Results

By type

          2023-01-05 05:36:16,310 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2023-01-05 05:36:18,017 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2023-01-05 05:36:18.833  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Jan 05, 2023 5:36:21 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Jan 05, 2023 5:36:21 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Jan 05, 2023 5:36:21 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Jan 05, 2023 5:36:21 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2023-01-05 05:36:22.416 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2023-01-05 05:36:22.865  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2023-01-05 05:36:23.097  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2023-01-05 05:36:24.662 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2023-01-05 05:36:24.666 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
2023-01-05 05:36:24.668 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2023-01-05 05:36:24.673 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2023-01-05 05:36:24.726 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2023-01-05 05:36:24.731 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/docs]}: redirectToUi(HttpServletRequest)
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
2023-01-05 05:36:24.865 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2023-01-05 05:36:26.080 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Jan 05, 2023 5:36:27 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2023-01-05 05:36:27.970  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 12.73 seconds (JVM running for 14.856)
Jan 05, 2023 5:36:52 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2023-01-05 06:58:37.836  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-05 06:58:37.854 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-05 06:58:37.918 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-05 06:58:37.927 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-05 06:58:37.969  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-05 06:58:37.973  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-05 06:58:37.974  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-05 06:58:37.976 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-05 06:58:37.976 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-05 06:58:37.983 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-05 06:58:38.001 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-05 06:58:38.008 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-05 06:58:38.112 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-05 06:58:38.136 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-05 06:58:38.136 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-05 06:58:38.140 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-05 06:58:38.965  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-05 06:58:38.968  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-05 06:58:38.969 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-05 06:58:38.971 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-05 06:58:38.986  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-05 06:58:38.988  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-05 06:58:38.990 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-05 06:58:38.990 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-05 06:58:38.991 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-05 06:58:39.021 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-05 06:58:39.023 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-05 06:58:39.024 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-05 06:58:39.040 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-05 06:58:39.041 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-05 06:58:39.042 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-05 06:58:39.044 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-05 06:58:39.097 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 647802893283983145817296640880925041281381179625
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Jan 05 05:09:40 UTC 2023
           Final Date: Tue Jan 04 05:09:39 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [cc:f1:42:6e:28:7d:7f:2d:8d:50:4a:2a:43:79:45:d1:95:4c:56:9c],[56:66:d1:a4]
        modulus: d2401c2e101f1e4e4b6c730380de8f4d83ea97abc0d05968148b17ecfec8e4a2851ff1306e1643a8177a5f6cdff7fbca0c43dc9712a3d116988908eee29b9d1daabb145942b8f3267210f98eb5c966d093030aca858cff2c2175636806b0e491e7bf4616d43adcf74204e766dab8a4a9628d18fae0096afe5e561350cb194b9ea37d8d1dc30da20de1f3d8d9a4d030f968e63774b013fbc667c06c80a5d996efcab96628390dda54d4faaafc0af764c6f27938cb9e2694779101ff4e07959d80aced418048d37ba008f425ae073290c982005ce65f9c963d97337a92d56d0bf46ce552e85f99094032d88ec0b3a9f6e76814474435f1b496c2f5b2fb955f7ca2787b27ac1c0ff86783ce7260703e6729b1133b98ce5de69262658055009ffe3b98f70ad5e63994c5c1220576e2dd964879be782f7fa2d080c431c7e69a9f7b84e4de8db3947e889d18f18a36042f214a29258fff8ef94002887bad88c77e3111a8579149d267c87d1377d299dc4e1dba0e22695f45bf5a9b2fd3f29dd13e4973
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3ad3c0eda0a06e4a4b6ac15280d78de6f149d932
                       a8153598d008c70a162df18f6067ac748606cd9f
                       61468ecd9b87b6a95b406b4d83f2d3cd7566ea03
                       176554261c15337c9b35c0ff1362f3de1888f279
                       e83062305b2ea5535c6db26e31fcf5ac40bfd1e4
                       ebf929bffd425f5b5c2c1a80ffde371196be8a2d
                       28b7adabfb3fa1ff6716321f37d5287ad50ab199
                       f854a377b67470b368a92733f26548f64f1dbc31
                       02f50e9d6374ceef7074d6c146a1d9bb762470be
                       bd3fc600b5b424fd8310fb565e478b7f1873dc52
                       58faac1a083d0d1ecff7559ea51da8c6d35d44ef
                       2cf1c3720d96f18546744197e0d1a9d7e74f9228
                       cc68b6cf891bdbbd1b41dd5b89a6992002ca681e
