Results

By type

          2022-12-28 05:23:44,493 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-12-28 05:23:45,799 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-12-28 05:23:46.560  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Dec 28, 2022 5:23:48 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Dec 28, 2022 5:23:48 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Dec 28, 2022 5:23:48 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Dec 28, 2022 5:23:48 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-12-28 05:23:48.952 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-12-28 05:23:49.226  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-12-28 05:23:49.387  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-12-28 05:23:50.041 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-12-28 05:23:50.043 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
2022-12-28 05:23:50.045 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-12-28 05:23:50.048 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-12-28 05:23:50.084 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2022-12-28 05:23:50.087 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/docs]}: redirectToUi(HttpServletRequest)
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
2022-12-28 05:23:50.203 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-12-28 05:23:50.861 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Dec 28, 2022 5:23:51 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-12-28 05:23:51.768  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 8.177 seconds (JVM running for 10.118)
Dec 28, 2022 5:24:18 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-12-28 05:24:45.680  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-28 05:24:45.691 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-28 05:24:45.744 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-12-28 05:24:45.750 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-28 05:24:45.787  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-12-28 05:24:45.789  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-28 05:24:45.791  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-28 05:24:45.793 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-28 05:24:45.793 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-28 05:24:45.798 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-28 05:24:45.807 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-28 05:24:45.811 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-28 05:24:45.862 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-28 05:24:45.868 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-28 05:24:45.869 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-28 05:24:45.872 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-28 05:24:46.579  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-28 05:24:46.581  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-28 05:24:46.582 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-28 05:24:46.583 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-28 05:24:46.599  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-28 05:24:46.601  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-28 05:24:46.603 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-28 05:24:46.603 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-28 05:24:46.603 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-28 05:24:46.622 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-28 05:24:46.623 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-28 05:24:46.624 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-28 05:24:46.634 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-28 05:24:46.634 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-28 05:24:46.635 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-28 05:24:46.636 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-28 05:24:46.673 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 340608429187132743632836442735356099397392193761
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Dec 28 05:20:36 UTC 2022
           Final Date: Mon Dec 27 05:20:35 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [c2:5f:cf:73:5f:79:f4:bb:18:a2:fc:7f:c7:d9:ac:4c:ac:b6:1e:48],[56:66:d1:a4]
        modulus: ccd8f5db1715e727b93edb63e0d38a6eabba5904dec05d6d98f18fe32b2938b861e74ede436cbdf67f31438710d0f820b55776b8560a209ff739b045ca32a3d96b70a5bf32c8949bf2ee1a2953d544a40241569b4baf908bc5bff3290c46c5ffd5d1c1ffb87dcbc7a82592a474fa9410ebd55be38a5e97cafa91f77afe0f33cad3af4ded0104b98d81c6d3feaf23ba2045512fae1a33cc39ff92cef0df0a6f3d45879eb5af08af30f776597fca95841cefd2b66c7ae250ca3351420e31f446a1cb564e387939eaa31d9a93427ceb1cd2f1fb2a9d51b13ed281d490e0c71391f467755d6830a28690f5239fb287a33998f289cf5bfa775d22d1ece1ca4269b537d4aa0729ee0e3b3221b2d89c968e3e761f6f418c2f03eb4b60685d4e3d2133bfe483f6dc3617a0a847686a836383b6e43fc08cb9b51576f93ce4a03f48ccf1e9db0de10e81765334a15db51b47292134115005c739072b86cbcbaa06bca22cec3da61db15359915ae289ed4085540f8d47e1c3356ee72242c806293569051747
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7475fa841802a2e0ec35cf8119c432251150d23e
                       3c21f07f94287a939edcd6fb71cd16f6616b5d0f
                       84ec3dd3e387ba17f7ee73ab1fa10c31d866f270
                       b1b6d580b2bd36de2261430fea3ebee96eb06367
                       66eda3e9da6ed7ba6747e57d3da59df1e9f20a05
                       fe32cfc099384bf40d9e72043c1fa10c5f078600
                       2b3b19cbe3868254afe3a6dcd7ca085aeae5138b
                       e476d5fa124909274f8e8032e76d8d18d3de3474
                       18d0290a1db6ca72a5dadf3055c135b3c86bd455
                       f9fe1d984e26c9627541e018e3b6b76447efd40a
                       109de0f629b7efbaacb3e2e109867d3bceb93a05
                       f08bf52138e0459b2ee3dbf7616b23ff083aff23
                       0004615c141581c51029226a90b54033b5005f1e
                       c2340388f8a08eaedf6dab5487dc1cc8768d0f88
                       6b96936324888b2286d975a75ad4085ce9aa078d
                       b625c1b5a8d28821c71a6ed6981c41b6e18c96f0
                       14520f6d2ef01548d6c03a45f81770819a8b6ad4
                       1fccb2a0eedc36ac982005c5a1a09aadc797c887
                       c78fc41bb460efd54e6ce8de2208e511e8d85618
                       f21f89e6
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [2f:60:0c:6c:9a:27:2e:95:9d:ea:43:e1:55:f5:14:0d:0f:1c:92:07],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-12-28 07:14:49.691  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-28 07:14:49.694 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-28 07:14:49.697 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-12-28 07:14:49.698 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-28 07:14:49.698  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-12-28 07:14:49.699  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-28 07:14:49.700  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-28 07:14:49.700 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-28 07:14:49.701 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-28 07:14:49.701 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-28 07:14:49.706 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-28 07:14:49.707 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-28 07:14:49.707 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-28 07:14:49.708 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-28 07:14:49.982  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-28 07:14:49.983  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-28 07:14:49.983 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-28 07:14:49.984 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-28 07:14:49.990  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-28 07:14:49.990  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-28 07:14:49.991 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-28 07:14:49.991 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-28 07:14:49.991 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-28 07:14:49.992 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-28 07:14:49.993 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-28 07:14:49.993 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-28 07:14:49.994 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-28 07:14:49.994 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-28 07:14:49.994 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-28 07:14:49.995 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-28 07:14:50.000 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 340608429187132743632836442735356099397392193761
