Results

By type

          2023-01-21 05:11:44,696 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2023-01-21 05:11:45,960 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2023-01-21 05:11:46.709  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Jan 21, 2023 5:11:48 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Jan 21, 2023 5:11:48 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Jan 21, 2023 5:11:48 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Jan 21, 2023 5:11:48 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2023-01-21 05:11:49.166 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2023-01-21 05:11:49.437  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2023-01-21 05:11:49.605  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2023-01-21 05:11:50.258 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2023-01-21 05:11:50.261 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
2023-01-21 05:11:50.262 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2023-01-21 05:11:50.265 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2023-01-21 05:11:50.303 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
2023-01-21 05:11:50.306 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/docs]}: redirectToUi(HttpServletRequest)
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
2023-01-21 05:11:50.425 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2023-01-21 05:11:51.016 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Jan 21, 2023 5:11:51 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2023-01-21 05:11:51.876  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 7.952 seconds (JVM running for 9.602)
Jan 21, 2023 5:12:13 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2023-01-21 05:12:34.849  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-21 05:12:34.857 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-21 05:12:34.897 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2023-01-21 05:12:34.900 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-21 05:12:34.916  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2023-01-21 05:12:34.918  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-21 05:12:34.919  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-21 05:12:34.920 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-21 05:12:34.921 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-21 05:12:34.924 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-21 05:12:34.933 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-21 05:12:34.936 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-21 05:12:34.986 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-21 05:12:34.993 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-21 05:12:34.993 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-21 05:12:34.996 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-21 05:12:35.670  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-21 05:12:35.673  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-21 05:12:35.673 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-21 05:12:35.674 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-21 05:12:35.683  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-21 05:12:35.684  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-21 05:12:35.685 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-21 05:12:35.685 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-21 05:12:35.686 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-21 05:12:35.704 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-21 05:12:35.704 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-21 05:12:35.705 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-21 05:12:35.711 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-21 05:12:35.711 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-21 05:12:35.712 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-21 05:12:35.713 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-21 05:12:35.747 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 559506165462563634341717311238627344864815806441
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jan 21 05:08:36 UTC 2023
           Final Date: Thu Jan 20 05:08:35 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [1d:1b:1e:40:60:7f:e3:7b:92:10:8c:c3:b1:95:51:3a:cd:10:1c:96],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 04521e9fada73deadc16805d9cfd43598a4cc65d
                       aeea4f041694655a6e3433a0483025adb1fc60b4
                       9e7c7a674f4a40a4bfc595bfe0f24bf4842082f6
                       197158895854771e21fd0c0bba7badffb37ae349
                       6f2bfcaf1b4143b1542ca72605f173e1e25705ad
                       0a11556a6a070a13c8f8b1ffefc6b979cf1b9271
                       2502c244aa216ebd93b86c7b328a8629743c4013
                       a91bb89d3d32d1d9c33e969626e27e4b285fcbdd
                       cf5e567beef742785b9b49c8ec6c4042bf9bee1c
                       8ed0288d212792bbd591f36e3d45dd437b822cac
                       932fec2cdb739f295ce7c33a40c4bc097d392457
                       4be466ba8e5d11424a29c2a7ac1abdc5da07a257
                       5e7fdc3acd583905c523ff002bae9a6745b9a50d
                       c2cbf3bc0cfb698452301abe31e1878d4d905e83
                       5ded6c7463aaa304ab27e353a77b6a28853b627a