                       1b98186384b2bc33f8d9038793a890809475f48a
                       778c8a5b0243991f4a9752d3da0eac999a6d6e79
                       d6e505c1a95cf06a13f5dfbeb200bd04b187be2c
                       0d93449c72d68572cfe158f65e2d87376a67fb07
                       764fb34f1b6e715e78e302252ae55e0d464b0e3a
                       80e032b70e50ea8ab4e0df114f300110b85828a2
                       9ebc4bf5
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [67:bc:eb:90:95:48:da:cc:04:f4:a7:9a:2d:a3:33:9e:84:e3:a8:ad],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-05 07:00:24.879  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-05 07:00:24.881 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-05 07:00:24.883 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2023-01-05 07:00:24.884 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-05 07:00:24.885  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2023-01-05 07:00:24.886  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-05 07:00:24.887  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-05 07:00:24.888 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-05 07:00:24.888 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-05 07:00:24.889 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-05 07:00:24.896 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-05 07:00:24.897 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-05 07:00:24.898 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-05 07:00:24.898 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-05 07:00:25.056  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-05 07:00:25.057  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-05 07:00:25.057 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-05 07:00:25.058 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-05 07:00:25.064  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-05 07:00:25.064  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-05 07:00:25.065 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-05 07:00:25.065 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-05 07:00:25.066 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-05 07:00:25.067 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-05 07:00:25.067 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-05 07:00:25.068 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-05 07:00:25.069 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-05 07:00:25.069 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-05 07:00:25.069 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-05 07:00:25.070 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-05 07:00:25.075 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 647802893283983145817296640880925041281381179625
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Jan 05 05:09:40 UTC 2023
           Final Date: Tue Jan 04 05:09:39 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [cc:f1:42:6e:28:7d:7f:2d:8d:50:4a:2a:43:79:45:d1:95:4c:56:9c],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3ad3c0eda0a06e4a4b6ac15280d78de6f149d932
                       a8153598d008c70a162df18f6067ac748606cd9f
                       61468ecd9b87b6a95b406b4d83f2d3cd7566ea03
                       176554261c15337c9b35c0ff1362f3de1888f279
                       e83062305b2ea5535c6db26e31fcf5ac40bfd1e4
                       ebf929bffd425f5b5c2c1a80ffde371196be8a2d
                       28b7adabfb3fa1ff6716321f37d5287ad50ab199
                       f854a377b67470b368a92733f26548f64f1dbc31
                       02f50e9d6374ceef7074d6c146a1d9bb762470be
                       bd3fc600b5b424fd8310fb565e478b7f1873dc52
                       58faac1a083d0d1ecff7559ea51da8c6d35d44ef
                       2cf1c3720d96f18546744197e0d1a9d7e74f9228
                       cc68b6cf891bdbbd1b41dd5b89a6992002ca681e
                       1b98186384b2bc33f8d9038793a890809475f48a
                       778c8a5b0243991f4a9752d3da0eac999a6d6e79
                       d6e505c1a95cf06a13f5dfbeb200bd04b187be2c
                       0d93449c72d68572cfe158f65e2d87376a67fb07
                       764fb34f1b6e715e78e302252ae55e0d464b0e3a
                       80e032b70e50ea8ab4e0df114f300110b85828a2
                       9ebc4bf5
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [6c:6f:9e:7c:d2:f2:9b:c2:ca:a0:08:32:40:38:99:df:e4:7a:92:cd],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-05 07:02:27.119  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-05 07:02:27.122 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-05 07:02:27.124 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2023-01-05 07:02:27.125 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-05 07:02:27.127  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2023-01-05 07:02:27.128  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-05 07:02:27.128  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-05 07:02:27.128 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-05 07:02:27.129 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-05 07:02:27.130 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-05 07:02:27.136 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-05 07:02:27.137 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-05 07:02:27.138 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-05 07:02:27.138 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-05 07:02:27.312  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-05 07:02:27.313  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-05 07:02:27.314 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-05 07:02:27.314 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-05 07:02:27.319  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-05 07:02:27.319  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-05 07:02:27.320 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-05 07:02:27.320 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-05 07:02:27.321 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-05 07:02:27.322 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-05 07:02:27.322 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-05 07:02:27.323 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-05 07:02:27.324 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-05 07:02:27.324 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-05 07:02:27.325 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-05 07:02:27.326 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-05 07:02:27.330 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 647802893283983145817296640880925041281381179625