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Dec 28 05:20:36 UTC 2022
           Final Date: Mon Dec 27 05:20:35 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [c2:5f:cf:73:5f:79:f4:bb:18:a2:fc:7f:c7:d9:ac:4c:ac:b6:1e:48],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7475fa841802a2e0ec35cf8119c432251150d23e
                       3c21f07f94287a939edcd6fb71cd16f6616b5d0f
                       84ec3dd3e387ba17f7ee73ab1fa10c31d866f270
                       b1b6d580b2bd36de2261430fea3ebee96eb06367
                       66eda3e9da6ed7ba6747e57d3da59df1e9f20a05
                       fe32cfc099384bf40d9e72043c1fa10c5f078600
                       2b3b19cbe3868254afe3a6dcd7ca085aeae5138b
                       e476d5fa124909274f8e8032e76d8d18d3de3474
                       18d0290a1db6ca72a5dadf3055c135b3c86bd455
                       f9fe1d984e26c9627541e018e3b6b76447efd40a
                       109de0f629b7efbaacb3e2e109867d3bceb93a05
                       f08bf52138e0459b2ee3dbf7616b23ff083aff23
                       0004615c141581c51029226a90b54033b5005f1e
                       c2340388f8a08eaedf6dab5487dc1cc8768d0f88
                       6b96936324888b2286d975a75ad4085ce9aa078d
                       b625c1b5a8d28821c71a6ed6981c41b6e18c96f0
                       14520f6d2ef01548d6c03a45f81770819a8b6ad4
                       1fccb2a0eedc36ac982005c5a1a09aadc797c887
                       c78fc41bb460efd54e6ce8de2208e511e8d85618
                       f21f89e6
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [7d:c0:d2:47:dd:42:4c:df:e8:79:d8:4a:a3:47:4a:4b:9a:04:f3:e6],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-12-28 07:16:37.813  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-28 07:16:37.814 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-28 07:16:37.816 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-12-28 07:16:37.817 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-28 07:16:37.818  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-12-28 07:16:37.819  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-28 07:16:37.820  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-28 07:16:37.821 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-28 07:16:37.821 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-28 07:16:37.823 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-28 07:16:37.829 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-28 07:16:37.830 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-28 07:16:37.830 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-28 07:16:37.831 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-28 07:16:37.985  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-28 07:16:37.986  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-28 07:16:37.986 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-28 07:16:37.987 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-28 07:16:37.989  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-28 07:16:37.990  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-28 07:16:37.990 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-28 07:16:37.991 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-28 07:16:37.991 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-28 07:16:37.992 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-28 07:16:37.993 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-28 07:16:37.993 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-28 07:16:37.994 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-28 07:16:37.994 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-28 07:16:37.995 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-28 07:16:37.996 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-28 07:16:37.999 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 340608429187132743632836442735356099397392193761
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Dec 28 05:20:36 UTC 2022
           Final Date: Mon Dec 27 05:20:35 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [c2:5f:cf:73:5f:79:f4:bb:18:a2:fc:7f:c7:d9:ac:4c:ac:b6:1e:48],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7475fa841802a2e0ec35cf8119c432251150d23e
                       3c21f07f94287a939edcd6fb71cd16f6616b5d0f
                       84ec3dd3e387ba17f7ee73ab1fa10c31d866f270
                       b1b6d580b2bd36de2261430fea3ebee96eb06367
                       66eda3e9da6ed7ba6747e57d3da59df1e9f20a05
                       fe32cfc099384bf40d9e72043c1fa10c5f078600
                       2b3b19cbe3868254afe3a6dcd7ca085aeae5138b
                       e476d5fa124909274f8e8032e76d8d18d3de3474
                       18d0290a1db6ca72a5dadf3055c135b3c86bd455
                       f9fe1d984e26c9627541e018e3b6b76447efd40a
                       109de0f629b7efbaacb3e2e109867d3bceb93a05
                       f08bf52138e0459b2ee3dbf7616b23ff083aff23
                       0004615c141581c51029226a90b54033b5005f1e
                       c2340388f8a08eaedf6dab5487dc1cc8768d0f88
                       6b96936324888b2286d975a75ad4085ce9aa078d
                       b625c1b5a8d28821c71a6ed6981c41b6e18c96f0
                       14520f6d2ef01548d6c03a45f81770819a8b6ad4
                       1fccb2a0eedc36ac982005c5a1a09aadc797c887
                       c78fc41bb460efd54e6ce8de2208e511e8d85618
                       f21f89e6