                       69c85a9913002df4efbec2952d94271eac1d0572
                       22ffca4430e0659807231a73944ea5d182eaa585
                       3f18c9b4e1427daa989248c1488e18c1f1d856de
                       b3704065c47eac6100288a8678d9a65891934d4a
                       099d6b6b
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [21:71:1b:44:43:41:a7:36:9d:b8:4f:57:3f:5a:fd:0c:89:a8:31:04],[56:66:d1:a4]
        modulus: c7c33030ca6242ca527427352cf3b6b1bfe076884ae8d775c2240db5d5fc38bfae96482cce3f902a8c1d55d6bfa0c5ec25d93e12241647c2c9bbb6229595cf2f81982bf99ba82a5cf4dee3a48eb659f5b7672201085d5018e3db01115e0bc76f559ab55b5a9fae854a9ea36db0697c342cc36b10679db0756cb1e4b83a09854d93f7c323661e8d69e7945404f51f8106f34f1a2721bf017922464bedba4ce3902b87cae21fb04203b37a1e66b6d0fbdb7a07b6006a1d81d75d5026496ee976e158ce3db350cfad24494d917e1278eb7e6072d0a695fea4b8600cbd8b1773f2454d926c795d6a7d561cfddb5ef7afbde43d148b08a7694e5e994e3982247b80e7
public exponent: 10001

] 
2023-01-21 06:58:08.975  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-21 06:58:08.978 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-21 06:58:08.980 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-21 06:58:08.981 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-21 06:58:08.982  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-21 06:58:08.983  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-21 06:58:08.983  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-21 06:58:08.984 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-21 06:58:08.985 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-21 06:58:08.985 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-21 06:58:08.991 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-21 06:58:08.992 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-21 06:58:08.992 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-21 06:58:08.992 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-21 06:58:09.335  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-21 06:58:09.336  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-21 06:58:09.337 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-21 06:58:09.337 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-21 06:58:09.340  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-21 06:58:09.341  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-21 06:58:09.341 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-21 06:58:09.342 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-21 06:58:09.342 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-21 06:58:09.344 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-21 06:58:09.344 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-21 06:58:09.344 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-21 06:58:09.345 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-21 06:58:09.346 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-21 06:58:09.346 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-21 06:58:09.347 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-21 06:58:09.353 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 559506165462563634341717311238627344864815806441
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jan 21 05:08:36 UTC 2023
           Final Date: Thu Jan 20 05:08:35 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [1d:1b:1e:40:60:7f:e3:7b:92:10:8c:c3:b1:95:51:3a:cd:10:1c:96],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 04521e9fada73deadc16805d9cfd43598a4cc65d
                       aeea4f041694655a6e3433a0483025adb1fc60b4
                       9e7c7a674f4a40a4bfc595bfe0f24bf4842082f6
                       197158895854771e21fd0c0bba7badffb37ae349
                       6f2bfcaf1b4143b1542ca72605f173e1e25705ad
                       0a11556a6a070a13c8f8b1ffefc6b979cf1b9271
                       2502c244aa216ebd93b86c7b328a8629743c4013
                       a91bb89d3d32d1d9c33e969626e27e4b285fcbdd
                       cf5e567beef742785b9b49c8ec6c4042bf9bee1c
                       8ed0288d212792bbd591f36e3d45dd437b822cac
                       932fec2cdb739f295ce7c33a40c4bc097d392457
                       4be466ba8e5d11424a29c2a7ac1abdc5da07a257
                       5e7fdc3acd583905c523ff002bae9a6745b9a50d
                       c2cbf3bc0cfb698452301abe31e1878d4d905e83
                       5ded6c7463aaa304ab27e353a77b6a28853b627a
                       69c85a9913002df4efbec2952d94271eac1d0572
                       22ffca4430e0659807231a73944ea5d182eaa585
                       3f18c9b4e1427daa989248c1488e18c1f1d856de
                       b3704065c47eac6100288a8678d9a65891934d4a
                       099d6b6b
