Results

By type

          2022-12-16 05:02:22,841 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-12-16 05:02:23,875 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-12-16 05:02:24.628  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Dec 16, 2022 5:02:26 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Dec 16, 2022 5:02:26 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Dec 16, 2022 5:02:26 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Dec 16, 2022 5:02:26 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-12-16 05:02:27.468 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-12-16 05:02:27.786  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-12-16 05:02:27.983  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-12-16 05:02:28.775 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-12-16 05:02:28.778 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
2022-12-16 05:02:28.780 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-12-16 05:02:28.786 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-12-16 05:02:28.840 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2022-12-16 05:02:28.845 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
	{GET [/docs]}: redirectToUi(HttpServletRequest)
2022-12-16 05:02:28.977 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-12-16 05:02:29.950 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Dec 16, 2022 5:02:30 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-12-16 05:02:31.131  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 9.214 seconds (JVM running for 11.026)
Dec 16, 2022 5:02:58 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-12-16 05:03:30.628  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-16 05:03:30.636 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-16 05:03:30.677 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-12-16 05:03:30.681 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-16 05:03:30.700  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-12-16 05:03:30.702  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-16 05:03:30.703  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-16 05:03:30.705 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-16 05:03:30.705 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-16 05:03:30.710 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-16 05:03:30.722 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-16 05:03:30.725 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-16 05:03:30.796 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-16 05:03:30.803 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-16 05:03:30.803 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-16 05:03:30.807 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-16 05:03:31.525  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-16 05:03:31.528  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-16 05:03:31.529 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-16 05:03:31.530 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-16 05:03:31.540  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-16 05:03:31.541  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-16 05:03:31.542 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-16 05:03:31.542 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-16 05:03:31.543 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-16 05:03:31.562 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-16 05:03:31.562 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-16 05:03:31.563 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-16 05:03:31.569 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-16 05:03:31.569 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-16 05:03:31.569 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-16 05:03:31.571 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-16 05:03:31.616 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 46703649669327132501550229443406753336017401537
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Dec 16 04:59:54 UTC 2022
           Final Date: Wed Dec 15 04:59:53 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [2a:5b:72:86:9d:f9:6b:7b:1c:f4:b5:de:b9:51:9a:2d:43:55:fc:3e],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 4a82e1a36ec27e5249450aafec0b59d0eac0520e
                       c7047dc9d2d996c87a62fd3ced689366a912bf7a
                       8aac4fb71a33b3787f0d5410d3aaa5f1ac745d67
                       7cac537386dc139f42cc9922798db1aa872930b8
                       16d43f7bfda3025be58842385cf74fd80b112749
                       19b984ade60ac8e66d7b1f872e17e628f8cbbb19
                       0f69dca4809e6fb14c2d07062feb74433b5dd2af
                       c3c446aa882b2e2d2e5399a4781ecb21ffb61ff7
                       3b09877fa939c1aa1e480a033bf3bf4ec63416d5
                       c4055aa0e86345ec28adeb63b035786bb644ad3d
                       f667b7e34b74e53eb2efe15bcebd3101eaf306a9
                       0b79b25f864b4257d5555f28865a0952d61225cd
                       a672a8968601bd8435ced523f867237fed7fe3d5
                       8c800073f513ae08ed258f84b0d9b1a54257e9e9
                       d54d5708829e2ea4dcd58c1db51c5a19ff43c156
                       48d3b8e7bba36865d371a41f9a2e44c1d790f7fe
                       736b15fa8c34bbbb7e29b03099da45c7392f5b66
                       9a8727e2173b0ec4bb0dda8f0a5448783836bf35
                       a7ee45ca24efa4ebf3cf3af57f6066cae0fcd9dc
                       b8563aa6
