7aa794fe0823f356a5ed70a23eb482f542d8f755a1582b46c4f38f051ffe44e138a63d98d2a7081e1cb4f6a26acab5b29e7c4467d52da102549c50fe48ab0dde7e68215eac2ea7b48e55f684ac997830bcd0c268cd29f9729077151da335d7e970ab528a4ca1908d0e0522ada6567c1b1ed5871cc85bc684426124f61e3794ec8dbc230c35d2d88ab9158bc5be88d5f5c9e11902dfbc5ad15a8c69682eca72e2772eca8c075b281c00dc3026106b13b88d22306e2a1c612aa7b3e22177331f786e0e42d3882621ac20514596d86653914f463ac424916d9bcccf017dfdbd06f7fc31ab82071cac3bf4584f96bbc13aa58d30e7b56287e292bacf35bfe570f53
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 008179ec1b1392aac4ff268cea1b53223e4fe11f
                       09248bc1a41b8483de482f377b39784cddd09f81
                       4dd069f9056a1a3ae9bfa3a49be521e6a143601f
                       e671f6df2f587cc32bc38fd4a50970de5afc27f2
                       242d3b3b5c901fcdf18a51fd16d8dfbe3a97245a
                       608b9c6f1b23f258fc46c5594772ae235be402b1
                       7c680e7e6d6b64af3bfdad6a717f6259e1274910
                       d858be7c87c90a4b355676d335471ffa6961c3ae
                       e8060d11f967c563c67161e3eaed1fd68c168dc7
                       acbfd7cfbe4d958dc1882967916c8d095778858e
                       2e7a044f14811b3b19542eeeea6acef692409b93
                       9df80ad5175b19af639772b5a3d987d9125bd672
                       ad14b38701674bc94e0cd43212e91bc347b8d4f6
                       7e5ed667068294463ac6d0ab771857806db6d0b9
                       925e26410cd43826e0ba0a9e06cbab686c6f2507
                       84753ea5ce4f66061ec0eb74ad4f1b419d78f0b7
                       43c38c7e4d8271993d0038f56a44437a87f500d2
                       6b33ae595b053a02921b7b842815c445ac2cb50e
                       e057c25bb35acc320bf5bae748f1a86f49b6b85c
                       655b0dcc
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [d9:f4:51:bf:e0:5e:8c:fd:67:cb:27:84:09:f1:e5:57:37:93:3c:6e],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-12-03 07:09:08.126  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-03 07:09:08.129 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-03 07:09:08.131 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-12-03 07:09:08.132 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-03 07:09:08.141  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-12-03 07:09:08.143  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-03 07:09:08.155  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-03 07:09:08.156 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-03 07:09:08.156 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-03 07:09:08.157 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-03 07:09:08.184 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-03 07:09:08.189 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-03 07:09:08.189 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-03 07:09:08.190 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-03 07:09:08.412  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-03 07:09:08.413  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-03 07:09:08.413 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-03 07:09:08.414 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-03 07:09:08.416  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-03 07:09:08.416  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-03 07:09:08.416 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-03 07:09:08.417 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-03 07:09:08.417 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-03 07:09:08.418 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-03 07:09:08.418 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-03 07:09:08.418 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-03 07:09:08.419 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-03 07:09:08.420 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-03 07:09:08.420 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-03 07:09:08.421 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-03 07:09:08.425 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 597377261201910797745788437809442381539148733766
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Dec 03 05:11:15 UTC 2022
           Final Date: Thu Dec 02 05:11:14 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [bf:82:94:a4:03:48:3b:45:68:62:6a:6c:5d:8f:b2:c3:f5:cb:85:ed],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 008179ec1b1392aac4ff268cea1b53223e4fe11f
                       09248bc1a41b8483de482f377b39784cddd09f81
                       4dd069f9056a1a3ae9bfa3a49be521e6a143601f
                       e671f6df2f587cc32bc38fd4a50970de5afc27f2
                       242d3b3b5c901fcdf18a51fd16d8dfbe3a97245a
                       608b9c6f1b23f258fc46c5594772ae235be402b1
                       7c680e7e6d6b64af3bfdad6a717f6259e1274910
                       d858be7c87c90a4b355676d335471ffa6961c3ae
                       e8060d11f967c563c67161e3eaed1fd68c168dc7
                       acbfd7cfbe4d958dc1882967916c8d095778858e