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [72:2e:4a:12:1f:7e:5e:b0:78:8d:75:69:e1:98:3b:b4:fc:a7:e5:e8],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-21 07:00:11.224  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-21 07:00:11.227 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-21 07:00:11.229 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2023-01-21 07:00:11.230 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-21 07:00:11.231  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2023-01-21 07:00:11.232  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-21 07:00:11.232  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-21 07:00:11.233 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-21 07:00:11.233 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-21 07:00:11.234 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-21 07:00:11.243 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-21 07:00:11.244 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-21 07:00:11.245 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-21 07:00:11.245 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-21 07:00:11.434  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-21 07:00:11.434  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-21 07:00:11.435 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-21 07:00:11.435 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-21 07:00:11.438  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-21 07:00:11.439  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-21 07:00:11.439 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-21 07:00:11.440 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-21 07:00:11.440 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-21 07:00:11.441 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-21 07:00:11.441 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-21 07:00:11.442 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-21 07:00:11.443 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-21 07:00:11.443 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-21 07:00:11.443 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-21 07:00:11.444 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-21 07:00:11.448 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 559506165462563634341717311238627344864815806441
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jan 21 05:08:36 UTC 2023
           Final Date: Thu Jan 20 05:08:35 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [1d:1b:1e:40:60:7f:e3:7b:92:10:8c:c3:b1:95:51:3a:cd:10:1c:96],[56:66:d1:a4]
        modulus: b3c61493e246943f00649f891840d985c9cb6108fc37e903278754985c8ffab4c5c7fd11e0007e755167981f04aa7f2579946694eeebeac94e501b57c84a2d333f8cefbf3756e383e849f1d5772bc584d6d7618bc3f91307dad9d1292fdceaaf5930d6dddbc7315fd84d801ee9959b17dc6a4289be3e39c0099fdb89fdfe35bcebc7df470917a4fd931adb0f25026d08a6271c33418862761430ec6a8a130d315c4465372b0aef0a8d20fd03e8f2a0e7b10b6f69305141ec7bd0564f61a0b22d610892a38c9105f5e6244a1939d8105ec2e632bb9e0e266f73f7a8993ebe131f0105f1054d24101a42ba63b02cf1314ede6b8e0376aa21c2a043cb153d2290085f4d32476169919f68d8dd8f9f705946c1d93399be224fc48ce3c01694c0ef217130fb4ebd9bd6e17a8edf71be00e78659109374d3cc39c4a50845fbdfe1e883d720aeae9b33832723806aeeb7d198d12171360d3fe84c776f70267f34a9562d5967bbfc886e2dbe595e65122c423c28e2a458284a11fcbb8f90509e4ff26d9b
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 04521e9fada73deadc16805d9cfd43598a4cc65d
                       aeea4f041694655a6e3433a0483025adb1fc60b4
                       9e7c7a674f4a40a4bfc595bfe0f24bf4842082f6
                       197158895854771e21fd0c0bba7badffb37ae349
                       6f2bfcaf1b4143b1542ca72605f173e1e25705ad
                       0a11556a6a070a13c8f8b1ffefc6b979cf1b9271
                       2502c244aa216ebd93b86c7b328a8629743c4013
                       a91bb89d3d32d1d9c33e969626e27e4b285fcbdd
                       cf5e567beef742785b9b49c8ec6c4042bf9bee1c
                       8ed0288d212792bbd591f36e3d45dd437b822cac
                       932fec2cdb739f295ce7c33a40c4bc097d392457
                       4be466ba8e5d11424a29c2a7ac1abdc5da07a257
                       5e7fdc3acd583905c523ff002bae9a6745b9a50d
                       c2cbf3bc0cfb698452301abe31e1878d4d905e83
                       5ded6c7463aaa304ab27e353a77b6a28853b627a
                       69c85a9913002df4efbec2952d94271eac1d0572
                       22ffca4430e0659807231a73944ea5d182eaa585
                       3f18c9b4e1427daa989248c1488e18c1f1d856de
                       b3704065c47eac6100288a8678d9a65891934d4a
                       099d6b6b
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [b5:78:dc:b8:9a:fe:c3:19:de:a0:8b:e3:da:32:d3:72:db:62:17:b5],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-21 07:02:41.204  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-21 07:02:41.206 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-21 07:02:41.209 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2023-01-21 07:02:41.209 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-21 07:02:41.210  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2023-01-21 07:02:41.211  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-21 07:02:41.212  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-21 07:02:41.212 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-21 07:02:41.213 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-21 07:02:41.214 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-21 07:02:41.220 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-21 07:02:41.221 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-21 07:02:41.221 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-21 07:02:41.222 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-21 07:02:41.482  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-21 07:02:41.483  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-21 07:02:41.484 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-21 