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [d4:6a:75:2e:4d:d1:61:e9:72:c0:40:a5:64:11:71:de:95:17:9f:b9],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-12-16 06:40:53.356  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-16 06:40:53.370 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-16 06:40:53.379 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-12-16 06:40:53.382 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-16 06:40:53.383  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-12-16 06:40:53.384  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-16 06:40:53.386  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-16 06:40:53.390 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-16 06:40:53.392 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-16 06:40:53.393 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-16 06:40:53.400 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-16 06:40:53.404 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-16 06:40:53.408 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-16 06:40:53.410 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-16 06:40:53.692  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-16 06:40:53.693  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-16 06:40:53.693 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-16 06:40:53.694 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-16 06:40:53.697  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-16 06:40:53.697  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-16 06:40:53.698 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-16 06:40:53.699 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-16 06:40:53.699 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-16 06:40:53.703 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-16 06:40:53.704 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-16 06:40:53.705 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-16 06:40:53.710 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-16 06:40:53.710 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-16 06:40:53.711 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-16 06:40:53.717 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-16 06:40:53.729 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 46703649669327132501550229443406753336017401537
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Dec 16 04:59:54 UTC 2022
           Final Date: Wed Dec 15 04:59:53 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [2a:5b:72:86:9d:f9:6b:7b:1c:f4:b5:de:b9:51:9a:2d:43:55:fc:3e],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 4a82e1a36ec27e5249450aafec0b59d0eac0520e
                       c7047dc9d2d996c87a62fd3ced689366a912bf7a
                       8aac4fb71a33b3787f0d5410d3aaa5f1ac745d67
                       7cac537386dc139f42cc9922798db1aa872930b8
                       16d43f7bfda3025be58842385cf74fd80b112749
                       19b984ade60ac8e66d7b1f872e17e628f8cbbb19
                       0f69dca4809e6fb14c2d07062feb74433b5dd2af
                       c3c446aa882b2e2d2e5399a4781ecb21ffb61ff7
                       3b09877fa939c1aa1e480a033bf3bf4ec63416d5
                       c4055aa0e86345ec28adeb63b035786bb644ad3d
                       f667b7e34b74e53eb2efe15bcebd3101eaf306a9
                       0b79b25f864b4257d5555f28865a0952d61225cd
                       a672a8968601bd8435ced523f867237fed7fe3d5
                       8c800073f513ae08ed258f84b0d9b1a54257e9e9
                       d54d5708829e2ea4dcd58c1db51c5a19ff43c156
                       48d3b8e7bba36865d371a41f9a2e44c1d790f7fe
                       736b15fa8c34bbbb7e29b03099da45c7392f5b66
                       9a8727e2173b0ec4bb0dda8f0a5448783836bf35
                       a7ee45ca24efa4ebf3cf3af57f6066cae0fcd9dc
                       b8563aa6
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [62:ac:42:7f:7f:5d:8f:a4:70:ba:9d:e2:b0:57:c8:5b:7e:d0:c3:34],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-12-16 06:42:41.646  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-16 06:42:41.649 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-16 06:42:41.651 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-12-16 06:42:41.653 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-16 06:42:41.653  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-12-16 06:42:41.655  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-16 06:42:41.655  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-16 06:42:41.656 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-16 06:42:41.657 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-16 06:42:41.658 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-16 06:42:41.663 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-16 06:42:41.664 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-16 06:42:41.664 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-16 06:42:41.665 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-16 06:42:41.800  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-16 06:42:41.802  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-16 06:42:41.803 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-16 06:42:41.803 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-16 06:42:41.807  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-16 06:42:41.808  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-16 06:42:41.809 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-16 06:42:41.810 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-16 06:42:41.810 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-16 06:42:41.813 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-16 06:42:41.813 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-16 06:42:41.814 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-16 06:42:41.815 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-16 06:42:41.816 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-16 06:42:41.817 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-16 06:42:41.819 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-16 06:42:41.825 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 46703649669327132501550229443406753336017401537
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Dec 16 04:59:54 UTC 2022
           Final Date: Wed Dec 15 04:59:53 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [2a:5b:72:86:9d:f9:6b:7b:1c:f4:b5:de:b9:51:9a:2d:43:55:fc:3e],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 4a82e1a36ec27e5249450aafec0b59d0eac0520e
                       c7047dc9d2d996c87a62fd3ced689366a912bf7a
                       8aac4fb71a33b3787f0d5410d3aaa5f1ac745d67
                       7cac537386dc139f42cc9922798db1aa872930b8
                       16d43f7bfda3025be58842385cf74fd80b112749
                       19b984ade60ac8e66d7b1f872e17e628f8cbbb19
                       0f69dca4809e6fb14c2d07062feb74433b5dd2af
                       c3c446aa882b2e2d2e5399a4781ecb21ffb61ff7
                       3b09877fa939c1aa1e480a033bf3bf4ec63416d5
                       c4055aa0e86345ec28adeb63b035786bb644ad3d
                       f667b7e34b74e53eb2efe15bcebd3101eaf306a9
                       0b79b25f864b4257d5555f28865a0952d61225cd
                       a672a8968601bd8435ced523f867237fed7fe3d5