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Jan 05 05:09:40 UTC 2023
           Final Date: Tue Jan 04 05:09:39 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [cc:f1:42:6e:28:7d:7f:2d:8d:50:4a:2a:43:79:45:d1:95:4c:56:9c],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3ad3c0eda0a06e4a4b6ac15280d78de6f149d932
                       a8153598d008c70a162df18f6067ac748606cd9f
                       61468ecd9b87b6a95b406b4d83f2d3cd7566ea03
                       176554261c15337c9b35c0ff1362f3de1888f279
                       e83062305b2ea5535c6db26e31fcf5ac40bfd1e4
                       ebf929bffd425f5b5c2c1a80ffde371196be8a2d
                       28b7adabfb3fa1ff6716321f37d5287ad50ab199
                       f854a377b67470b368a92733f26548f64f1dbc31
                       02f50e9d6374ceef7074d6c146a1d9bb762470be
                       bd3fc600b5b424fd8310fb565e478b7f1873dc52
                       58faac1a083d0d1ecff7559ea51da8c6d35d44ef
                       2cf1c3720d96f18546744197e0d1a9d7e74f9228
                       cc68b6cf891bdbbd1b41dd5b89a6992002ca681e
                       1b98186384b2bc33f8d9038793a890809475f48a
                       778c8a5b0243991f4a9752d3da0eac999a6d6e79
                       d6e505c1a95cf06a13f5dfbeb200bd04b187be2c
                       0d93449c72d68572cfe158f65e2d87376a67fb07
                       764fb34f1b6e715e78e302252ae55e0d464b0e3a
                       80e032b70e50ea8ab4e0df114f300110b85828a2
                       9ebc4bf5
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [f7:48:2a:5e:4d:10:45:a0:01:a6:7e:1c:00:07:4c:fd:c5:be:73:3b],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-05 07:05:31.004  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-05 07:05:31.006 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-05 07:05:31.009 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-05 07:05:31.009 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-05 07:05:31.010  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-05 07:05:31.011  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-05 07:05:31.027  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-05 07:05:31.028 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-05 07:05:31.029 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-05 07:05:31.030 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-05 07:05:31.034 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-05 07:05:31.035 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-05 07:05:31.035 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-05 07:05:31.036 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-05 07:05:31.352  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-05 07:05:31.353  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-05 07:05:31.353 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-05 07:05:31.353 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-05 07:05:31.355  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-05 07:05:31.355  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-05 07:05:31.356 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-05 07:05:31.356 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-05 07:05:31.357 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-05 07:05:31.358 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-05 07:05:31.358 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-05 07:05:31.358 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-05 07:05:31.359 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-05 07:05:31.360 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-05 07:05:31.360 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-05 07:05:31.361 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-05 07:05:31.366 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 647802893283983145817296640880925041281381179625
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Jan 05 05:09:40 UTC 2023
           Final Date: Tue Jan 04 05:09:39 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [cc:f1:42:6e:28:7d:7f:2d:8d:50:4a:2a:43:79:45:d1:95:4c:56:9c],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3ad3c0eda0a06e4a4b6ac15280d78de6f149d932
                       a8153598d008c70a162df18f6067ac748606cd9f
                       61468ecd9b87b6a95b406b4d83f2d3cd7566ea03
                       176554261c15337c9b35c0ff1362f3de1888f279
                       e83062305b2ea5535c6db26e31fcf5ac40bfd1e4
                       ebf929bffd425f5b5c2c1a80ffde371196be8a2d
                       28b7adabfb3fa1ff6716321f37d5287ad50ab199
                       f854a377b67470b368a92733f26548f64f1dbc31
                       02f50e9d6374ceef7074d6c146a1d9bb762470be
                       bd3fc600b5b424fd8310fb565e478b7f1873dc52
                       58faac1a083d0d1ecff7559ea51da8c6d35d44ef
                       2cf1c3720d96f18546744197e0d1a9d7e74f9228
                       cc68b6cf891bdbbd1b41dd5b89a6992002ca681e
                       1b98186384b2bc33f8d9038793a890809475f48a
                       778c8a5b0243991f4a9752d3da0eac999a6d6e79
                       d6e505c1a95cf06a13f5dfbeb200bd04b187be2c
                       0d93449c72d68572cfe158f65e2d87376a67fb07