07:02:41.484 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-21 07:02:41.486  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-21 07:02:41.486  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-21 07:02:41.487 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-21 07:02:41.487 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-21 07:02:41.487 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-21 07:02:41.488 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-21 07:02:41.489 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-21 07:02:41.489 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-21 07:02:41.491 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-21 07:02:41.491 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-21 07:02:41.491 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-21 07:02:41.492 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-21 07:02:41.496 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 559506165462563634341717311238627344864815806441
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jan 21 05:08:36 UTC 2023
           Final Date: Thu Jan 20 05:08:35 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [1d:1b:1e:40:60:7f:e3:7b:92:10:8c:c3:b1:95:51:3a:cd:10:1c:96],[56:66:d1:a4]
        modulus: b3c61493e246943f00649f891840d985c9cb6108fc37e903278754985c8ffab4c5c7fd11e0007e755167981f04aa7f2579946694eeebeac94e501b57c84a2d333f8cefbf3756e383e849f1d5772bc584d6d7618bc3f91307dad9d1292fdceaaf5930d6dddbc7315fd84d801ee9959b17dc6a4289be3e39c0099fdb89fdfe35bcebc7df470917a4fd931adb0f25026d08a6271c33418862761430ec6a8a130d315c4465372b0aef0a8d20fd03e8f2a0e7b10b6f69305141ec7bd0564f61a0b22d610892a38c9105f5e6244a1939d8105ec2e632bb9e0e266f73f7a8993ebe131f0105f1054d24101a42ba63b02cf1314ede6b8e0376aa21c2a043cb153d2290085f4d32476169919f68d8dd8f9f705946c1d93399be224fc48ce3c01694c0ef217130fb4ebd9bd6e17a8edf71be00e78659109374d3cc39c4a50845fbdfe1e883d720aeae9b33832723806aeeb7d198d12171360d3fe84c776f70267f34a9562d5967bbfc886e2dbe595e65122c423c28e2a458284a11fcbb8f90509e4ff26d9b
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 04521e9fada73deadc16805d9cfd43598a4cc65d
                       aeea4f041694655a6e3433a0483025adb1fc60b4
                       9e7c7a674f4a40a4bfc595bfe0f24bf4842082f6
                       197158895854771e21fd0c0bba7badffb37ae349
                       6f2bfcaf1b4143b1542ca72605f173e1e25705ad
                       0a11556a6a070a13c8f8b1ffefc6b979cf1b9271
                       2502c244aa216ebd93b86c7b328a8629743c4013
                       a91bb89d3d32d1d9c33e969626e27e4b285fcbdd
                       cf5e567beef742785b9b49c8ec6c4042bf9bee1c
                       8ed0288d212792bbd591f36e3d45dd437b822cac
                       932fec2cdb739f295ce7c33a40c4bc097d392457
                       4be466ba8e5d11424a29c2a7ac1abdc5da07a257
                       5e7fdc3acd583905c523ff002bae9a6745b9a50d
                       c2cbf3bc0cfb698452301abe31e1878d4d905e83
                       5ded6c7463aaa304ab27e353a77b6a28853b627a
                       69c85a9913002df4efbec2952d94271eac1d0572
                       22ffca4430e0659807231a73944ea5d182eaa585
                       3f18c9b4e1427daa989248c1488e18c1f1d856de
                       b3704065c47eac6100288a8678d9a65891934d4a
                       099d6b6b
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [43:42:06:6b:2e:a0:47:9d:b5:e8:12:72:9e:0a:72:a7:e1:05:4f:6e],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-21 07:05:11.365  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-21 07:05:11.367 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-21 07:05:11.368 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-21 07:05:11.369 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-21 07:05:11.369  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-21 07:05:11.370  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-21 07:05:11.370  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-21 07:05:11.370 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-21 07:05:11.371 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-21 07:05:11.371 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-21 07:05:11.375 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-21 07:05:11.375 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-21 07:05:11.375 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-21 07:05:11.376 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-21 07:05:11.706  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-21 07:05:11.706  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-21 07:05:11.707 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-21 07:05:11.707 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-21 07:05:11.708  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-21 07:05:11.709  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-21 07:05:11.709 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-21 07:05:11.710 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-21 07:05:11.710 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-21 07:05:11.711 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-21 07:05:11.711 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-21 07:05:11.711 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-21 07:05:11.712 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-21 07:05:11.712 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-21 07:05:11.713 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-21 07:05:11.713 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-21 07:05:11.716 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 559506165462563634341717311238627344864815806441