                       8c800073f513ae08ed258f84b0d9b1a54257e9e9
                       d54d5708829e2ea4dcd58c1db51c5a19ff43c156
                       48d3b8e7bba36865d371a41f9a2e44c1d790f7fe
                       736b15fa8c34bbbb7e29b03099da45c7392f5b66
                       9a8727e2173b0ec4bb0dda8f0a5448783836bf35
                       a7ee45ca24efa4ebf3cf3af57f6066cae0fcd9dc
                       b8563aa6
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [d5:97:94:c3:1b:e9:62:7d:21:43:a6:2f:a3:29:22:94:6e:c9:a2:79],[56:66:d1:a4]
        modulus: d30a3b23dc758d66eb3f751faac2938d5045c78c602bbfef00f18e8cb5f09b6245b5208625fbf9b6b3fea825f37752c86df0a22c1c132696a9658f6840c82338a524225086dbd8cfa9ffdd09331835a4cc10edece7c9cda29a4eda6501bd1aaf7018bfb18d4b02ed356bc5f420f6b1ca6cf3be7acb8926eb25fbabbed4f0693d36104c8df71534c7f7f0a268a5a34796c6e1feb009e99a90fc34a69f5d43838a56385a34c86d24ac262f14e27d9853e50c50cd2ad7341b4ea7ce64e38160d7e1033e67e1010c9d214a2932b67543d87ed86e998ef8598a427ebe3db043a7409ddf56fca4916b642b752b125a43942585cbf1d8d4ce9efba7b5a5981df76f0931
public exponent: 10001

] 
2022-12-16 06:44:33.794  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-16 06:44:33.796 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-16 06:44:33.798 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-12-16 06:44:33.799 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-16 06:44:33.800  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-12-16 06:44:33.801  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-16 06:44:33.801  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-16 06:44:33.801 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-16 06:44:33.802 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-16 06:44:33.802 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-16 06:44:33.806 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-16 06:44:33.808 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-16 06:44:33.808 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-16 06:44:33.808 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-16 06:44:33.993  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-16 06:44:33.994  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-16 06:44:33.994 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-16 06:44:33.994 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-16 06:44:33.996  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-16 06:44:33.997  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-16 06:44:33.997 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-16 06:44:33.998 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-16 06:44:33.998 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-16 06:44:33.999 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-16 06:44:34.000 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-16 06:44:34.000 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-16 06:44:34.001 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-16 06:44:34.001 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-16 06:44:34.001 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-16 06:44:34.002 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-16 06:44:34.007 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 46703649669327132501550229443406753336017401537
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Dec 16 04:59:54 UTC 2022
           Final Date: Wed Dec 15 04:59:53 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [2a:5b:72:86:9d:f9:6b:7b:1c:f4:b5:de:b9:51:9a:2d:43:55:fc:3e],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 4a82e1a36ec27e5249450aafec0b59d0eac0520e
                       c7047dc9d2d996c87a62fd3ced689366a912bf7a
                       8aac4fb71a33b3787f0d5410d3aaa5f1ac745d67
                       7cac537386dc139f42cc9922798db1aa872930b8
                       16d43f7bfda3025be58842385cf74fd80b112749
                       19b984ade60ac8e66d7b1f872e17e628f8cbbb19
                       0f69dca4809e6fb14c2d07062feb74433b5dd2af
                       c3c446aa882b2e2d2e5399a4781ecb21ffb61ff7
                       3b09877fa939c1aa1e480a033bf3bf4ec63416d5
                       c4055aa0e86345ec28adeb63b035786bb644ad3d
                       f667b7e34b74e53eb2efe15bcebd3101eaf306a9
                       0b79b25f864b4257d5555f28865a0952d61225cd
                       a672a8968601bd8435ced523f867237fed7fe3d5
                       8c800073f513ae08ed258f84b0d9b1a54257e9e9
                       d54d5708829e2ea4dcd58c1db51c5a19ff43c156
                       48d3b8e7bba36865d371a41f9a2e44c1d790f7fe
                       736b15fa8c34bbbb7e29b03099da45c7392f5b66
                       9a8727e2173b0ec4bb0dda8f0a5448783836bf35
                       a7ee45ca24efa4ebf3cf3af57f6066cae0fcd9dc
                       b8563aa6
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ee:09:b8:c9:63:99:94:96:63:07:75:23:c3:05:b8:85:e0:c7:7d:1d],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-12-16 06:47:00.050  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-16 06:47:00.053 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-16 06:47:00.056 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-12-16 06:47:00.057 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-16 06:47:00.058  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-12-16 06:47:00.060  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-16 06:47:00.065  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-16 06:47:00.066 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-16 06:47:00.067 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-16 06:47:00.068 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-16 06:47:00.072 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-16 06:47:00.074 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-16 06:47:00.074 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-16 06:47:00.075 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-16 06:47:00.400  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-16 06:47:00.401  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-16 06:47:00.402 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-16 06:47:00.402 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-16 06:47:00.405  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-16 06:47:00.405  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-16 06:47:00.406 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-16 06:47:00.411 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-16 06:47:00.412 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-16 06:47:00.413 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-16 06:47:00.414 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-16 06:47:00.414 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-16 06:47:00.415 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-16 06:47:00.415 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-16 06:47:00.416 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-16 06:47:00.417 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-16 06:47:00.421 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 46703649669327132501550229443406753336017401537