                       764fb34f1b6e715e78e302252ae55e0d464b0e3a
                       80e032b70e50ea8ab4e0df114f300110b85828a2
                       9ebc4bf5
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [01:35:20:24:30:65:fb:1e:42:1a:1b:2a:f3:a9:b2:ff:6a:12:3e:c8],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-05 07:12:43.643  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-05 07:12:43.646 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-05 07:12:43.648 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-05 07:12:43.649 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-05 07:12:43.650  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-05 07:12:43.650  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-05 07:12:43.651  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-05 07:12:43.652 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-05 07:12:43.653 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-05 07:12:43.653 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-05 07:12:43.658 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-05 07:12:43.659 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-05 07:12:43.664 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-05 07:12:43.664 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-05 07:12:43.830  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-05 07:12:43.831  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-05 07:12:43.831 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-05 07:12:43.831 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-05 07:12:43.833  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-05 07:12:43.833  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-05 07:12:43.834 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-05 07:12:43.834 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-05 07:12:43.834 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-05 07:12:43.835 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-05 07:12:43.835 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-05 07:12:43.836 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-05 07:12:43.837 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-05 07:12:43.837 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-05 07:12:43.837 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-05 07:12:43.838 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-05 07:12:43.841 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 647802893283983145817296640880925041281381179625
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Jan 05 05:09:40 UTC 2023
           Final Date: Tue Jan 04 05:09:39 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [cc:f1:42:6e:28:7d:7f:2d:8d:50:4a:2a:43:79:45:d1:95:4c:56:9c],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3ad3c0eda0a06e4a4b6ac15280d78de6f149d932
                       a8153598d008c70a162df18f6067ac748606cd9f
                       61468ecd9b87b6a95b406b4d83f2d3cd7566ea03
                       176554261c15337c9b35c0ff1362f3de1888f279
                       e83062305b2ea5535c6db26e31fcf5ac40bfd1e4
                       ebf929bffd425f5b5c2c1a80ffde371196be8a2d
                       28b7adabfb3fa1ff6716321f37d5287ad50ab199
                       f854a377b67470b368a92733f26548f64f1dbc31
                       02f50e9d6374ceef7074d6c146a1d9bb762470be
                       bd3fc600b5b424fd8310fb565e478b7f1873dc52
                       58faac1a083d0d1ecff7559ea51da8c6d35d44ef
                       2cf1c3720d96f18546744197e0d1a9d7e74f9228
                       cc68b6cf891bdbbd1b41dd5b89a6992002ca681e
                       1b98186384b2bc33f8d9038793a890809475f48a
                       778c8a5b0243991f4a9752d3da0eac999a6d6e79
                       d6e505c1a95cf06a13f5dfbeb200bd04b187be2c
                       0d93449c72d68572cfe158f65e2d87376a67fb07
                       764fb34f1b6e715e78e302252ae55e0d464b0e3a
                       80e032b70e50ea8ab4e0df114f300110b85828a2
                       9ebc4bf5
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [e6:4c:05:4e:ff:2c:24:f0:d5:e7:f5:66:df:7b:c8:a0:4f:8b:bf:29],[56:66:d1:a4]
        modulus: c5da86b0eac3428d07d2fb90faa3ef124e13841836236b8e62aa61a4843c35e27d24a90c6bd9783c69b62b770d545ca7c176d766c53357175cac0dfcd8d2721ee0e8cef166f2d60e884d8041346c246ebb3d716f07b2c5c992f255681030781a578045d8ce85ee9ca25921875262645d3fd6fa211b965ef50a362a961225f654c214195756ea85eb2f98226df8fd915003e89748d0fbe4e3b5dbfaf96cbed0ec388c600d2c0f882beeb0156597ca4fee245691af509b05ac630140416056daa75abdf565d81da161edcd5d34acc6256bad010b6ebd35608478b6d0890d8a2f2b1e2ae19a099327ec2bae185377554a26187698f8aed2cc1a1270d4fe0bfc653d
public exponent: 10001

] 
2023-01-05 07:18:24.843  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-05 07:18:24.846 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-05 07:18:24.848 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-05 07:18:24.848 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-05 07:18:24.849  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-05 07:18:24.850  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-05 07:18:24.850  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-05 07:18:24.851 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-05 07:18:24.852 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-05 07:18:24.852 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-05 07:18:24.857 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-05 07:18:24.859 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-05 07:18:24.859 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-05 07:18:24.860 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-05 07:18:24.990  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-05 07:18:24.991  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-05 07:18:24.991 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-05 07:18:24.992 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-05 