                       2e7a044f14811b3b19542eeeea6acef692409b93
                       9df80ad5175b19af639772b5a3d987d9125bd672
                       ad14b38701674bc94e0cd43212e91bc347b8d4f6
                       7e5ed667068294463ac6d0ab771857806db6d0b9
                       925e26410cd43826e0ba0a9e06cbab686c6f2507
                       84753ea5ce4f66061ec0eb74ad4f1b419d78f0b7
                       43c38c7e4d8271993d0038f56a44437a87f500d2
                       6b33ae595b053a02921b7b842815c445ac2cb50e
                       e057c25bb35acc320bf5bae748f1a86f49b6b85c
                       655b0dcc
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [7f:47:ae:cc:ab:2f:69:29:2b:79:39:9d:28:73:01:9d:2f:87:73:10],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-12-03 07:15:42.473  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-03 07:15:42.478 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-03 07:15:42.483 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-12-03 07:15:42.484 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-03 07:15:42.488  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-12-03 07:15:42.489  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-03 07:15:42.490  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-03 07:15:42.498 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-03 07:15:42.499 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-03 07:15:42.499 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-03 07:15:42.511 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-03 07:15:42.513 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-03 07:15:42.514 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-03 07:15:42.516 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-03 07:15:42.800  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-03 07:15:42.801  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-03 07:15:42.802 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-03 07:15:42.802 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-03 07:15:42.805  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-03 07:15:42.810  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-03 07:15:42.811 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-03 07:15:42.812 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-03 07:15:42.813 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-03 07:15:42.816 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-03 07:15:42.818 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-03 07:15:42.844 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-03 07:15:42.852 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-03 07:15:42.853 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-03 07:15:42.853 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-03 07:15:42.854 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-03 07:15:42.860 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 597377261201910797745788437809442381539148733766
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Dec 03 05:11:15 UTC 2022
           Final Date: Thu Dec 02 05:11:14 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [bf:82:94:a4:03:48:3b:45:68:62:6a:6c:5d:8f:b2:c3:f5:cb:85:ed],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 008179ec1b1392aac4ff268cea1b53223e4fe11f
                       09248bc1a41b8483de482f377b39784cddd09f81
                       4dd069f9056a1a3ae9bfa3a49be521e6a143601f
                       e671f6df2f587cc32bc38fd4a50970de5afc27f2
                       242d3b3b5c901fcdf18a51fd16d8dfbe3a97245a
                       608b9c6f1b23f258fc46c5594772ae235be402b1
                       7c680e7e6d6b64af3bfdad6a717f6259e1274910
                       d858be7c87c90a4b355676d335471ffa6961c3ae
                       e8060d11f967c563c67161e3eaed1fd68c168dc7
                       acbfd7cfbe4d958dc1882967916c8d095778858e
                       2e7a044f14811b3b19542eeeea6acef692409b93
                       9df80ad5175b19af639772b5a3d987d9125bd672
                       ad14b38701674bc94e0cd43212e91bc347b8d4f6
                       7e5ed667068294463ac6d0ab771857806db6d0b9
                       925e26410cd43826e0ba0a9e06cbab686c6f2507
                       84753ea5ce4f66061ec0eb74ad4f1b419d78f0b7
                       43c38c7e4d8271993d0038f56a44437a87f500d2
                       6b33ae595b053a02921b7b842815c445ac2cb50e
                       e057c25bb35acc320bf5bae748f1a86f49b6b85c
                       655b0dcc