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Dec 16 04:59:54 UTC 2022
           Final Date: Wed Dec 15 04:59:53 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [2a:5b:72:86:9d:f9:6b:7b:1c:f4:b5:de:b9:51:9a:2d:43:55:fc:3e],[56:66:d1:a4]
        modulus: b3c15954f8379b970a633096fd3d5f71e4fc905103d2fbd2b8019ab5bad58d9938ae53ec4f074572f0aa46244d82cf3a79885a841f39a238dbdcf2bb731843cd26aec4181f9cb125a297fb94b9624c92541a520aae37eb47cb461cc820f3136d7828c55ac1d9ec3693fc8d21e689257a5c25a9f3a7e107d32d0b6a2e620c532f556398b61ba973ef16d22469c65b756ed45b6fe3ce620f1a528c60f4a26803a774e76b72557556492043246738f7a722324b8ed7d8af3a9b19db3428e0bcbe81bf73e56501d440977a97f3fb005c7b518785e878389a65e772d12192b8a53a3d1a988f422dbf34a812873d06857718bd4abc04004b0d48aaa72efdf588784df05bf55bd3c4193494eb30d6d94fb2295979572f46aa263d9f395e14c33335ee3b71038a27632e25c08c571ffbe08b507f6bebaf611cf392a7c9b29a79897b2e24f7e1d35f7193b5ab657f3ebf8cafa77115214d96b52f7f311176bbc826650efd2b7d851057ee6657f970d9620323a4b308c427f2cd541a8d44942bc601b81c65
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 4a82e1a36ec27e5249450aafec0b59d0eac0520e
                       c7047dc9d2d996c87a62fd3ced689366a912bf7a
                       8aac4fb71a33b3787f0d5410d3aaa5f1ac745d67
                       7cac537386dc139f42cc9922798db1aa872930b8
                       16d43f7bfda3025be58842385cf74fd80b112749
                       19b984ade60ac8e66d7b1f872e17e628f8cbbb19
                       0f69dca4809e6fb14c2d07062feb74433b5dd2af
                       c3c446aa882b2e2d2e5399a4781ecb21ffb61ff7
                       3b09877fa939c1aa1e480a033bf3bf4ec63416d5
                       c4055aa0e86345ec28adeb63b035786bb644ad3d
                       f667b7e34b74e53eb2efe15bcebd3101eaf306a9
                       0b79b25f864b4257d5555f28865a0952d61225cd
                       a672a8968601bd8435ced523f867237fed7fe3d5
                       8c800073f513ae08ed258f84b0d9b1a54257e9e9
                       d54d5708829e2ea4dcd58c1db51c5a19ff43c156
                       48d3b8e7bba36865d371a41f9a2e44c1d790f7fe
                       736b15fa8c34bbbb7e29b03099da45c7392f5b66
                       9a8727e2173b0ec4bb0dda8f0a5448783836bf35
                       a7ee45ca24efa4ebf3cf3af57f6066cae0fcd9dc
                       b8563aa6
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [8d:ed:9f:72:f1:d7:3f:3f:3e:bc:a4:45:27:27:97:9e:56:fe:90:7f],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-12-16 06:54:37.726  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-16 06:54:37.732 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-16 06:54:37.736 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-12-16 06:54:37.737 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-16 06:54:37.738  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-12-16 06:54:37.739  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-16 06:54:37.740  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-16 06:54:37.740 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-16 06:54:37.741 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-16 06:54:37.741 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-16 06:54:37.749 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-16 06:54:37.751 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-16 06:54:37.751 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-16 06:54:37.752 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-16 06:54:37.955  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-16 06:54:37.956  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-16 06:54:37.957 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-16 06:54:37.957 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-16 06:54:37.959  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-16 06:54:37.959  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-16 06:54:37.960 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-16 06:54:37.960 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-16 06:54:37.961 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-16 06:54:37.962 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-16 06:54:37.962 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-16 06:54:37.962 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-16 06:54:37.963 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-16 06:54:37.964 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-16 06:54:37.964 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-16 06:54:37.965 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-16 06:54:37.969 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 46703649669327132501550229443406753336017401537
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Dec 16 04:59:54 UTC 2022
           Final Date: Wed Dec 15 04:59:53 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [2a:5b:72:86:9d:f9:6b:7b:1c:f4:b5:de:b9:51:9a:2d:43:55:fc:3e],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 4a82e1a36ec27e5249450aafec0b59d0eac0520e
                       c7047dc9d2d996c87a62fd3ced689366a912bf7a
                       8aac4fb71a33b3787f0d5410d3aaa5f1ac745d67
                       7cac537386dc139f42cc9922798db1aa872930b8
                       16d43f7bfda3025be58842385cf74fd80b112749
                       19b984ade60ac8e66d7b1f872e17e628f8cbbb19
                       0f69dca4809e6fb14c2d07062feb74433b5dd2af
                       c3c446aa882b2e2d2e5399a4781ecb21ffb61ff7
                       3b09877fa939c1aa1e480a033bf3bf4ec63416d5
                       c4055aa0e86345ec28adeb63b035786bb644ad3d
                       f667b7e34b74e53eb2efe15bcebd3101eaf306a9
                       0b79b25f864b4257d5555f28865a0952d61225cd