07:18:24.993  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-05 07:18:24.994  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-05 07:18:24.994 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-05 07:18:24.995 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-05 07:18:24.995 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-05 07:18:24.996 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-05 07:18:24.996 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-05 07:18:24.997 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-05 07:18:25.000 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-05 07:18:25.001 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-05 07:18:25.001 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-05 07:18:25.002 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-05 07:18:25.006 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 647802893283983145817296640880925041281381179625
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Jan 05 05:09:40 UTC 2023
           Final Date: Tue Jan 04 05:09:39 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [cc:f1:42:6e:28:7d:7f:2d:8d:50:4a:2a:43:79:45:d1:95:4c:56:9c],[56:66:d1:a4]
        modulus: d2401c2e101f1e4e4b6c730380de8f4d83ea97abc0d05968148b17ecfec8e4a2851ff1306e1643a8177a5f6cdff7fbca0c43dc9712a3d116988908eee29b9d1daabb145942b8f3267210f98eb5c966d093030aca858cff2c2175636806b0e491e7bf4616d43adcf74204e766dab8a4a9628d18fae0096afe5e561350cb194b9ea37d8d1dc30da20de1f3d8d9a4d030f968e63774b013fbc667c06c80a5d996efcab96628390dda54d4faaafc0af764c6f27938cb9e2694779101ff4e07959d80aced418048d37ba008f425ae073290c982005ce65f9c963d97337a92d56d0bf46ce552e85f99094032d88ec0b3a9f6e76814474435f1b496c2f5b2fb955f7ca2787b27ac1c0ff86783ce7260703e6729b1133b98ce5de69262658055009ffe3b98f70ad5e63994c5c1220576e2dd964879be782f7fa2d080c431c7e69a9f7b84e4de8db3947e889d18f18a36042f214a29258fff8ef94002887bad88c77e3111a8579149d267c87d1377d299dc4e1dba0e22695f45bf5a9b2fd3f29dd13e4973
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3ad3c0eda0a06e4a4b6ac15280d78de6f149d932
                       a8153598d008c70a162df18f6067ac748606cd9f
                       61468ecd9b87b6a95b406b4d83f2d3cd7566ea03
                       176554261c15337c9b35c0ff1362f3de1888f279
                       e83062305b2ea5535c6db26e31fcf5ac40bfd1e4
                       ebf929bffd425f5b5c2c1a80ffde371196be8a2d
                       28b7adabfb3fa1ff6716321f37d5287ad50ab199
                       f854a377b67470b368a92733f26548f64f1dbc31
                       02f50e9d6374ceef7074d6c146a1d9bb762470be
                       bd3fc600b5b424fd8310fb565e478b7f1873dc52
                       58faac1a083d0d1ecff7559ea51da8c6d35d44ef
                       2cf1c3720d96f18546744197e0d1a9d7e74f9228
                       cc68b6cf891bdbbd1b41dd5b89a6992002ca681e
                       1b98186384b2bc33f8d9038793a890809475f48a
                       778c8a5b0243991f4a9752d3da0eac999a6d6e79
                       d6e505c1a95cf06a13f5dfbeb200bd04b187be2c
                       0d93449c72d68572cfe158f65e2d87376a67fb07
                       764fb34f1b6e715e78e302252ae55e0d464b0e3a
                       80e032b70e50ea8ab4e0df114f300110b85828a2
                       9ebc4bf5
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [90:7d:c5:80:33:38:91:13:83:21:d9:23:a0:19:14:7e:d8:b4:22:03],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-05 07:25:39.290  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-05 07:25:39.293 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-05 07:25:39.297 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2023-01-05 07:25:39.299 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-05 07:25:39.300  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2023-01-05 07:25:39.300  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-05 07:25:39.301  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-05 07:25:39.301 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-05 07:25:39.302 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-05 07:25:39.303 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-05 07:25:39.307 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-05 07:25:39.309 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-05 07:25:39.309 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-05 07:25:39.309 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-05 07:25:39.478  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-05 07:25:39.479  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-05 07:25:39.480 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-05 07:25:39.480 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-05 07:25:39.482  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-05 07:25:39.483  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-05 07:25:39.484 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-05 07:25:39.484 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-05 07:25:39.485 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-05 07:25:39.486 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-05 07:25:39.486 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-05 07:25:39.487 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-05 07:25:39.488 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-05 07:25:39.489 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-05 07:25:39.489 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-05 07:25:39.490 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-05 07:25:39.495 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 647802893283983145817296640880925041281381179625
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Jan 05 05:09:40 UTC 2023
           Final Date: Tue Jan 04 05:09:39 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [cc:f1:42:6e:28:7d:7f:2d:8d:50:4a:2a:43:79:45:d1:95:4c:56:9c],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3ad3c0eda0a06e4a4b6ac15280d78de6f149d932