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [0f:13:41:bd:ff:40:48:a8:ef:51:f8:27:8e:51:02:f1:bb:95:11:fe],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-12-28 07:18:34.715  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-28 07:18:34.720 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-28 07:18:34.722 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-12-28 07:18:34.723 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-28 07:18:34.724  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-12-28 07:18:34.725  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-28 07:18:34.725  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-28 07:18:34.726 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-28 07:18:34.726 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-28 07:18:34.727 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-28 07:18:34.732 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-28 07:18:34.733 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-28 07:18:34.733 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-28 07:18:34.734 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-28 07:18:37.299  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-28 07:18:37.300  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-28 07:18:37.300 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-28 07:18:37.301 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-28 07:18:37.303  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-28 07:18:37.304  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-28 07:18:37.305 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-28 07:18:37.306 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-28 07:18:37.306 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-28 07:18:37.307 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-28 07:18:37.308 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-28 07:18:37.309 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-28 07:18:37.310 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-28 07:18:37.311 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-28 07:18:37.311 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-28 07:18:37.313 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-28 07:18:37.321 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 340608429187132743632836442735356099397392193761
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Dec 28 05:20:36 UTC 2022
           Final Date: Mon Dec 27 05:20:35 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [c2:5f:cf:73:5f:79:f4:bb:18:a2:fc:7f:c7:d9:ac:4c:ac:b6:1e:48],[56:66:d1:a4]
        modulus: ccd8f5db1715e727b93edb63e0d38a6eabba5904dec05d6d98f18fe32b2938b861e74ede436cbdf67f31438710d0f820b55776b8560a209ff739b045ca32a3d96b70a5bf32c8949bf2ee1a2953d544a40241569b4baf908bc5bff3290c46c5ffd5d1c1ffb87dcbc7a82592a474fa9410ebd55be38a5e97cafa91f77afe0f33cad3af4ded0104b98d81c6d3feaf23ba2045512fae1a33cc39ff92cef0df0a6f3d45879eb5af08af30f776597fca95841cefd2b66c7ae250ca3351420e31f446a1cb564e387939eaa31d9a93427ceb1cd2f1fb2a9d51b13ed281d490e0c71391f467755d6830a28690f5239fb287a33998f289cf5bfa775d22d1ece1ca4269b537d4aa0729ee0e3b3221b2d89c968e3e761f6f418c2f03eb4b60685d4e3d2133bfe483f6dc3617a0a847686a836383b6e43fc08cb9b51576f93ce4a03f48ccf1e9db0de10e81765334a15db51b47292134115005c739072b86cbcbaa06bca22cec3da61db15359915ae289ed4085540f8d47e1c3356ee72242c806293569051747
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7475fa841802a2e0ec35cf8119c432251150d23e
                       3c21f07f94287a939edcd6fb71cd16f6616b5d0f
                       84ec3dd3e387ba17f7ee73ab1fa10c31d866f270
                       b1b6d580b2bd36de2261430fea3ebee96eb06367
                       66eda3e9da6ed7ba6747e57d3da59df1e9f20a05
                       fe32cfc099384bf40d9e72043c1fa10c5f078600
                       2b3b19cbe3868254afe3a6dcd7ca085aeae5138b
                       e476d5fa124909274f8e8032e76d8d18d3de3474
                       18d0290a1db6ca72a5dadf3055c135b3c86bd455
                       f9fe1d984e26c9627541e018e3b6b76447efd40a
                       109de0f629b7efbaacb3e2e109867d3bceb93a05
                       f08bf52138e0459b2ee3dbf7616b23ff083aff23
                       0004615c141581c51029226a90b54033b5005f1e
                       c2340388f8a08eaedf6dab5487dc1cc8768d0f88
                       6b96936324888b2286d975a75ad4085ce9aa078d
                       b625c1b5a8d28821c71a6ed6981c41b6e18c96f0
                       14520f6d2ef01548d6c03a45f81770819a8b6ad4
                       1fccb2a0eedc36ac982005c5a1a09aadc797c887
                       c78fc41bb460efd54e6ce8de2208e511e8d85618
                       f21f89e6
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [f3:fe:8d:7e:ff:4c:bd:88:2a:fc:a1:95:a2:ae:cb:e8:91:61:88:81],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-12-28 07:21:14.258  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-28 07:21:14.260 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-28 07:21:14.262 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-12-28 07:21:14.263 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-28 07:21:14.263  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-12-28 07:21:14.264  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-28 07:21:14.265  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-28 07:21:14.265 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-28 07:21:14.265 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-28 07:21:14.266 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-28 07:21:14.269 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-28 07:21:14.270 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-28 07:21:14.270 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-28 07:21:14.271 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-28 07:21:14.415  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-28 07:21:14.415  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-28 07:21:14.416 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-28 07:21:14.417 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-28 07:21:14.418  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-28 07:21:14.418  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-28 07:21:14.419 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-28 07:21:14.419 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-28 07:21:14.420 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-28 07:21:14.420 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-28 07:21:14.421 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-28 07:21:14.421 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-28 07:21:14.422 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-28 07:21:14.422 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-28 07:21:14.423 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-28 07:21:14.424 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-28 07:21:14.426 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 340608429187132743632836442735356099397392193761
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Dec 28 05:20:36 UTC 2022
           Final Date: Mon Dec 27 05:20:35 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [c2:5f:cf:73:5f:79:f4:bb:18:a2:fc:7f:c7:d9:ac:4c:ac:b6:1e:48],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7475fa841802a2e0ec35cf8119c432251150d23e
                       3c21f07f94287a939edcd6fb71cd16f6616b5d0f
                       84ec3dd3e387ba17f7ee73ab1fa10c31d866f270
                       b1b6d580b2bd36de2261430fea3ebee96eb06367
                       66eda3e9da6ed7ba6747e57d3da59df1e9f20a05
                       fe32cfc099384bf40d9e72043c1fa10c5f078600
                       2b3b19cbe3868254afe3a6dcd7ca085aeae5138b
                       e476d5fa124909274f8e8032e76d8d18d3de3474
                       18d0290a1db6ca72a5dadf3055c135b3c86bd455
                       f9fe1d984e26c9627541e018e3b6b76447efd40a
                       109de0f629b7efbaacb3e2e109867d3bceb93a05
                       f08bf52138e0459b2ee3dbf7616b23ff083aff23
                       0004615c141581c51029226a90b54033b5005f1e
                       c2340388f8a08eaedf6dab5487dc1cc8768d0f88
                       6b96936324888b2286d975a75ad4085ce9aa078d
                       b625c1b5a8d28821c71a6ed6981c41b6e18c96f0
                       14520f6d2ef01548d6c03a45f81770819a8b6ad4
                       1fccb2a0eedc36ac982005c5a1a09aadc797c887
                       c78fc41bb460efd54e6ce8de2208e511e8d85618
                       f21f89e6
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [5b:53:ec:0c:53:9a:2e:5b:a2:da:87:e4:04:e5:2e:f5:21:5c:70:ef],[56:66:d1:a4]