                       a672a8968601bd8435ced523f867237fed7fe3d5
                       8c800073f513ae08ed258f84b0d9b1a54257e9e9
                       d54d5708829e2ea4dcd58c1db51c5a19ff43c156
                       48d3b8e7bba36865d371a41f9a2e44c1d790f7fe
                       736b15fa8c34bbbb7e29b03099da45c7392f5b66
                       9a8727e2173b0ec4bb0dda8f0a5448783836bf35
                       a7ee45ca24efa4ebf3cf3af57f6066cae0fcd9dc
                       b8563aa6
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [b0:ea:f8:95:35:4d:52:01:b4:58:a4:16:91:07:9a:46:cb:bb:63:13],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-12-16 07:00:15.283  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-16 07:00:15.285 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-16 07:00:15.288 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-12-16 07:00:15.289 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-16 07:00:15.289  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-12-16 07:00:15.290  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-16 07:00:15.290  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-16 07:00:15.291 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-16 07:00:15.291 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-16 07:00:15.292 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-16 07:00:15.299 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-16 07:00:15.300 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-16 07:00:15.300 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-16 07:00:15.300 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-16 07:00:15.502  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-16 07:00:15.503  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-16 07:00:15.504 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-16 07:00:15.504 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-16 07:00:15.506  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-16 07:00:15.506  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-16 07:00:15.507 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-16 07:00:15.507 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-16 07:00:15.508 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-16 07:00:15.509 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-16 07:00:15.509 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-16 07:00:15.510 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-16 07:00:15.511 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-16 07:00:15.511 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-16 07:00:15.512 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-16 07:00:15.513 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-16 07:00:15.516 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 46703649669327132501550229443406753336017401537
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Dec 16 04:59:54 UTC 2022
           Final Date: Wed Dec 15 04:59:53 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [2a:5b:72:86:9d:f9:6b:7b:1c:f4:b5:de:b9:51:9a:2d:43:55:fc:3e],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 4a82e1a36ec27e5249450aafec0b59d0eac0520e
                       c7047dc9d2d996c87a62fd3ced689366a912bf7a
                       8aac4fb71a33b3787f0d5410d3aaa5f1ac745d67
                       7cac537386dc139f42cc9922798db1aa872930b8
                       16d43f7bfda3025be58842385cf74fd80b112749
                       19b984ade60ac8e66d7b1f872e17e628f8cbbb19
                       0f69dca4809e6fb14c2d07062feb74433b5dd2af
                       c3c446aa882b2e2d2e5399a4781ecb21ffb61ff7
                       3b09877fa939c1aa1e480a033bf3bf4ec63416d5
                       c4055aa0e86345ec28adeb63b035786bb644ad3d
                       f667b7e34b74e53eb2efe15bcebd3101eaf306a9
                       0b79b25f864b4257d5555f28865a0952d61225cd
                       a672a8968601bd8435ced523f867237fed7fe3d5
                       8c800073f513ae08ed258f84b0d9b1a54257e9e9
                       d54d5708829e2ea4dcd58c1db51c5a19ff43c156
                       48d3b8e7bba36865d371a41f9a2e44c1d790f7fe
                       736b15fa8c34bbbb7e29b03099da45c7392f5b66
                       9a8727e2173b0ec4bb0dda8f0a5448783836bf35
                       a7ee45ca24efa4ebf3cf3af57f6066cae0fcd9dc
                       b8563aa6
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [35:ef:d6:56:8b:3a:cf:23:5a:37:1d:95:27:ee:54:5d:32:15:58:a8],[56:66:d1:a4]
        modulus: f24f8291fe1c441a37cae81c71f1afe8211da258ab6745130522e01349d0af934d57c3de5ae3b0e0ea5b98b6b1c306efc932ba2cb0db32dc8cdc87ade6ed87f7725e6a5127289c3d42613a0635063f6f39511969ca7e9881846be09ed60bfe383932656a71dbce67e1fa1952585b8817461393bfb1b8ce34035ac97070d60333f9b8371c733b09c3da484698f111df49c238ca2c3bcaad9191af91d9462a9606f6bb2f546d028e4e7e5ecbced2c63cdec5c3e2b8b2f7fcaebe50f1098d585e898baf461fd9e53baeb31c5776abd77e0156d5183403c3e89a63076d4da303c1526cf153aa9ffa318829690b957f8a05e553870117f9008f1cd7dbe445b22d2f87
public exponent: 10001

] 
2022-12-16 07:06:45.983  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-16 07:06:45.987 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-16 07:06:45.990 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-12-16 07:06:45.991 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-16 07:06:45.992  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-12-16 07:06:45.993  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-16 07:06:45.993  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-16 07:06:45.994 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-16 07:06:45.994 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-16 07:06:45.995 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-16 07:06:45.999 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-16 07:06:46.004 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-16 07:06:46.005 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-16 07:06:46.005 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-16 07:06:46.210  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-16 07:06:46.211  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-16 07:06:46.211 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-16 07:06:46.211 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-16 07:06:46.213  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-16 07:06:46.214  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-16 07:06:46.214 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-16 07:06:46.215 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-16 07:06:46.215 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-16 07:06:46.216 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-16 07:06:46.216 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-16 07:06:46.216 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-16 07:06:46.217 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-16 07:06:46.217 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-16 07:06:46.218 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-16 07:06:46.219 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-16 07:06:46.222 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 46703649669327132501550229443406753336017401537