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [03:b9:a1:a1:f3:01:97:0e:1c:da:d4:2a:8a:ed:10:c7:4e:ad:8d:ec],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-12-03 07:21:34.072  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-03 07:21:34.076 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-03 07:21:34.082 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-12-03 07:21:34.087 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-03 07:21:34.088  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-12-03 07:21:34.089  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-03 07:21:34.089  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-03 07:21:34.090 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-03 07:21:34.092 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-03 07:21:34.093 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-03 07:21:34.101 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-03 07:21:34.104 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-03 07:21:34.105 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-03 07:21:34.105 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-03 07:21:34.333  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-03 07:21:34.336  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-03 07:21:34.336 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-03 07:21:34.337 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-03 07:21:34.340  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-03 07:21:34.341  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-03 07:21:34.342 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-03 07:21:34.343 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-03 07:21:34.347 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-03 07:21:34.357 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-03 07:21:34.359 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-03 07:21:34.360 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-03 07:21:34.360 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-03 07:21:34.361 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-03 07:21:34.361 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-03 07:21:34.366 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-03 07:21:34.378 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 597377261201910797745788437809442381539148733766
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Dec 03 05:11:15 UTC 2022
           Final Date: Thu Dec 02 05:11:14 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [bf:82:94:a4:03:48:3b:45:68:62:6a:6c:5d:8f:b2:c3:f5:cb:85:ed],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 008179ec1b1392aac4ff268cea1b53223e4fe11f
                       09248bc1a41b8483de482f377b39784cddd09f81
                       4dd069f9056a1a3ae9bfa3a49be521e6a143601f
                       e671f6df2f587cc32bc38fd4a50970de5afc27f2
                       242d3b3b5c901fcdf18a51fd16d8dfbe3a97245a
                       608b9c6f1b23f258fc46c5594772ae235be402b1
                       7c680e7e6d6b64af3bfdad6a717f6259e1274910
                       d858be7c87c90a4b355676d335471ffa6961c3ae
                       e8060d11f967c563c67161e3eaed1fd68c168dc7
                       acbfd7cfbe4d958dc1882967916c8d095778858e
                       2e7a044f14811b3b19542eeeea6acef692409b93
                       9df80ad5175b19af639772b5a3d987d9125bd672
                       ad14b38701674bc94e0cd43212e91bc347b8d4f6
                       7e5ed667068294463ac6d0ab771857806db6d0b9
                       925e26410cd43826e0ba0a9e06cbab686c6f2507
                       84753ea5ce4f66061ec0eb74ad4f1b419d78f0b7
                       43c38c7e4d8271993d0038f56a44437a87f500d2
                       6b33ae595b053a02921b7b842815c445ac2cb50e
                       e057c25bb35acc320bf5bae748f1a86f49b6b85c
                       655b0dcc
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [8b:d8:80:b3:61:d3:18:dc:8b:b5:55:11:5f:31:e8:70:ba:af:20:43],[56:66:d1:a4]
        modulus: b7bc5d11be71bc68495f5ab04e3f846346de693aa51cf3920c33eb37f6753a05910c8266689b4e6784e9c9ca1a7cbd258893275033cc05608e0ba66d059cba34283716ee72c15d1e8a410b7625ea7b616d00befe6149d1d12a6a66409468f88a3bd1b6c3587bdae42bed594bd48a3db424816a1ec7838dd08ec5dce55c7d286503e025ae9a50db4a776031c2dcb2ecd51167f41e1e6b3c35cba5f5f78082382bab3be09de57ce928a64754ed9e0273d148c155ca6bc5d0fdba328ca4507a6860b707a084d99c36dd84a4fbb8339acfe445f9dd74e26ade0e7f3840038bdbdd105cbc1999f00d60803f2110547983977e992b2b3d8e3935ddae2446b9c24ab70b
public exponent: 10001

] 
2022-12-03 07:27:54.539  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-03 07:27:54.544 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-03 07:27:54.549 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-12-03 07:27:54.551 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-03 07:27:54.553  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-12-03 07:27:54.554  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-03 07:27:54.556  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-03 07:27:54.557 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-03 07:27:54.558 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-03 07:27:54.559 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-03 07:27:54.566 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-03 07:27:54.568 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-03 07:27:54.568 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-03 07:27:54.569 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-03 07:27:54.803  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-03 