        modulus: d008fc87e049cc2ba106bbab82890d49a72d952b9f8063b6ce490cfc24d56a89bbf709cb8c7cb281f09f5a82cced3ee425e81a145b160660801945366957015aba86f2242a9ae08abce57bc2c9830b943fbc76ede346b15f7988b0f840cf1879c6914105f4cbd8ecec972379456de1d65b84f3a636100278166da6f50a6597ec8391501a7f345550b11b6ffd28bf3f5e5eb2958a73801acb5a3a5fa85a18c59720797de46e80d17656333f4c2b5c74738fcacf0ddd67205be743ead0a6a3b73da20e2a2884a04676cf0eb0052717e1436de7791cc11c1ce407a4c72e855a0dc50aa0e9c4ab095e998a35323b4e9083d1596260e2294cd6233c7427fd620002c9
public exponent: 10001

] 
2022-12-28 07:28:10.499  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-28 07:28:10.503 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-28 07:28:10.505 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-12-28 07:28:10.506 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-28 07:28:10.507  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-12-28 07:28:10.507  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-28 07:28:10.508  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-28 07:28:10.508 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-28 07:28:10.509 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-28 07:28:10.509 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-28 07:28:10.516 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-28 07:28:10.517 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-28 07:28:10.517 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-28 07:28:10.518 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-28 07:28:10.671  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-28 07:28:10.672  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-28 07:28:10.673 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-28 07:28:10.673 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-28 07:28:10.675  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-28 07:28:10.675  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-28 07:28:10.676 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-28 07:28:10.676 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-28 07:28:10.677 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-28 07:28:10.678 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-28 07:28:10.678 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-28 07:28:10.679 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-28 07:28:10.680 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-28 07:28:10.680 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-28 07:28:10.681 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-28 07:28:10.682 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-28 07:28:10.685 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 340608429187132743632836442735356099397392193761
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Dec 28 05:20:36 UTC 2022
           Final Date: Mon Dec 27 05:20:35 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [c2:5f:cf:73:5f:79:f4:bb:18:a2:fc:7f:c7:d9:ac:4c:ac:b6:1e:48],[56:66:d1:a4]
        modulus: ccd8f5db1715e727b93edb63e0d38a6eabba5904dec05d6d98f18fe32b2938b861e74ede436cbdf67f31438710d0f820b55776b8560a209ff739b045ca32a3d96b70a5bf32c8949bf2ee1a2953d544a40241569b4baf908bc5bff3290c46c5ffd5d1c1ffb87dcbc7a82592a474fa9410ebd55be38a5e97cafa91f77afe0f33cad3af4ded0104b98d81c6d3feaf23ba2045512fae1a33cc39ff92cef0df0a6f3d45879eb5af08af30f776597fca95841cefd2b66c7ae250ca3351420e31f446a1cb564e387939eaa31d9a93427ceb1cd2f1fb2a9d51b13ed281d490e0c71391f467755d6830a28690f5239fb287a33998f289cf5bfa775d22d1ece1ca4269b537d4aa0729ee0e3b3221b2d89c968e3e761f6f418c2f03eb4b60685d4e3d2133bfe483f6dc3617a0a847686a836383b6e43fc08cb9b51576f93ce4a03f48ccf1e9db0de10e81765334a15db51b47292134115005c739072b86cbcbaa06bca22cec3da61db15359915ae289ed4085540f8d47e1c3356ee72242c806293569051747
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7475fa841802a2e0ec35cf8119c432251150d23e
                       3c21f07f94287a939edcd6fb71cd16f6616b5d0f
                       84ec3dd3e387ba17f7ee73ab1fa10c31d866f270
                       b1b6d580b2bd36de2261430fea3ebee96eb06367
                       66eda3e9da6ed7ba6747e57d3da59df1e9f20a05
                       fe32cfc099384bf40d9e72043c1fa10c5f078600
                       2b3b19cbe3868254afe3a6dcd7ca085aeae5138b
                       e476d5fa124909274f8e8032e76d8d18d3de3474
                       18d0290a1db6ca72a5dadf3055c135b3c86bd455
                       f9fe1d984e26c9627541e018e3b6b76447efd40a
                       109de0f629b7efbaacb3e2e109867d3bceb93a05
                       f08bf52138e0459b2ee3dbf7616b23ff083aff23
                       0004615c141581c51029226a90b54033b5005f1e
                       c2340388f8a08eaedf6dab5487dc1cc8768d0f88
                       6b96936324888b2286d975a75ad4085ce9aa078d
                       b625c1b5a8d28821c71a6ed6981c41b6e18c96f0
                       14520f6d2ef01548d6c03a45f81770819a8b6ad4
                       1fccb2a0eedc36ac982005c5a1a09aadc797c887
                       c78fc41bb460efd54e6ce8de2208e511e8d85618
                       f21f89e6
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ce:54:56:83:77:c4:b7:3e:b5:78:7b:eb:15:d6:fb:e3:31:ba:a7:31],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-12-28 07:33:25.758  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-28 07:33:25.759 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-28 07:33:25.761 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-12-28 07:33:25.762 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-28 07:33:25.762  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-12-28 07:33:25.763  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-28 07:33:25.763  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-28 07:33:25.764 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-28 07:33:25.764 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-28 07:33:25.765 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-28 07:33:25.768 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-28 07:33:25.769 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-28 07:33:25.769 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-28 07:33:25.770 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-28 07:33:25.887  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-28 07:33:25.887  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-28 07:33:25.888 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-28 07:33:25.888 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-28 07:33:25.889  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-28 07:33:25.890  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-28 07:33:25.890 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-28 07:33:25.890 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-28 07:33:25.890 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-28 07:33:25.891 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-28 07:33:25.891 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-28 07:33:25.892 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-28 07:33:25.893 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-28 07:33:25.893 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-28 07:33:25.893 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-28 07:33:25.894 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-28 07:33:25.897 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 340608429187132743632836442735356099397392193761
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Dec 28 05:20:36 UTC 2022
           Final Date: Mon Dec 27 05:20:35 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [c2:5f:cf:73:5f:79:f4:bb:18:a2:fc:7f:c7:d9:ac:4c:ac:b6:1e:48],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7475fa841802a2e0ec35cf8119c432251150d23e