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Dec 16 04:59:54 UTC 2022
           Final Date: Wed Dec 15 04:59:53 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [2a:5b:72:86:9d:f9:6b:7b:1c:f4:b5:de:b9:51:9a:2d:43:55:fc:3e],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 4a82e1a36ec27e5249450aafec0b59d0eac0520e
                       c7047dc9d2d996c87a62fd3ced689366a912bf7a
                       8aac4fb71a33b3787f0d5410d3aaa5f1ac745d67
                       7cac537386dc139f42cc9922798db1aa872930b8
                       16d43f7bfda3025be58842385cf74fd80b112749
                       19b984ade60ac8e66d7b1f872e17e628f8cbbb19
                       0f69dca4809e6fb14c2d07062feb74433b5dd2af
                       c3c446aa882b2e2d2e5399a4781ecb21ffb61ff7
                       3b09877fa939c1aa1e480a033bf3bf4ec63416d5
                       c4055aa0e86345ec28adeb63b035786bb644ad3d
                       f667b7e34b74e53eb2efe15bcebd3101eaf306a9
                       0b79b25f864b4257d5555f28865a0952d61225cd
                       a672a8968601bd8435ced523f867237fed7fe3d5
                       8c800073f513ae08ed258f84b0d9b1a54257e9e9
                       d54d5708829e2ea4dcd58c1db51c5a19ff43c156
                       48d3b8e7bba36865d371a41f9a2e44c1d790f7fe
                       736b15fa8c34bbbb7e29b03099da45c7392f5b66
                       9a8727e2173b0ec4bb0dda8f0a5448783836bf35
                       a7ee45ca24efa4ebf3cf3af57f6066cae0fcd9dc
                       b8563aa6
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [e0:07:7b:77:5b:fa:94:63:a4:ed:e3:5b:18:82:ce:bf:41:bc:a9:37],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-12-16 07:12:49.649  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-16 07:12:49.656 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-16 07:12:49.660 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-12-16 07:12:49.662 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-16 07:12:49.662  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-12-16 07:12:49.663  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-16 07:12:49.663  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-16 07:12:49.664 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-16 07:12:49.664 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-16 07:12:49.665 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-16 07:12:49.669 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-16 07:12:49.670 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-16 07:12:49.670 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-16 07:12:49.671 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-16 07:12:49.857  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-16 07:12:49.858  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-16 07:12:49.858 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-16 07:12:49.858 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-16 07:12:49.860  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-16 07:12:49.861  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-16 07:12:49.862 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-16 07:12:49.862 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-16 07:12:49.862 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-16 07:12:49.863 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-16 07:12:49.864 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-16 07:12:49.864 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-16 07:12:49.865 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-16 07:12:49.865 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-16 07:12:49.865 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-16 07:12:49.866 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-16 07:12:49.870 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 46703649669327132501550229443406753336017401537
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Dec 16 04:59:54 UTC 2022
           Final Date: Wed Dec 15 04:59:53 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [2a:5b:72:86:9d:f9:6b:7b:1c:f4:b5:de:b9:51:9a:2d:43:55:fc:3e],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 4a82e1a36ec27e5249450aafec0b59d0eac0520e
                       c7047dc9d2d996c87a62fd3ced689366a912bf7a
                       8aac4fb71a33b3787f0d5410d3aaa5f1ac745d67
                       7cac537386dc139f42cc9922798db1aa872930b8
                       16d43f7bfda3025be58842385cf74fd80b112749
                       19b984ade60ac8e66d7b1f872e17e628f8cbbb19
                       0f69dca4809e6fb14c2d07062feb74433b5dd2af
                       c3c446aa882b2e2d2e5399a4781ecb21ffb61ff7
                       3b09877fa939c1aa1e480a033bf3bf4ec63416d5
                       c4055aa0e86345ec28adeb63b035786bb644ad3d
                       f667b7e34b74e53eb2efe15bcebd3101eaf306a9
                       0b79b25f864b4257d5555f28865a0952d61225cd
                       a672a8968601bd8435ced523f867237fed7fe3d5
                       8c800073f513ae08ed258f84b0d9b1a54257e9e9
                       d54d5708829e2ea4dcd58c1db51c5a19ff43c156
                       48d3b8e7bba36865d371a41f9a2e44c1d790f7fe
                       736b15fa8c34bbbb7e29b03099da45c7392f5b66
                       9a8727e2173b0ec4bb0dda8f0a5448783836bf35
                       a7ee45ca24efa4ebf3cf3af57f6066cae0fcd9dc
                       b8563aa6