07:27:54.805  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-03 07:27:54.805 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-03 07:27:54.806 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-03 07:27:54.808  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-03 07:27:54.808  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-03 07:27:54.809 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-03 07:27:54.809 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-03 07:27:54.810 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-03 07:27:54.811 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-03 07:27:54.811 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-03 07:27:54.812 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-03 07:27:54.812 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-03 07:27:54.813 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-03 07:27:54.813 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-03 07:27:54.814 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-03 07:27:54.817 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 597377261201910797745788437809442381539148733766
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Dec 03 05:11:15 UTC 2022
           Final Date: Thu Dec 02 05:11:14 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [bf:82:94:a4:03:48:3b:45:68:62:6a:6c:5d:8f:b2:c3:f5:cb:85:ed],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 008179ec1b1392aac4ff268cea1b53223e4fe11f
                       09248bc1a41b8483de482f377b39784cddd09f81
                       4dd069f9056a1a3ae9bfa3a49be521e6a143601f
                       e671f6df2f587cc32bc38fd4a50970de5afc27f2
                       242d3b3b5c901fcdf18a51fd16d8dfbe3a97245a
                       608b9c6f1b23f258fc46c5594772ae235be402b1
                       7c680e7e6d6b64af3bfdad6a717f6259e1274910
                       d858be7c87c90a4b355676d335471ffa6961c3ae
                       e8060d11f967c563c67161e3eaed1fd68c168dc7
                       acbfd7cfbe4d958dc1882967916c8d095778858e
                       2e7a044f14811b3b19542eeeea6acef692409b93
                       9df80ad5175b19af639772b5a3d987d9125bd672
                       ad14b38701674bc94e0cd43212e91bc347b8d4f6
                       7e5ed667068294463ac6d0ab771857806db6d0b9
                       925e26410cd43826e0ba0a9e06cbab686c6f2507
                       84753ea5ce4f66061ec0eb74ad4f1b419d78f0b7
                       43c38c7e4d8271993d0038f56a44437a87f500d2
                       6b33ae595b053a02921b7b842815c445ac2cb50e
                       e057c25bb35acc320bf5bae748f1a86f49b6b85c
                       655b0dcc
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [93:7a:62:a9:01:72:84:63:fa:d8:5c:cc:fa:f9:56:0d:5b:eb:d7:f5],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-12-03 07:34:09.104  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-03 07:34:09.111 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-03 07:34:09.114 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-12-03 07:34:09.115 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-03 07:34:09.116  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-12-03 07:34:09.117  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-03 07:34:09.117  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-03 07:34:09.117 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-03 07:34:09.118 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-03 07:34:09.118 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-03 07:34:09.124 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-03 07:34:09.126 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-03 07:34:09.127 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-03 07:34:09.129 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-03 07:34:09.343  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-03 07:34:09.344  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-03 07:34:09.345 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-03 07:34:09.345 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-03 07:34:09.346  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-03 07:34:09.347  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-03 07:34:09.347 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-03 07:34:09.347 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-03 07:34:09.348 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-03 07:34:09.349 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-03 07:34:09.349 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-03 07:34:09.350 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-03 07:34:09.351 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-03 07:34:09.351 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-03 07:34:09.352 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-03 07:34:09.353 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-03 07:34:09.360 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 597377261201910797745788437809442381539148733766