                       3c21f07f94287a939edcd6fb71cd16f6616b5d0f
                       84ec3dd3e387ba17f7ee73ab1fa10c31d866f270
                       b1b6d580b2bd36de2261430fea3ebee96eb06367
                       66eda3e9da6ed7ba6747e57d3da59df1e9f20a05
                       fe32cfc099384bf40d9e72043c1fa10c5f078600
                       2b3b19cbe3868254afe3a6dcd7ca085aeae5138b
                       e476d5fa124909274f8e8032e76d8d18d3de3474
                       18d0290a1db6ca72a5dadf3055c135b3c86bd455
                       f9fe1d984e26c9627541e018e3b6b76447efd40a
                       109de0f629b7efbaacb3e2e109867d3bceb93a05
                       f08bf52138e0459b2ee3dbf7616b23ff083aff23
                       0004615c141581c51029226a90b54033b5005f1e
                       c2340388f8a08eaedf6dab5487dc1cc8768d0f88
                       6b96936324888b2286d975a75ad4085ce9aa078d
                       b625c1b5a8d28821c71a6ed6981c41b6e18c96f0
                       14520f6d2ef01548d6c03a45f81770819a8b6ad4
                       1fccb2a0eedc36ac982005c5a1a09aadc797c887
                       c78fc41bb460efd54e6ce8de2208e511e8d85618
                       f21f89e6
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [5e:dc:c8:ea:f4:a1:d1:f4:71:b4:26:a9:58:7c:25:d9:d6:3c:e9:dc],[56:66:d1:a4]
        modulus: d3b947a272f7fcbdb93437bd434d97ef7fa303e9450d4455772693de3581fa4b2fada27bf8ccfa64798fbab4a13b004592c7c1407d757db9ff1fe1b99c74f3ee4a6ab83c9512edbee3b12ab8ec18e9e97799d11788a1b3a8cedd32e6d5622f21aeb5b0ac4fa12760816d66fa43364ecf4341379802120c8f4c460f2638be6d004ba6cfa69109ecb917103d21ad098d5eab238de38adb4932949570644e7c25488627c36f49f63f8f238511f922db2673bc104b228e008ea936ea5131b15ddf1466a71a36ebcab1cb85629bc86552eca8155de7aeae179d69f1ccd45a39603fe53859fd8da1719b68836ba7ea49a5ed34746858ce9e4f35348bb5534870d16b9d
public exponent: 10001

] 
2022-12-28 07:40:20.373  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-28 07:40:20.375 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-28 07:40:20.378 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-12-28 07:40:20.379 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-28 07:40:20.379  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-12-28 07:40:20.380  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-28 07:40:20.380  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-28 07:40:20.381 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-28 07:40:20.381 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-28 07:40:20.382 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-28 07:40:20.387 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-28 07:40:20.388 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-28 07:40:20.389 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-28 07:40:20.389 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-28 07:40:20.539  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-28 07:40:20.540  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-28 07:40:20.540 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-28 07:40:20.540 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-28 07:40:20.542  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-28 07:40:20.542  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-28 07:40:20.543 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-28 07:40:20.543 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-28 07:40:20.543 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-28 07:40:20.544 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-28 07:40:20.544 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-28 07:40:20.544 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-28 07:40:20.545 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-28 07:40:20.545 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-28 07:40:20.546 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-28 07:40:20.546 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-28 07:40:20.550 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 340608429187132743632836442735356099397392193761
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Dec 28 05:20:36 UTC 2022
           Final Date: Mon Dec 27 05:20:35 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [c2:5f:cf:73:5f:79:f4:bb:18:a2:fc:7f:c7:d9:ac:4c:ac:b6:1e:48],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7475fa841802a2e0ec35cf8119c432251150d23e
                       3c21f07f94287a939edcd6fb71cd16f6616b5d0f
                       84ec3dd3e387ba17f7ee73ab1fa10c31d866f270
                       b1b6d580b2bd36de2261430fea3ebee96eb06367
                       66eda3e9da6ed7ba6747e57d3da59df1e9f20a05
                       fe32cfc099384bf40d9e72043c1fa10c5f078600
                       2b3b19cbe3868254afe3a6dcd7ca085aeae5138b
                       e476d5fa124909274f8e8032e76d8d18d3de3474
                       18d0290a1db6ca72a5dadf3055c135b3c86bd455
                       f9fe1d984e26c9627541e018e3b6b76447efd40a
                       109de0f629b7efbaacb3e2e109867d3bceb93a05
                       f08bf52138e0459b2ee3dbf7616b23ff083aff23
                       0004615c141581c51029226a90b54033b5005f1e
                       c2340388f8a08eaedf6dab5487dc1cc8768d0f88
                       6b96936324888b2286d975a75ad4085ce9aa078d
                       b625c1b5a8d28821c71a6ed6981c41b6e18c96f0
                       14520f6d2ef01548d6c03a45f81770819a8b6ad4
                       1fccb2a0eedc36ac982005c5a1a09aadc797c887
                       c78fc41bb460efd54e6ce8de2208e511e8d85618
                       f21f89e6
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [8c:d3:22:bc:96:3e:ff:28:c0:66:36:63:1c:45:98:bf:e2:13:93:cb],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-12-28 07:45:38.858  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-28 07:45:38.859 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-28 07:45:38.862 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-12-28 07:45:38.863 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-28 07:45:38.863  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-12-28 07:45:38.864  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-28 07:45:38.864  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-28 07:45:38.864 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-28 07:45:38.864 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-28 07:45:38.865 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-28 07:45:38.868 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-28 07:45:38.869 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-28 07:45:38.869 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-28 07:45:38.870 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-28 07:45:39.037  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-28 07:45:39.038  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-28 07:45:39.038 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-28 07:45:39.039 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-28 07:45:39.040  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-28 07:45:39.041  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-28 07:45:39.041 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-28 07:45:39.042 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-28 07:45:39.042 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-28 07:45:39.043 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-28 07:45:39.043 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-28 07:45:39.043 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-28 07:45:39.044 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-28 07:45:39.044 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-28 07:45:39.044 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-28 07:45:39.045 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-28 07:45:39.047 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 340608429187132743632836442735356099397392193761