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [10:ad:b2:b4:83:63:12:09:c9:a8:62:a6:cd:8e:04:33:41:5c:d9:95],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-12-16 07:13:09.068  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-16 07:13:09.069 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-16 07:13:09.071 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-12-16 07:13:09.071 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-16 07:13:09.072  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-12-16 07:13:09.072  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-16 07:13:09.072  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-16 07:13:09.073 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-16 07:13:09.073 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-16 07:13:09.073 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-16 07:13:09.077 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-16 07:13:09.078 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-16 07:13:09.078 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-16 07:13:09.078 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-16 07:13:09.206  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-16 07:13:09.207  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-16 07:13:09.208 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-16 07:13:09.209 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-16 07:13:09.211  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-16 07:13:09.212  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-16 07:13:09.212 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-16 07:13:09.213 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-16 07:13:09.213 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-16 07:13:09.215 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-16 07:13:09.216 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-16 07:13:09.216 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-16 07:13:09.217 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-16 07:13:09.218 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-16 07:13:09.219 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-16 07:13:09.220 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-16 07:13:09.222 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 46703649669327132501550229443406753336017401537
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Dec 16 04:59:54 UTC 2022
           Final Date: Wed Dec 15 04:59:53 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [2a:5b:72:86:9d:f9:6b:7b:1c:f4:b5:de:b9:51:9a:2d:43:55:fc:3e],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 4a82e1a36ec27e5249450aafec0b59d0eac0520e
                       c7047dc9d2d996c87a62fd3ced689366a912bf7a
                       8aac4fb71a33b3787f0d5410d3aaa5f1ac745d67
                       7cac537386dc139f42cc9922798db1aa872930b8
                       16d43f7bfda3025be58842385cf74fd80b112749
                       19b984ade60ac8e66d7b1f872e17e628f8cbbb19
                       0f69dca4809e6fb14c2d07062feb74433b5dd2af
                       c3c446aa882b2e2d2e5399a4781ecb21ffb61ff7
                       3b09877fa939c1aa1e480a033bf3bf4ec63416d5
                       c4055aa0e86345ec28adeb63b035786bb644ad3d
                       f667b7e34b74e53eb2efe15bcebd3101eaf306a9
                       0b79b25f864b4257d5555f28865a0952d61225cd
                       a672a8968601bd8435ced523f867237fed7fe3d5
                       8c800073f513ae08ed258f84b0d9b1a54257e9e9
                       d54d5708829e2ea4dcd58c1db51c5a19ff43c156
                       48d3b8e7bba36865d371a41f9a2e44c1d790f7fe
                       736b15fa8c34bbbb7e29b03099da45c7392f5b66
                       9a8727e2173b0ec4bb0dda8f0a5448783836bf35
                       a7ee45ca24efa4ebf3cf3af57f6066cae0fcd9dc
                       b8563aa6
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [e2:d8:96:ad:54:bd:f0:5b:76:a4:13:c9:a3:03:9d:10:1d:42:0d:24],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-12-16 07:38:59.666  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-16 07:38:59.671 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-16 07:38:59.676 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-12-16 07:38:59.677 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-16 07:38:59.679  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-12-16 07:38:59.680  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-16 07:38:59.680  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-16 07:38:59.681 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-16 07:38:59.681 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-16 07:38:59.682 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-16 07:38:59.686 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-16 07:38:59.687 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-16 07:38:59.690 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-16 07:38:59.691 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-16 07:38:59.920  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-16 07:38:59.921  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-16 07:38:59.921 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-16 07:38:59.921 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-16 07:38:59.923  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-16 07:38:59.923  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-16 07:38:59.924 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-16 07:38:59.924 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-16 07:38:59.924 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-16 07:38:59.926 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-16 07:38:59.926 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-16 07:38:59.926 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-16 07:38:59.927 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-16 07:38:59.928 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-16 07:38:59.928 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-16 07:38:59.929 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-16 07:38:59.933 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 46703649669327132501550229443406753336017401537
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Dec 16 04:59:54 UTC 2022
           Final Date: Wed Dec 15 04:59:53 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [2a:5b:72:86:9d:f9:6b:7b:1c:f4:b5:de:b9:51:9a:2d:43:55:fc:3e],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 4a82e1a36ec27e5249450aafec0b59d0eac0520e
                       c7047dc9d2d996c87a62fd3ced689366a912bf7a