                       a8153598d008c70a162df18f6067ac748606cd9f
                       61468ecd9b87b6a95b406b4d83f2d3cd7566ea03
                       176554261c15337c9b35c0ff1362f3de1888f279
                       e83062305b2ea5535c6db26e31fcf5ac40bfd1e4
                       ebf929bffd425f5b5c2c1a80ffde371196be8a2d
                       28b7adabfb3fa1ff6716321f37d5287ad50ab199
                       f854a377b67470b368a92733f26548f64f1dbc31
                       02f50e9d6374ceef7074d6c146a1d9bb762470be
                       bd3fc600b5b424fd8310fb565e478b7f1873dc52
                       58faac1a083d0d1ecff7559ea51da8c6d35d44ef
                       2cf1c3720d96f18546744197e0d1a9d7e74f9228
                       cc68b6cf891bdbbd1b41dd5b89a6992002ca681e
                       1b98186384b2bc33f8d9038793a890809475f48a
                       778c8a5b0243991f4a9752d3da0eac999a6d6e79
                       d6e505c1a95cf06a13f5dfbeb200bd04b187be2c
                       0d93449c72d68572cfe158f65e2d87376a67fb07
                       764fb34f1b6e715e78e302252ae55e0d464b0e3a
                       80e032b70e50ea8ab4e0df114f300110b85828a2
                       9ebc4bf5
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [dc:60:02:b7:d8:3a:8a:cd:3d:9b:29:c0:60:a5:30:ec:3b:36:14:b6],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-05 07:32:42.823  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-05 07:32:42.833 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-05 07:32:42.838 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2023-01-05 07:32:42.844 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-05 07:32:42.845  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2023-01-05 07:32:42.848  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-05 07:32:42.849  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-05 07:32:42.849 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-05 07:32:42.850 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-05 07:32:42.851 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-05 07:32:42.860 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-05 07:32:42.861 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-05 07:32:42.861 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-05 07:32:42.862 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-05 07:32:43.290  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-05 07:32:43.291  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-05 07:32:43.291 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-05 07:32:43.292 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-05 07:32:43.293  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-05 07:32:43.293  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-05 07:32:43.294 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-05 07:32:43.294 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-05 07:32:43.294 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-05 07:32:43.296 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-05 07:32:43.296 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-05 07:32:43.296 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-05 07:32:43.297 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-05 07:32:43.297 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-05 07:32:43.298 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-05 07:32:43.299 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-05 07:32:43.303 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 647802893283983145817296640880925041281381179625
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Jan 05 05:09:40 UTC 2023
           Final Date: Tue Jan 04 05:09:39 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [cc:f1:42:6e:28:7d:7f:2d:8d:50:4a:2a:43:79:45:d1:95:4c:56:9c],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3ad3c0eda0a06e4a4b6ac15280d78de6f149d932
                       a8153598d008c70a162df18f6067ac748606cd9f
                       61468ecd9b87b6a95b406b4d83f2d3cd7566ea03
                       176554261c15337c9b35c0ff1362f3de1888f279
                       e83062305b2ea5535c6db26e31fcf5ac40bfd1e4
                       ebf929bffd425f5b5c2c1a80ffde371196be8a2d
                       28b7adabfb3fa1ff6716321f37d5287ad50ab199
                       f854a377b67470b368a92733f26548f64f1dbc31
                       02f50e9d6374ceef7074d6c146a1d9bb762470be
                       bd3fc600b5b424fd8310fb565e478b7f1873dc52
                       58faac1a083d0d1ecff7559ea51da8c6d35d44ef
                       2cf1c3720d96f18546744197e0d1a9d7e74f9228
                       cc68b6cf891bdbbd1b41dd5b89a6992002ca681e
                       1b98186384b2bc33f8d9038793a890809475f48a
                       778c8a5b0243991f4a9752d3da0eac999a6d6e79
                       d6e505c1a95cf06a13f5dfbeb200bd04b187be2c
                       0d93449c72d68572cfe158f65e2d87376a67fb07
                       764fb34f1b6e715e78e302252ae55e0d464b0e3a
                       80e032b70e50ea8ab4e0df114f300110b85828a2
                       9ebc4bf5
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [2a:a8:62:d4:1b:68:1d:f4:1f:75:52:5b:28:a6:b4:46:1c:66:92:7d],[56:66:d1:a4]
        modulus: bdd72d0316cca20c77f9bcb2ef14e761dd48632fd691360417b982cdc24fe45d48500eb7ccf416ae050b7a67831143bfa724ad5df025e05a53497b721821e5312c91064d5c4ab1dd5fc04ae05179f40414194c4c4383c91b367876358b4960c46d34b7742ccffb80fc56dc9060cecf796c9445f08b53598649ce7ff8f61229b6d9edf5ba590a1ad7e296f7115d3d1f7f1e844aeca6b1c0742ddd9a3353c036381a5be9dc44f4344bf66429205fb327d0ae80bf491b3c129ce6f36e84796c7cd9563297724d5c558f9402fbd645cac509b808f24c28ab3339859167cb33a1a5a629a9e5ddab193cf5902f61303aaddbf030d4c50f48e1fc6a3f69e4d17abf77e5
public exponent: 10001

] 