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Dec 28 05:20:36 UTC 2022
           Final Date: Mon Dec 27 05:20:35 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [c2:5f:cf:73:5f:79:f4:bb:18:a2:fc:7f:c7:d9:ac:4c:ac:b6:1e:48],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7475fa841802a2e0ec35cf8119c432251150d23e
                       3c21f07f94287a939edcd6fb71cd16f6616b5d0f
                       84ec3dd3e387ba17f7ee73ab1fa10c31d866f270
                       b1b6d580b2bd36de2261430fea3ebee96eb06367
                       66eda3e9da6ed7ba6747e57d3da59df1e9f20a05
                       fe32cfc099384bf40d9e72043c1fa10c5f078600
                       2b3b19cbe3868254afe3a6dcd7ca085aeae5138b
                       e476d5fa124909274f8e8032e76d8d18d3de3474
                       18d0290a1db6ca72a5dadf3055c135b3c86bd455
                       f9fe1d984e26c9627541e018e3b6b76447efd40a
                       109de0f629b7efbaacb3e2e109867d3bceb93a05
                       f08bf52138e0459b2ee3dbf7616b23ff083aff23
                       0004615c141581c51029226a90b54033b5005f1e
                       c2340388f8a08eaedf6dab5487dc1cc8768d0f88
                       6b96936324888b2286d975a75ad4085ce9aa078d
                       b625c1b5a8d28821c71a6ed6981c41b6e18c96f0
                       14520f6d2ef01548d6c03a45f81770819a8b6ad4
                       1fccb2a0eedc36ac982005c5a1a09aadc797c887
                       c78fc41bb460efd54e6ce8de2208e511e8d85618
                       f21f89e6
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [72:3d:23:ca:b8:3c:c7:13:a4:0c:49:fd:6a:3d:dc:37:e5:be:25:ce],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-12-28 07:52:23.206  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-28 07:52:23.210 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-28 07:52:23.212 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-12-28 07:52:23.213 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-28 07:52:23.214  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-12-28 07:52:23.214  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-28 07:52:23.215  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-28 07:52:23.215 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-28 07:52:23.216 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-28 07:52:23.216 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-28 07:52:23.220 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-28 07:52:23.221 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-28 07:52:23.221 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-28 07:52:23.222 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-28 07:52:23.487  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-28 07:52:23.489  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-28 07:52:23.490 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-28 07:52:23.490 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-28 07:52:23.492  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-28 07:52:23.493  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-28 07:52:23.494 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-28 07:52:23.494 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-28 07:52:23.498 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-28 07:52:23.499 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-28 07:52:23.500 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-28 07:52:23.501 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-28 07:52:23.502 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-28 07:52:23.503 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-28 07:52:23.503 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-28 07:52:23.504 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-28 07:52:23.509 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 340608429187132743632836442735356099397392193761
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Dec 28 05:20:36 UTC 2022
           Final Date: Mon Dec 27 05:20:35 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [c2:5f:cf:73:5f:79:f4:bb:18:a2:fc:7f:c7:d9:ac:4c:ac:b6:1e:48],[56:66:d1:a4]
        modulus: ccd8f5db1715e727b93edb63e0d38a6eabba5904dec05d6d98f18fe32b2938b861e74ede436cbdf67f31438710d0f820b55776b8560a209ff739b045ca32a3d96b70a5bf32c8949bf2ee1a2953d544a40241569b4baf908bc5bff3290c46c5ffd5d1c1ffb87dcbc7a82592a474fa9410ebd55be38a5e97cafa91f77afe0f33cad3af4ded0104b98d81c6d3feaf23ba2045512fae1a33cc39ff92cef0df0a6f3d45879eb5af08af30f776597fca95841cefd2b66c7ae250ca3351420e31f446a1cb564e387939eaa31d9a93427ceb1cd2f1fb2a9d51b13ed281d490e0c71391f467755d6830a28690f5239fb287a33998f289cf5bfa775d22d1ece1ca4269b537d4aa0729ee0e3b3221b2d89c968e3e761f6f418c2f03eb4b60685d4e3d2133bfe483f6dc3617a0a847686a836383b6e43fc08cb9b51576f93ce4a03f48ccf1e9db0de10e81765334a15db51b47292134115005c739072b86cbcbaa06bca22cec3da61db15359915ae289ed4085540f8d47e1c3356ee72242c806293569051747
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7475fa841802a2e0ec35cf8119c432251150d23e
                       3c21f07f94287a939edcd6fb71cd16f6616b5d0f
                       84ec3dd3e387ba17f7ee73ab1fa10c31d866f270
                       b1b6d580b2bd36de2261430fea3ebee96eb06367
                       66eda3e9da6ed7ba6747e57d3da59df1e9f20a05
                       fe32cfc099384bf40d9e72043c1fa10c5f078600
                       2b3b19cbe3868254afe3a6dcd7ca085aeae5138b
                       e476d5fa124909274f8e8032e76d8d18d3de3474
                       18d0290a1db6ca72a5dadf3055c135b3c86bd455
                       f9fe1d984e26c9627541e018e3b6b76447efd40a
                       109de0f629b7efbaacb3e2e109867d3bceb93a05
                       f08bf52138e0459b2ee3dbf7616b23ff083aff23
                       0004615c141581c51029226a90b54033b5005f1e
                       c2340388f8a08eaedf6dab5487dc1cc8768d0f88
                       6b96936324888b2286d975a75ad4085ce9aa078d
                       b625c1b5a8d28821c71a6ed6981c41b6e18c96f0
                       14520f6d2ef01548d6c03a45f81770819a8b6ad4
                       1fccb2a0eedc36ac982005c5a1a09aadc797c887
                       c78fc41bb460efd54e6ce8de2208e511e8d85618
                       f21f89e6