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Dec 03 05:11:15 UTC 2022
           Final Date: Thu Dec 02 05:11:14 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [bf:82:94:a4:03:48:3b:45:68:62:6a:6c:5d:8f:b2:c3:f5:cb:85:ed],[56:66:d1:a4]
        modulus: f8c0149590b921db924582c60ea1fe37828e98259155390f3293c132d7707dcf8ca0f1730fb1e0e1c2fe2495b28106ccf08922d4d64e88c97f6d5df6acf9a13cc99968d9cadf60afad18c33166d27d5cf4177b4782efadefa032b6a3461825c964bbf5efde14df59e3bb0dc9ffd62c60bc58a8df2c3eb9e39229a3809e1f7616f7aa794fe0823f356a5ed70a23eb482f542d8f755a1582b46c4f38f051ffe44e138a63d98d2a7081e1cb4f6a26acab5b29e7c4467d52da102549c50fe48ab0dde7e68215eac2ea7b48e55f684ac997830bcd0c268cd29f9729077151da335d7e970ab528a4ca1908d0e0522ada6567c1b1ed5871cc85bc684426124f61e3794ec8dbc230c35d2d88ab9158bc5be88d5f5c9e11902dfbc5ad15a8c69682eca72e2772eca8c075b281c00dc3026106b13b88d22306e2a1c612aa7b3e22177331f786e0e42d3882621ac20514596d86653914f463ac424916d9bcccf017dfdbd06f7fc31ab82071cac3bf4584f96bbc13aa58d30e7b56287e292bacf35bfe570f53
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 008179ec1b1392aac4ff268cea1b53223e4fe11f
                       09248bc1a41b8483de482f377b39784cddd09f81
                       4dd069f9056a1a3ae9bfa3a49be521e6a143601f
                       e671f6df2f587cc32bc38fd4a50970de5afc27f2
                       242d3b3b5c901fcdf18a51fd16d8dfbe3a97245a
                       608b9c6f1b23f258fc46c5594772ae235be402b1
                       7c680e7e6d6b64af3bfdad6a717f6259e1274910
                       d858be7c87c90a4b355676d335471ffa6961c3ae
                       e8060d11f967c563c67161e3eaed1fd68c168dc7
                       acbfd7cfbe4d958dc1882967916c8d095778858e
                       2e7a044f14811b3b19542eeeea6acef692409b93
                       9df80ad5175b19af639772b5a3d987d9125bd672
                       ad14b38701674bc94e0cd43212e91bc347b8d4f6
                       7e5ed667068294463ac6d0ab771857806db6d0b9
                       925e26410cd43826e0ba0a9e06cbab686c6f2507
                       84753ea5ce4f66061ec0eb74ad4f1b419d78f0b7
                       43c38c7e4d8271993d0038f56a44437a87f500d2
                       6b33ae595b053a02921b7b842815c445ac2cb50e
                       e057c25bb35acc320bf5bae748f1a86f49b6b85c
                       655b0dcc
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ed:59:4c:05:18:62:93:f6:6f:cb:6e:b3:d5:73:01:05:27:d8:68:a3],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-12-03 07:34:26.621  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-03 07:34:26.622 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-03 07:34:26.623 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-12-03 07:34:26.624 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-03 07:34:26.625  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-12-03 07:34:26.625  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-03 07:34:26.625  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-03 07:34:26.626 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-03 07:34:26.627 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-03 07:34:26.627 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-03 07:34:26.634 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-03 07:34:26.635 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-03 07:34:26.635 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-03 07:34:26.642 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-03 07:34:26.801  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-03 07:34:26.802  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-03 07:34:26.803 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-03 07:34:26.803 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-03 07:34:26.805  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-03 07:34:26.805  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-03 07:34:26.812 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-03 07:34:26.813 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-03 07:34:26.813 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-03 07:34:26.814 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-03 07:34:26.816 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-03 07:34:26.816 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-03 07:34:26.817 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-03 07:34:26.817 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-03 07:34:26.818 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-03 07:34:26.819 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-03 07:34:26.823 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 597377261201910797745788437809442381539148733766
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Dec 03 05:11:15 UTC 2022
           Final Date: Thu Dec 02 05:11:14 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [bf:82:94:a4:03:48:3b:45:68:62:6a:6c:5d:8f:b2:c3:f5:cb:85:ed],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 008179ec1b1392aac4ff268cea1b53223e4fe11f
                       09248bc1a41b8483de482f377b39784cddd09f81