                       8aac4fb71a33b3787f0d5410d3aaa5f1ac745d67
                       7cac537386dc139f42cc9922798db1aa872930b8
                       16d43f7bfda3025be58842385cf74fd80b112749
                       19b984ade60ac8e66d7b1f872e17e628f8cbbb19
                       0f69dca4809e6fb14c2d07062feb74433b5dd2af
                       c3c446aa882b2e2d2e5399a4781ecb21ffb61ff7
                       3b09877fa939c1aa1e480a033bf3bf4ec63416d5
                       c4055aa0e86345ec28adeb63b035786bb644ad3d
                       f667b7e34b74e53eb2efe15bcebd3101eaf306a9
                       0b79b25f864b4257d5555f28865a0952d61225cd
                       a672a8968601bd8435ced523f867237fed7fe3d5
                       8c800073f513ae08ed258f84b0d9b1a54257e9e9
                       d54d5708829e2ea4dcd58c1db51c5a19ff43c156
                       48d3b8e7bba36865d371a41f9a2e44c1d790f7fe
                       736b15fa8c34bbbb7e29b03099da45c7392f5b66
                       9a8727e2173b0ec4bb0dda8f0a5448783836bf35
                       a7ee45ca24efa4ebf3cf3af57f6066cae0fcd9dc
                       b8563aa6
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [df:b4:76:b1:75:24:fa:27:7b:91:f9:21:fa:b7:24:31:3c:ca:79:59],[56:66:d1:a4]
        modulus: caeef5cc057f950408c333e3f56f4963d5f00d7c391826d8417247962c0406345ae33892242208ffd73539e0dfae4085feab2c6e5b2053ab933a91ec24df8f86852a95b9f17e5456af4988ffe52bdd36711f639658150d17d8a4ad93229a1c0b7d71fa45b0228d3ae6418f8843f7067393d4fb316bb6f440676570ccfa1ff72817790b76df98fce821c69d81e5663d0f8c7d1328114f31684951050e0ada10e755962096dcd3b334906bb322ddc920ba9abc580fe50273b3828a7462d79d35fd0dc7c336d569e4b5473aa1f7f8ea067dc83adf0cdc095417fba650c7196cdd518ecb9c390c6a96a1eece73df80d337a78d4eb998245744abee2fd91bc31ee423
public exponent: 10001

] 
2022-12-16 07:39:07.017  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-16 07:39:07.018 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-16 07:39:07.020 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-12-16 07:39:07.020 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-16 07:39:07.021  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-12-16 07:39:07.021  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-16 07:39:07.022  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-16 07:39:07.022 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-16 07:39:07.023 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-16 07:39:07.023 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-16 07:39:07.026 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-16 07:39:07.027 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-16 07:39:07.027 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-16 07:39:07.028 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-16 07:39:07.143  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-16 07:39:07.144  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-16 07:39:07.145 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-16 07:39:07.145 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-16 07:39:07.146  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-16 07:39:07.147  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-16 07:39:07.147 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-16 07:39:07.148 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-16 07:39:07.148 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-16 07:39:07.149 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-16 07:39:07.149 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-16 07:39:07.149 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-16 07:39:07.150 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-16 07:39:07.150 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-16 07:39:07.151 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-16 07:39:07.152 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-16 07:39:07.154 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 46703649669327132501550229443406753336017401537
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Dec 16 04:59:54 UTC 2022
           Final Date: Wed Dec 15 04:59:53 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [2a:5b:72:86:9d:f9:6b:7b:1c:f4:b5:de:b9:51:9a:2d:43:55:fc:3e],[56:66:d1:a4]
        modulus: b3c15954f8379b970a633096fd3d5f71e4fc905103d2fbd2b8019ab5bad58d9938ae53ec4f074572f0aa46244d82cf3a79885a841f39a238dbdcf2bb731843cd26aec4181f9cb125a297fb94b9624c92541a520aae37eb47cb461cc820f3136d7828c55ac1d9ec3693fc8d21e689257a5c25a9f3a7e107d32d0b6a2e620c532f556398b61ba973ef16d22469c65b756ed45b6fe3ce620f1a528c60f4a26803a774e76b72557556492043246738f7a722324b8ed7d8af3a9b19db3428e0bcbe81bf73e56501d440977a97f3fb005c7b518785e878389a65e772d12192b8a53a3d1a988f422dbf34a812873d06857718bd4abc04004b0d48aaa72efdf588784df05bf55bd3c4193494eb30d6d94fb2295979572f46aa263d9f395e14c33335ee3b71038a27632e25c08c571ffbe08b507f6bebaf611cf392a7c9b29a79897b2e24f7e1d35f7193b5ab657f3ebf8cafa77115214d96b52f7f311176bbc826650efd2b7d851057ee6657f970d9620323a4b308c427f2cd541a8d44942bc601b81c65
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 4a82e1a36ec27e5249450aafec0b59d0eac0520e
                       c7047dc9d2d996c87a62fd3ced689366a912bf7a
                       8aac4fb71a33b3787f0d5410d3aaa5f1ac745d67
                       7cac537386dc139f42cc9922798db1aa872930b8
                       16d43f7bfda3025be58842385cf74fd80b112749
                       19b984ade60ac8e66d7b1f872e17e628f8cbbb19
                       0f69dca4809e6fb14c2d07062feb74433b5dd2af
                       c3c446aa882b2e2d2e5399a4781ecb21ffb61ff7
                       3b09877fa939c1aa1e480a033bf3bf4ec63416d5
                       c4055aa0e86345ec28adeb63b035786bb644ad3d
                       f667b7e34b74e53eb2efe15bcebd3101eaf306a9
                       0b79b25f864b4257d5555f28865a0952d61225cd
                       a672a8968601bd8435ced523f867237fed7fe3d5
                       8c800073f513ae08ed258f84b0d9b1a54257e9e9
                       d54d5708829e2ea4dcd58c1db51c5a19ff43c156
                       48d3b8e7bba36865d371a41f9a2e44c1d790f7fe
                       736b15fa8c34bbbb7e29b03099da45c7392f5b66
                       9a8727e2173b0ec4bb0dda8f0a5448783836bf35
                       a7ee45ca24efa4ebf3cf3af57f6066cae0fcd9dc
                       b8563aa6
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [2c:d9:bd:e2:e2:f9:e3:39:20:67:56:4d:89:f6:42:99:1c:da:8d:e4],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

]