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jan 21 05:08:36 UTC 2023
           Final Date: Thu Jan 20 05:08:35 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [1d:1b:1e:40:60:7f:e3:7b:92:10:8c:c3:b1:95:51:3a:cd:10:1c:96],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 04521e9fada73deadc16805d9cfd43598a4cc65d
                       aeea4f041694655a6e3433a0483025adb1fc60b4
                       9e7c7a674f4a40a4bfc595bfe0f24bf4842082f6
                       197158895854771e21fd0c0bba7badffb37ae349
                       6f2bfcaf1b4143b1542ca72605f173e1e25705ad
                       0a11556a6a070a13c8f8b1ffefc6b979cf1b9271
                       2502c244aa216ebd93b86c7b328a8629743c4013
                       a91bb89d3d32d1d9c33e969626e27e4b285fcbdd
                       cf5e567beef742785b9b49c8ec6c4042bf9bee1c
                       8ed0288d212792bbd591f36e3d45dd437b822cac
                       932fec2cdb739f295ce7c33a40c4bc097d392457
                       4be466ba8e5d11424a29c2a7ac1abdc5da07a257
                       5e7fdc3acd583905c523ff002bae9a6745b9a50d
                       c2cbf3bc0cfb698452301abe31e1878d4d905e83
                       5ded6c7463aaa304ab27e353a77b6a28853b627a
                       69c85a9913002df4efbec2952d94271eac1d0572
                       22ffca4430e0659807231a73944ea5d182eaa585
                       3f18c9b4e1427daa989248c1488e18c1f1d856de
                       b3704065c47eac6100288a8678d9a65891934d4a
                       099d6b6b
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [67:3f:e9:b8:57:d0:55:d0:fe:21:ea:79:53:54:38:6b:8c:b5:27:5e],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-21 07:12:47.385  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-21 07:12:47.387 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-21 07:12:47.389 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-21 07:12:47.390 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-21 07:12:47.391  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-21 07:12:47.393  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-21 07:12:47.393  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-21 07:12:47.394 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-21 07:12:47.395 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-21 07:12:47.396 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-21 07:12:47.402 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-21 07:12:47.403 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-21 07:12:47.403 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-21 07:12:47.404 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-21 07:12:47.616  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-21 07:12:47.617  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-21 07:12:47.617 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-21 07:12:47.617 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-21 07:12:47.619  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-21 07:12:47.620  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-21 07:12:47.620 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-21 07:12:47.621 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-21 07:12:47.621 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-21 07:12:47.622 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-21 07:12:47.622 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-21 07:12:47.622 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-21 07:12:47.623 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-21 07:12:47.623 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-21 07:12:47.623 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-21 07:12:47.624 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-21 07:12:47.627 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 559506165462563634341717311238627344864815806441
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jan 21 05:08:36 UTC 2023
           Final Date: Thu Jan 20 05:08:35 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [1d:1b:1e:40:60:7f:e3:7b:92:10:8c:c3:b1:95:51:3a:cd:10:1c:96],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 04521e9fada73deadc16805d9cfd43598a4cc65d
                       aeea4f041694655a6e3433a0483025adb1fc60b4
                       9e7c7a674f4a40a4bfc595bfe0f24bf4842082f6
                       197158895854771e21fd0c0bba7badffb37ae349
                       6f2bfcaf1b4143b1542ca72605f173e1e25705ad
                       0a11556a6a070a13c8f8b1ffefc6b979cf1b9271
                       2502c244aa216ebd93b86c7b328a8629743c4013
                       a91bb89d3d32d1d9c33e969626e27e4b285fcbdd
                       cf5e567beef742785b9b49c8ec6c4042bf9bee1c
                       8ed0288d212792bbd591f36e3d45dd437b822cac
                       932fec2cdb739f295ce7c33a40c4bc097d392457
                       4be466ba8e5d11424a29c2a7ac1abdc5da07a257
                       5e7fdc3acd583905c523ff002bae9a6745b9a50d
                       c2cbf3bc0cfb698452301abe31e1878d4d905e83