                       4dd069f9056a1a3ae9bfa3a49be521e6a143601f
                       e671f6df2f587cc32bc38fd4a50970de5afc27f2
                       242d3b3b5c901fcdf18a51fd16d8dfbe3a97245a
                       608b9c6f1b23f258fc46c5594772ae235be402b1
                       7c680e7e6d6b64af3bfdad6a717f6259e1274910
                       d858be7c87c90a4b355676d335471ffa6961c3ae
                       e8060d11f967c563c67161e3eaed1fd68c168dc7
                       acbfd7cfbe4d958dc1882967916c8d095778858e
                       2e7a044f14811b3b19542eeeea6acef692409b93
                       9df80ad5175b19af639772b5a3d987d9125bd672
                       ad14b38701674bc94e0cd43212e91bc347b8d4f6
                       7e5ed667068294463ac6d0ab771857806db6d0b9
                       925e26410cd43826e0ba0a9e06cbab686c6f2507
                       84753ea5ce4f66061ec0eb74ad4f1b419d78f0b7
                       43c38c7e4d8271993d0038f56a44437a87f500d2
                       6b33ae595b053a02921b7b842815c445ac2cb50e
                       e057c25bb35acc320bf5bae748f1a86f49b6b85c
                       655b0dcc
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [1d:97:44:14:ab:cf:07:52:87:3c:1b:f3:f8:2b:16:10:0d:fe:5b:c6],[56:66:d1:a4]
        modulus: 9c865dcfdf39f6a2677930eb926adf66c170576cd68b16b2250fe66b611cbe3e73ea8a5de09f43ccb74176bd66054eb0c34b9e8e71504ffe2e8c578694fab5ff6ee2d18c73520a7e35520a48548b068bc708a0360f0c2629b26aefb539933a891511f693990aa007def65f9aa25ad44c9d09e5a63cf5378d73dd395ca2a5c148e72bdf1d61eb39aa59293654d594fe171c87faa538f5c749a5114b92f78eb0a4eb835a4e92774c01044ef836e68c88948990b175ae253a8b8f63815d6548dc29b4e6c156766f7ae0c528a45d312e4ba9f5357e5a3c79d70d5d943a455eed0bbf13f947b967f8ffe4c6b5562c788d3db3307bbd6db4fc8c246280b1a345988f27
public exponent: 10001

] 
2022-12-03 07:58:10.907  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-03 07:58:10.913 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-03 07:58:10.918 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-12-03 07:58:10.920 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-03 07:58:10.921  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-12-03 07:58:10.922  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-03 07:58:10.923  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-03 07:58:10.924 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-03 07:58:10.925 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-03 07:58:10.926 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-03 07:58:10.934 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-03 07:58:10.936 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-03 07:58:10.937 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-03 07:58:10.937 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-03 07:58:11.214  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-03 07:58:11.216  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-03 07:58:11.231 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-03 07:58:11.231 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-03 07:58:11.233  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-03 07:58:11.233  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-03 07:58:11.233 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-03 07:58:11.234 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-03 07:58:11.234 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-03 07:58:11.235 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-03 07:58:11.236 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-03 07:58:11.236 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-03 07:58:11.237 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-03 07:58:11.237 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-03 07:58:11.238 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-03 07:58:11.239 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-03 07:58:11.244 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 597377261201910797745788437809442381539148733766
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Dec 03 05:11:15 UTC 2022
           Final Date: Thu Dec 02 05:11:14 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [bf:82:94:a4:03:48:3b:45:68:62:6a:6c:5d:8f:b2:c3:f5:cb:85:ed],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 008179ec1b1392aac4ff268cea1b53223e4fe11f
                       09248bc1a41b8483de482f377b39784cddd09f81
                       4dd069f9056a1a3ae9bfa3a49be521e6a143601f
                       e671f6df2f587cc32bc38fd4a50970de5afc27f2
                       242d3b3b5c901fcdf18a51fd16d8dfbe3a97245a
                       608b9c6f1b23f258fc46c5594772ae235be402b1
                       7c680e7e6d6b64af3bfdad6a717f6259e1274910
                       d858be7c87c90a4b355676d335471ffa6961c3ae
                       e8060d11f967c563c67161e3eaed1fd68c168dc7
                       acbfd7cfbe4d958dc1882967916c8d095778858e
                       2e7a044f14811b3b19542eeeea6acef692409b93
                       9df80ad5175b19af639772b5a3d987d9125bd672