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [99:73:5c:c9:2b:63:ce:f5:99:85:e3:22:4e:eb:f8:af:e8:66:03:61],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-12-28 07:58:56.955  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-28 07:58:56.957 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-28 07:58:56.959 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-12-28 07:58:56.959 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-28 07:58:56.961  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-12-28 07:58:56.961  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-28 07:58:56.962  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-28 07:58:56.962 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-28 07:58:56.962 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-28 07:58:56.963 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-28 07:58:56.968 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-28 07:58:56.969 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-28 07:58:56.970 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-28 07:58:56.970 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-28 07:58:57.132  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-28 07:58:57.135  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-28 07:58:57.135 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-28 07:58:57.136 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-28 07:58:57.137  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-28 07:58:57.138  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-28 07:58:57.138 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-28 07:58:57.138 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-28 07:58:57.138 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-28 07:58:57.139 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-28 07:58:57.139 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-28 07:58:57.139 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-28 07:58:57.140 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-28 07:58:57.140 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-28 07:58:57.140 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-28 07:58:57.143 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-28 07:58:57.148 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 340608429187132743632836442735356099397392193761
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Dec 28 05:20:36 UTC 2022
           Final Date: Mon Dec 27 05:20:35 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [c2:5f:cf:73:5f:79:f4:bb:18:a2:fc:7f:c7:d9:ac:4c:ac:b6:1e:48],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7475fa841802a2e0ec35cf8119c432251150d23e
                       3c21f07f94287a939edcd6fb71cd16f6616b5d0f
                       84ec3dd3e387ba17f7ee73ab1fa10c31d866f270
                       b1b6d580b2bd36de2261430fea3ebee96eb06367
                       66eda3e9da6ed7ba6747e57d3da59df1e9f20a05
                       fe32cfc099384bf40d9e72043c1fa10c5f078600
                       2b3b19cbe3868254afe3a6dcd7ca085aeae5138b
                       e476d5fa124909274f8e8032e76d8d18d3de3474
                       18d0290a1db6ca72a5dadf3055c135b3c86bd455
                       f9fe1d984e26c9627541e018e3b6b76447efd40a
                       109de0f629b7efbaacb3e2e109867d3bceb93a05
                       f08bf52138e0459b2ee3dbf7616b23ff083aff23
                       0004615c141581c51029226a90b54033b5005f1e
                       c2340388f8a08eaedf6dab5487dc1cc8768d0f88
                       6b96936324888b2286d975a75ad4085ce9aa078d
                       b625c1b5a8d28821c71a6ed6981c41b6e18c96f0
                       14520f6d2ef01548d6c03a45f81770819a8b6ad4
                       1fccb2a0eedc36ac982005c5a1a09aadc797c887
                       c78fc41bb460efd54e6ce8de2208e511e8d85618
                       f21f89e6
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [a1:9a:95:61:80:c5:99:c7:fa:6d:96:4b:6d:4b:80:c8:93:79:87:10],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-12-28 07:59:16.046  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-28 07:59:16.049 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-28 07:59:16.054 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-12-28 07:59:16.055 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-28 07:59:16.055  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-12-28 07:59:16.056  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-28 07:59:16.057  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-28 07:59:16.057 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-28 07:59:16.057 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-28 07:59:16.058 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-28 07:59:16.063 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-28 07:59:16.066 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-28 07:59:16.067 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-28 07:59:16.068 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-28 07:59:16.177  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-28 07:59:16.178  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-28 07:59:16.178 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-28 07:59:16.179 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-28 07:59:16.180  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-28 07:59:16.180  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-28 07:59:16.181 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-28 07:59:16.181 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-28 07:59:16.181 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-28 07:59:16.182 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-28 07:59:16.182 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-28 07:59:16.183 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-28 07:59:16.183 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-28 07:59:16.184 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-28 07:59:16.184 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-28 07:59:16.184 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-28 07:59:16.188 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 340608429187132743632836442735356099397392193761
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Dec 28 05:20:36 UTC 2022
           Final Date: Mon Dec 27 05:20:35 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [c2:5f:cf:73:5f:79:f4:bb:18:a2:fc:7f:c7:d9:ac:4c:ac:b6:1e:48],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7475fa841802a2e0ec35cf8119c432251150d23e
                       3c21f07f94287a939edcd6fb71cd16f6616b5d0f
                       84ec3dd3e387ba17f7ee73ab1fa10c31d866f270
                       b1b6d580b2bd36de2261430fea3ebee96eb06367
                       66eda3e9da6ed7ba6747e57d3da59df1e9f20a05
                       fe32cfc099384bf40d9e72043c1fa10c5f078600
                       2b3b19cbe3868254afe3a6dcd7ca085aeae5138b
                       e476d5fa124909274f8e8032e76d8d18d3de3474
                       18d0290a1db6ca72a5dadf3055c135b3c86bd455
                       f9fe1d984e26c9627541e018e3b6b76447efd40a
                       109de0f629b7efbaacb3e2e109867d3bceb93a05
                       f08bf52138e0459b2ee3dbf7616b23ff083aff23
                       0004615c141581c51029226a90b54033b5005f1e
                       c2340388f8a08eaedf6dab5487dc1cc8768d0f88
                       6b96936324888b2286d975a75ad4085ce9aa078d
                       b625c1b5a8d28821c71a6ed6981c41b6e18c96f0
                       14520f6d2ef01548d6c03a45f81770819a8b6ad4
                       1fccb2a0eedc36ac982005c5a1a09aadc797c887
                       c78fc41bb460efd54e6ce8de2208e511e8d85618
                       f21f89e6