                       5ded6c7463aaa304ab27e353a77b6a28853b627a
                       69c85a9913002df4efbec2952d94271eac1d0572
                       22ffca4430e0659807231a73944ea5d182eaa585
                       3f18c9b4e1427daa989248c1488e18c1f1d856de
                       b3704065c47eac6100288a8678d9a65891934d4a
                       099d6b6b
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [38:b8:fd:7f:8a:a7:4a:57:aa:86:15:cb:27:8d:88:af:80:a2:7b:67],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-21 07:18:35.645  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-21 07:18:35.647 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-21 07:18:35.649 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-21 07:18:35.651 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-21 07:18:35.651  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-21 07:18:35.652  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-21 07:18:35.653  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-21 07:18:35.654 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-21 07:18:35.654 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-21 07:18:35.655 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-21 07:18:35.661 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-21 07:18:35.661 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-21 07:18:35.662 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-21 07:18:35.662 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-21 07:18:35.857  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-21 07:18:35.858  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-21 07:18:35.858 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-21 07:18:35.859 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-21 07:18:35.860  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-21 07:18:35.860  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-21 07:18:35.860 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-21 07:18:35.861 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-21 07:18:35.861 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-21 07:18:35.862 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-21 07:18:35.862 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-21 07:18:35.862 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-21 07:18:35.864 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-21 07:18:35.865 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-21 07:18:35.865 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-21 07:18:35.866 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-21 07:18:35.869 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 559506165462563634341717311238627344864815806441
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jan 21 05:08:36 UTC 2023
           Final Date: Thu Jan 20 05:08:35 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [1d:1b:1e:40:60:7f:e3:7b:92:10:8c:c3:b1:95:51:3a:cd:10:1c:96],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 04521e9fada73deadc16805d9cfd43598a4cc65d
                       aeea4f041694655a6e3433a0483025adb1fc60b4
                       9e7c7a674f4a40a4bfc595bfe0f24bf4842082f6
                       197158895854771e21fd0c0bba7badffb37ae349
                       6f2bfcaf1b4143b1542ca72605f173e1e25705ad
                       0a11556a6a070a13c8f8b1ffefc6b979cf1b9271
                       2502c244aa216ebd93b86c7b328a8629743c4013
                       a91bb89d3d32d1d9c33e969626e27e4b285fcbdd
                       cf5e567beef742785b9b49c8ec6c4042bf9bee1c
                       8ed0288d212792bbd591f36e3d45dd437b822cac
                       932fec2cdb739f295ce7c33a40c4bc097d392457
                       4be466ba8e5d11424a29c2a7ac1abdc5da07a257
                       5e7fdc3acd583905c523ff002bae9a6745b9a50d
                       c2cbf3bc0cfb698452301abe31e1878d4d905e83
                       5ded6c7463aaa304ab27e353a77b6a28853b627a
                       69c85a9913002df4efbec2952d94271eac1d0572
                       22ffca4430e0659807231a73944ea5d182eaa585
                       3f18c9b4e1427daa989248c1488e18c1f1d856de
                       b3704065c47eac6100288a8678d9a65891934d4a
                       099d6b6b
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ab:97:11:31:3d:64:c8:17:c6:d7:51:66:ad:f2:a6:9c:e9:8d:a1:9c],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-21 07:25:54.683  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-21 07:25:54.686 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-21 07:25:54.689 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-21 07:25:54.690 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-21 07:25:54.690  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-21 07:25:54.691  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-21 07:25:54.691  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-21 07:25:54.692 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-21 07:25:54.692 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-21 07:25:54.693 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-21 07:25:54.697 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-21 07:25:54.698 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-21 07:25:54.698 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-21 07:25:54.699 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-21 