2023-01-05 07:33:02.169  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-05 07:33:02.174 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-05 07:33:02.177 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2023-01-05 07:33:02.179 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-05 07:33:02.181  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2023-01-05 07:33:02.183  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-05 07:33:02.184  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-05 07:33:02.184 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-05 07:33:02.185 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-05 07:33:02.185 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-05 07:33:02.189 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-05 07:33:02.190 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-05 07:33:02.190 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-05 07:33:02.190 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-05 07:33:02.313  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-05 07:33:02.314  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-05 07:33:02.314 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-05 07:33:02.315 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-05 07:33:02.318  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-05 07:33:02.320  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-05 07:33:02.321 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-05 07:33:02.322 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-05 07:33:02.323 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-05 07:33:02.323 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-05 07:33:02.324 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-05 07:33:02.324 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-05 07:33:02.325 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-05 07:33:02.325 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-05 07:33:02.325 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-05 07:33:02.326 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-05 07:33:02.329 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 647802893283983145817296640880925041281381179625
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Jan 05 05:09:40 UTC 2023
           Final Date: Tue Jan 04 05:09:39 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [cc:f1:42:6e:28:7d:7f:2d:8d:50:4a:2a:43:79:45:d1:95:4c:56:9c],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3ad3c0eda0a06e4a4b6ac15280d78de6f149d932
                       a8153598d008c70a162df18f6067ac748606cd9f
                       61468ecd9b87b6a95b406b4d83f2d3cd7566ea03
                       176554261c15337c9b35c0ff1362f3de1888f279
                       e83062305b2ea5535c6db26e31fcf5ac40bfd1e4
                       ebf929bffd425f5b5c2c1a80ffde371196be8a2d
                       28b7adabfb3fa1ff6716321f37d5287ad50ab199
                       f854a377b67470b368a92733f26548f64f1dbc31
                       02f50e9d6374ceef7074d6c146a1d9bb762470be
                       bd3fc600b5b424fd8310fb565e478b7f1873dc52
                       58faac1a083d0d1ecff7559ea51da8c6d35d44ef
                       2cf1c3720d96f18546744197e0d1a9d7e74f9228
                       cc68b6cf891bdbbd1b41dd5b89a6992002ca681e
                       1b98186384b2bc33f8d9038793a890809475f48a
                       778c8a5b0243991f4a9752d3da0eac999a6d6e79
                       d6e505c1a95cf06a13f5dfbeb200bd04b187be2c
                       0d93449c72d68572cfe158f65e2d87376a67fb07
                       764fb34f1b6e715e78e302252ae55e0d464b0e3a
                       80e032b70e50ea8ab4e0df114f300110b85828a2
                       9ebc4bf5
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [6f:98:d3:3b:9c:3e:3d:96:2e:d8:eb:02:79:40:9f:37:a2:32:63:5c],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-05 07:58:14.073  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-05 07:58:14.077 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-05 07:58:14.082 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2023-01-05 07:58:14.085 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-05 07:58:14.085  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2023-01-05 07:58:14.086  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-05 07:58:14.086  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-05 07:58:14.087 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-05 07:58:14.088 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-05 07:58:14.089 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-05 07:58:14.093 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-05 07:58:14.094 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-05 07:58:14.095 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-05 07:58:14.095 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-05 07:58:14.251  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-05 07:58:14.252  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-05 07:58:14.254 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-05 07:58:14.254 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-05 07:58:14.257  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-05 07:58:14.257  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-05 07:58:14.258 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-05 07:58:14.258 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-05 07:58:14.258 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-05 07:58:14.260 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-05 07:58:14.260 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-05 07:58:14.260 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-05 07:58:14.263 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-05 07:58:14.263 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-05 07:58:14.263 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-05 07:58:14.265 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-05 07:58:14.270 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 647802893283983145817296640880925041281381179625
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Jan 05 05:09:40 UTC 2023