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [d8:43:82:14:c9:fc:3e:2c:d3:d3:85:62:b5:47:0e:d3:32:1c:fa:a5],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-12-28 08:22:07.162  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-28 08:22:07.167 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-28 08:22:07.171 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-12-28 08:22:07.172 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-28 08:22:07.173  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-12-28 08:22:07.174  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-28 08:22:07.175  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-28 08:22:07.175 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-28 08:22:07.176 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-28 08:22:07.176 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-28 08:22:07.181 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-28 08:22:07.183 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-28 08:22:07.184 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-28 08:22:07.184 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-28 08:22:07.372  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-28 08:22:07.373  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-28 08:22:07.374 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-28 08:22:07.374 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-28 08:22:07.375  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-28 08:22:07.376  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-28 08:22:07.377 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-28 08:22:07.377 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-28 08:22:07.377 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-28 08:22:07.378 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-28 08:22:07.379 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-28 08:22:07.379 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-28 08:22:07.380 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-28 08:22:07.380 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-28 08:22:07.380 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-28 08:22:07.381 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-28 08:22:07.385 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 340608429187132743632836442735356099397392193761
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Dec 28 05:20:36 UTC 2022
           Final Date: Mon Dec 27 05:20:35 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [c2:5f:cf:73:5f:79:f4:bb:18:a2:fc:7f:c7:d9:ac:4c:ac:b6:1e:48],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7475fa841802a2e0ec35cf8119c432251150d23e
                       3c21f07f94287a939edcd6fb71cd16f6616b5d0f
                       84ec3dd3e387ba17f7ee73ab1fa10c31d866f270
                       b1b6d580b2bd36de2261430fea3ebee96eb06367
                       66eda3e9da6ed7ba6747e57d3da59df1e9f20a05
                       fe32cfc099384bf40d9e72043c1fa10c5f078600
                       2b3b19cbe3868254afe3a6dcd7ca085aeae5138b
                       e476d5fa124909274f8e8032e76d8d18d3de3474
                       18d0290a1db6ca72a5dadf3055c135b3c86bd455
                       f9fe1d984e26c9627541e018e3b6b76447efd40a
                       109de0f629b7efbaacb3e2e109867d3bceb93a05
                       f08bf52138e0459b2ee3dbf7616b23ff083aff23
                       0004615c141581c51029226a90b54033b5005f1e
                       c2340388f8a08eaedf6dab5487dc1cc8768d0f88
                       6b96936324888b2286d975a75ad4085ce9aa078d
                       b625c1b5a8d28821c71a6ed6981c41b6e18c96f0
                       14520f6d2ef01548d6c03a45f81770819a8b6ad4
                       1fccb2a0eedc36ac982005c5a1a09aadc797c887
                       c78fc41bb460efd54e6ce8de2208e511e8d85618
                       f21f89e6
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [cc:ed:cb:8b:89:f7:dd:76:80:92:20:92:ba:ca:00:6d:f2:84:27:15],[56:66:d1:a4]
        modulus: d20104a4635e9dc33d6fbfc86512155c02b552efcbf72a523c5760d960a28fe0b5b032a0d86b06143aecc2a4f8f381adaf546fdabc01b2a915b8366d02ed5e14b75215bbc5693c98393f2fbaa5eb9e62a51856fb1413324a193a0e62036fd92568308a791fb599376ebbf52a05b5a4fe069fb704e003f63014379005848ef6c74f3ed66da04cb0e1548330fb7ea66870d8e30b8c30d3b0e1e40e915d68252f16dea7ed75d3a354be9954340277036e67565c1a7d9ecbb3ec62ef7820fbebb48d7f9a2f40d49a77cf80827b0d4a5dd6fd6600b4f2b549fc47276d5a8e174d66e95321a5fc82bbc8719570d505a0095bac69362ee7a920ab3061c81016eb93213f
public exponent: 10001

] 
2022-12-28 08:22:14.250  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-28 08:22:14.251 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-28 08:22:14.252 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-12-28 08:22:14.252 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-28 08:22:14.253  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-12-28 08:22:14.253  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-28 08:22:14.253  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-28 08:22:14.254 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-28 08:22:14.254 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-28 08:22:14.254 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-28 08:22:14.258 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-28 08:22:14.258 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-28 08:22:14.259 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-28 08:22:14.259 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-28 08:22:14.379  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-28 08:22:14.379  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-28 08:22:14.379 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-28 08:22:14.380 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-28 08:22:14.381  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-28 08:22:14.381  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-28 08:22:14.381 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-28 08:22:14.381 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-28 08:22:14.382 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-28 08:22:14.382 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-28 08:22:14.382 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-28 08:22:14.383 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-28 08:22:14.383 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-28 08:22:14.383 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-28 08:22:14.384 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-28 08:22:14.384 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-28 08:22:14.387 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 340608429187132743632836442735356099397392193761
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Dec 28 05:20:36 UTC 2022
           Final Date: Mon Dec 27 05:20:35 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [c2:5f:cf:73:5f:79:f4:bb:18:a2:fc:7f:c7:d9:ac:4c:ac:b6:1e:48],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7475fa841802a2e0ec35cf8119c432251150d23e
                       3c21f07f94287a939edcd6fb71cd16f6616b5d0f
                       84ec3dd3e387ba17f7ee73ab1fa10c31d866f270
                       b1b6d580b2bd36de2261430fea3ebee96eb06367
                       66eda3e9da6ed7ba6747e57d3da59df1e9f20a05
                       fe32cfc099384bf40d9e72043c1fa10c5f078600
                       2b3b19cbe3868254afe3a6dcd7ca085aeae5138b
                       e476d5fa124909274f8e8032e76d8d18d3de3474
                       18d0290a1db6ca72a5dadf3055c135b3c86bd455
                       f9fe1d984e26c9627541e018e3b6b76447efd40a
                       109de0f629b7efbaacb3e2e109867d3bceb93a05
                       f08bf52138e0459b2ee3dbf7616b23ff083aff23
                       0004615c141581c51029226a90b54033b5005f1e
                       c2340388f8a08eaedf6dab5487dc1cc8768d0f88
                       6b96936324888b2286d975a75ad4085ce9aa078d
                       b625c1b5a8d28821c71a6ed6981c41b6e18c96f0
                       14520f6d2ef01548d6c03a45f81770819a8b6ad4
                       1fccb2a0eedc36ac982005c5a1a09aadc797c887
                       c78fc41bb460efd54e6ce8de2208e511e8d85618
                       f21f89e6
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [2d:ad:12:8a:9b:94:5c:04:3a:c9:2b:3e:e2:45:bb:82:fa:df:d3:12],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

]