07:25:54.873  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-21 07:25:54.874  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-21 07:25:54.874 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-21 07:25:54.875 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-21 07:25:54.877  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-21 07:25:54.878  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-21 07:25:54.881 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-21 07:25:54.881 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-21 07:25:54.883 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-21 07:25:54.884 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-21 07:25:54.885 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-21 07:25:54.885 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-21 07:25:54.886 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-21 07:25:54.886 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-21 07:25:54.887 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-21 07:25:54.887 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-21 07:25:54.891 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 559506165462563634341717311238627344864815806441
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jan 21 05:08:36 UTC 2023
           Final Date: Thu Jan 20 05:08:35 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [1d:1b:1e:40:60:7f:e3:7b:92:10:8c:c3:b1:95:51:3a:cd:10:1c:96],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 04521e9fada73deadc16805d9cfd43598a4cc65d
                       aeea4f041694655a6e3433a0483025adb1fc60b4
                       9e7c7a674f4a40a4bfc595bfe0f24bf4842082f6
                       197158895854771e21fd0c0bba7badffb37ae349
                       6f2bfcaf1b4143b1542ca72605f173e1e25705ad
                       0a11556a6a070a13c8f8b1ffefc6b979cf1b9271
                       2502c244aa216ebd93b86c7b328a8629743c4013
                       a91bb89d3d32d1d9c33e969626e27e4b285fcbdd
                       cf5e567beef742785b9b49c8ec6c4042bf9bee1c
                       8ed0288d212792bbd591f36e3d45dd437b822cac
                       932fec2cdb739f295ce7c33a40c4bc097d392457
                       4be466ba8e5d11424a29c2a7ac1abdc5da07a257
                       5e7fdc3acd583905c523ff002bae9a6745b9a50d
                       c2cbf3bc0cfb698452301abe31e1878d4d905e83
                       5ded6c7463aaa304ab27e353a77b6a28853b627a
                       69c85a9913002df4efbec2952d94271eac1d0572
                       22ffca4430e0659807231a73944ea5d182eaa585
                       3f18c9b4e1427daa989248c1488e18c1f1d856de
                       b3704065c47eac6100288a8678d9a65891934d4a
                       099d6b6b
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [1c:3f:36:3a:b9:d3:e3:52:6a:ff:f8:00:9b:b6:ad:32:91:bb:7e:83],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-21 07:31:47.591  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-21 07:31:47.592 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-21 07:31:47.594 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-21 07:31:47.594 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-21 07:31:47.595  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-21 07:31:47.595  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-21 07:31:47.595  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-21 07:31:47.596 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-21 07:31:47.596 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-21 07:31:47.596 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-21 07:31:47.600 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-21 07:31:47.601 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-21 07:31:47.601 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-21 07:31:47.601 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-21 07:31:47.816  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-21 07:31:47.816  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-21 07:31:47.816 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-21 07:31:47.817 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-21 07:31:47.818  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-21 07:31:47.818  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-21 07:31:47.819 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-21 07:31:47.819 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-21 07:31:47.819 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-21 07:31:47.820 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-21 07:31:47.820 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-21 07:31:47.820 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-21 07:31:47.821 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-21 07:31:47.821 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-21 07:31:47.821 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-21 07:31:47.822 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-21 07:31:47.825 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 559506165462563634341717311238627344864815806441
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jan 21 05:08:36 UTC 2023
           Final Date: Thu Jan 20 05:08:35 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [1d:1b:1e:40:60:7f:e3:7b:92:10:8c:c3:b1:95:51:3a:cd:10:1c:96],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 04521e9fada73deadc16805d9cfd43598a4cc65d