                       ad14b38701674bc94e0cd43212e91bc347b8d4f6
                       7e5ed667068294463ac6d0ab771857806db6d0b9
                       925e26410cd43826e0ba0a9e06cbab686c6f2507
                       84753ea5ce4f66061ec0eb74ad4f1b419d78f0b7
                       43c38c7e4d8271993d0038f56a44437a87f500d2
                       6b33ae595b053a02921b7b842815c445ac2cb50e
                       e057c25bb35acc320bf5bae748f1a86f49b6b85c
                       655b0dcc
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [61:34:c4:bf:15:f2:40:f1:e3:8b:d6:53:c0:d3:0d:e4:ad:00:99:06],[56:66:d1:a4]
        modulus: b287df2e95fb1101ac93bd4cdf0d02f834e224d2201dbd9376584b7194cd0822554d6e0f7c615e621080c2d9a2ffe9d7fb2a54355dcdf4d8c9ea617d491be3ae14278264a7e7ebfa3df3c65b4c97d0e04ec8de1ca7efcfa2cb2a91f059de4a882079190ff68008bd1d576636d4d8a1f5762ad23836dc9c7961cc5a343fbfdc233d3893f5c20cf4f6125fb70842adf3a8ff5aa271da38a632f7baac3cde240e867d07adde86db3b08e6f8d8a1186b93861734cb065805d96cc18be511266577f08b6d378af436f40e3789f8af917ed138a0baa26031d8f4404c609f58ab94e9b913bb162db4192b487fce81d18ccf9090cac346cb370da5f0011a19e698dfe305
public exponent: 10001

] 
2022-12-03 07:58:16.152  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-03 07:58:16.153 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-03 07:58:16.154 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-12-03 07:58:16.155 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-03 07:58:16.155  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-12-03 07:58:16.156  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-03 07:58:16.156  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-03 07:58:16.156 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-03 07:58:16.156 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-03 07:58:16.157 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-03 07:58:16.161 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-03 07:58:16.162 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-03 07:58:16.162 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-03 07:58:16.162 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-03 07:58:16.308  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-03 07:58:16.308  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-03 07:58:16.309 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-03 07:58:16.309 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-03 07:58:16.311  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-03 07:58:16.312  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-03 07:58:16.312 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-03 07:58:16.312 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-03 07:58:16.313 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-03 07:58:16.313 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-03 07:58:16.314 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-03 07:58:16.314 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-03 07:58:16.315 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-03 07:58:16.315 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-03 07:58:16.315 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-03 07:58:16.315 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-03 07:58:16.318 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 597377261201910797745788437809442381539148733766
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Dec 03 05:11:15 UTC 2022
           Final Date: Thu Dec 02 05:11:14 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [bf:82:94:a4:03:48:3b:45:68:62:6a:6c:5d:8f:b2:c3:f5:cb:85:ed],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 008179ec1b1392aac4ff268cea1b53223e4fe11f
                       09248bc1a41b8483de482f377b39784cddd09f81
                       4dd069f9056a1a3ae9bfa3a49be521e6a143601f
                       e671f6df2f587cc32bc38fd4a50970de5afc27f2
                       242d3b3b5c901fcdf18a51fd16d8dfbe3a97245a
                       608b9c6f1b23f258fc46c5594772ae235be402b1
                       7c680e7e6d6b64af3bfdad6a717f6259e1274910
                       d858be7c87c90a4b355676d335471ffa6961c3ae
                       e8060d11f967c563c67161e3eaed1fd68c168dc7
                       acbfd7cfbe4d958dc1882967916c8d095778858e
                       2e7a044f14811b3b19542eeeea6acef692409b93
                       9df80ad5175b19af639772b5a3d987d9125bd672
                       ad14b38701674bc94e0cd43212e91bc347b8d4f6
                       7e5ed667068294463ac6d0ab771857806db6d0b9
                       925e26410cd43826e0ba0a9e06cbab686c6f2507
                       84753ea5ce4f66061ec0eb74ad4f1b419d78f0b7
                       43c38c7e4d8271993d0038f56a44437a87f500d2
                       6b33ae595b053a02921b7b842815c445ac2cb50e
                       e057c25bb35acc320bf5bae748f1a86f49b6b85c
                       655b0dcc
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [a0:b9:e6:3b:85:3f:59:be:0f:a2:35:d1:eb:22:f8:5c:64:a0:24:32],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

]