           Final Date: Tue Jan 04 05:09:39 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [cc:f1:42:6e:28:7d:7f:2d:8d:50:4a:2a:43:79:45:d1:95:4c:56:9c],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3ad3c0eda0a06e4a4b6ac15280d78de6f149d932
                       a8153598d008c70a162df18f6067ac748606cd9f
                       61468ecd9b87b6a95b406b4d83f2d3cd7566ea03
                       176554261c15337c9b35c0ff1362f3de1888f279
                       e83062305b2ea5535c6db26e31fcf5ac40bfd1e4
                       ebf929bffd425f5b5c2c1a80ffde371196be8a2d
                       28b7adabfb3fa1ff6716321f37d5287ad50ab199
                       f854a377b67470b368a92733f26548f64f1dbc31
                       02f50e9d6374ceef7074d6c146a1d9bb762470be
                       bd3fc600b5b424fd8310fb565e478b7f1873dc52
                       58faac1a083d0d1ecff7559ea51da8c6d35d44ef
                       2cf1c3720d96f18546744197e0d1a9d7e74f9228
                       cc68b6cf891bdbbd1b41dd5b89a6992002ca681e
                       1b98186384b2bc33f8d9038793a890809475f48a
                       778c8a5b0243991f4a9752d3da0eac999a6d6e79
                       d6e505c1a95cf06a13f5dfbeb200bd04b187be2c
                       0d93449c72d68572cfe158f65e2d87376a67fb07
                       764fb34f1b6e715e78e302252ae55e0d464b0e3a
                       80e032b70e50ea8ab4e0df114f300110b85828a2
                       9ebc4bf5
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [2f:c6:b0:70:d9:ed:e1:b8:a5:3e:34:98:68:d1:0b:5f:45:c2:6c:93],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-05 07:58:33.252  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-05 07:58:33.253 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-05 07:58:33.254 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2023-01-05 07:58:33.254 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-05 07:58:33.255  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2023-01-05 07:58:33.255  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-05 07:58:33.256  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-05 07:58:33.256 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-05 07:58:33.256 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-05 07:58:33.256 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-05 07:58:33.260 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-05 07:58:33.260 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-05 07:58:33.260 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-05 07:58:33.261 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-05 07:58:33.376  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-05 07:58:33.377  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-05 07:58:33.377 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-05 07:58:33.377 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-05 07:58:33.379  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-05 07:58:33.379  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-05 07:58:33.379 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-05 07:58:33.380 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-05 07:58:33.380 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-05 07:58:33.380 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-05 07:58:33.381 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-05 07:58:33.381 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-05 07:58:33.382 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-05 07:58:33.382 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-05 07:58:33.382 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-05 07:58:33.383 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-05 07:58:33.386 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 647802893283983145817296640880925041281381179625
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Jan 05 05:09:40 UTC 2023
           Final Date: Tue Jan 04 05:09:39 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [cc:f1:42:6e:28:7d:7f:2d:8d:50:4a:2a:43:79:45:d1:95:4c:56:9c],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3ad3c0eda0a06e4a4b6ac15280d78de6f149d932
                       a8153598d008c70a162df18f6067ac748606cd9f
                       61468ecd9b87b6a95b406b4d83f2d3cd7566ea03
                       176554261c15337c9b35c0ff1362f3de1888f279
                       e83062305b2ea5535c6db26e31fcf5ac40bfd1e4
                       ebf929bffd425f5b5c2c1a80ffde371196be8a2d
                       28b7adabfb3fa1ff6716321f37d5287ad50ab199
                       f854a377b67470b368a92733f26548f64f1dbc31
                       02f50e9d6374ceef7074d6c146a1d9bb762470be
                       bd3fc600b5b424fd8310fb565e478b7f1873dc52
                       58faac1a083d0d1ecff7559ea51da8c6d35d44ef
                       2cf1c3720d96f18546744197e0d1a9d7e74f9228
                       cc68b6cf891bdbbd1b41dd5b89a6992002ca681e
                       1b98186384b2bc33f8d9038793a890809475f48a
                       778c8a5b0243991f4a9752d3da0eac999a6d6e79
                       d6e505c1a95cf06a13f5dfbeb200bd04b187be2c
                       0d93449c72d68572cfe158f65e2d87376a67fb07
                       764fb34f1b6e715e78e302252ae55e0d464b0e3a
                       80e032b70e50ea8ab4e0df114f300110b85828a2
                       9ebc4bf5
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ae:a5:c7:37:ed:7a:d1:a1:04:d0:c6:91:71:89:c4:60:87:c4:72:da],[56:66:d1:a4]
        modulus: bc92a3a9a2a4c5d640d77dccf2a1c991da702aa0b41456a2ae9d9f3c5b1296679c77c493e08bd0d59c573ee8af5c00019856a72ac656827ddcb42e39d5405cdf360dfa38541fd8b1aa6088a086acfe4bbf19723870b420acd09270534f9243446f0267548aed3c6d7c92987a5267d44bd111585cf1ff79a4856a3d55bddf048158e27b5794d657f643f6a704747a19454883c694e76d03c34a15f2b614aa080ad22760a2a7bee682b82b3eba636dc56362b1cf9370ae2b87b87333b3935d1c22d1ceff646f30ce124c2299a9634f62c69c28ac1a9c1e6a441592c8fa0e5b6486462ef20c4d2b0ccebd6759058953eac1addecfbe2d16e7684401845a040e2379
public exponent: 10001

]