                       aeea4f041694655a6e3433a0483025adb1fc60b4
                       9e7c7a674f4a40a4bfc595bfe0f24bf4842082f6
                       197158895854771e21fd0c0bba7badffb37ae349
                       6f2bfcaf1b4143b1542ca72605f173e1e25705ad
                       0a11556a6a070a13c8f8b1ffefc6b979cf1b9271
                       2502c244aa216ebd93b86c7b328a8629743c4013
                       a91bb89d3d32d1d9c33e969626e27e4b285fcbdd
                       cf5e567beef742785b9b49c8ec6c4042bf9bee1c
                       8ed0288d212792bbd591f36e3d45dd437b822cac
                       932fec2cdb739f295ce7c33a40c4bc097d392457
                       4be466ba8e5d11424a29c2a7ac1abdc5da07a257
                       5e7fdc3acd583905c523ff002bae9a6745b9a50d
                       c2cbf3bc0cfb698452301abe31e1878d4d905e83
                       5ded6c7463aaa304ab27e353a77b6a28853b627a
                       69c85a9913002df4efbec2952d94271eac1d0572
                       22ffca4430e0659807231a73944ea5d182eaa585
                       3f18c9b4e1427daa989248c1488e18c1f1d856de
                       b3704065c47eac6100288a8678d9a65891934d4a
                       099d6b6b
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [64:58:f3:39:9b:e7:ee:4a:c7:19:69:9e:e5:02:ba:59:b0:4c:42:e7],[56:66:d1:a4]
        modulus: eab28dd9494e69f960ffb387b57d0bbf2e51b1dd0dcd8bea40584ceaafc61bf6e80bb092b1fa109e9e523fc1e52ee1ca3e27d17f428e76a10e643a9d2dbba71dd6eec4e5f5b6d48a6f3e866e924fc3b6f03a82b7153d22669838c2acfb524205019756be9bc936d6e4e796dde5251f9cb330832631770461599f979fd4321742c13e7ce576ac43a6df42fa09293e1eba4f0551442b120bc5584992f92aa2f9c103e0bdb0b1e3c9811e6546e7da8f88537fb383919c844003e86b931c3f2239aa89291dafd99f61b25f0e1956204664b1c68b0ca8259dc90949108807a0195fbb9685c189fcae5418d16698f7f3cfbed63f6ac3a403d0b8bc707d829c0b0fb9f5
public exponent: 10001

] 
2023-01-21 07:39:06.448  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-21 07:39:06.451 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-21 07:39:06.453 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2023-01-21 07:39:06.454 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-21 07:39:06.455  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2023-01-21 07:39:06.455  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-21 07:39:06.456  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-21 07:39:06.456 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-21 07:39:06.457 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-21 07:39:06.457 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-21 07:39:06.461 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-21 07:39:06.462 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-21 07:39:06.463 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-21 07:39:06.463 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-21 07:39:06.682  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-21 07:39:06.683  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-21 07:39:06.683 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-21 07:39:06.684 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-21 07:39:06.685  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-21 07:39:06.685  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-21 07:39:06.686 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-21 07:39:06.686 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-21 07:39:06.686 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-21 07:39:06.687 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-21 07:39:06.687 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-21 07:39:06.688 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-21 07:39:06.688 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-21 07:39:06.689 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-21 07:39:06.689 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-21 07:39:06.689 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-21 07:39:06.693 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 559506165462563634341717311238627344864815806441
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jan 21 05:08:36 UTC 2023
           Final Date: Thu Jan 20 05:08:35 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [1d:1b:1e:40:60:7f:e3:7b:92:10:8c:c3:b1:95:51:3a:cd:10:1c:96],[56:66:d1:a4]
        modulus: b3c61493e246943f00649f891840d985c9cb6108fc37e903278754985c8ffab4c5c7fd11e0007e755167981f04aa7f2579946694eeebeac94e501b57c84a2d333f8cefbf3756e383e849f1d5772bc584d6d7618bc3f91307dad9d1292fdceaaf5930d6dddbc7315fd84d801ee9959b17dc6a4289be3e39c0099fdb89fdfe35bcebc7df470917a4fd931adb0f25026d08a6271c33418862761430ec6a8a130d315c4465372b0aef0a8d20fd03e8f2a0e7b10b6f69305141ec7bd0564f61a0b22d610892a38c9105f5e6244a1939d8105ec2e632bb9e0e266f73f7a8993ebe131f0105f1054d24101a42ba63b02cf1314ede6b8e0376aa21c2a043cb153d2290085f4d32476169919f68d8dd8f9f705946c1d93399be224fc48ce3c01694c0ef217130fb4ebd9bd6e17a8edf71be00e78659109374d3cc39c4a50845fbdfe1e883d720aeae9b33832723806aeeb7d198d12171360d3fe84c776f70267f34a9562d5967bbfc886e2dbe595e65122c423c28e2a458284a11fcbb8f90509e4ff26d9b
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 04521e9fada73deadc16805d9cfd43598a4cc65d
                       aeea4f041694655a6e3433a0483025adb1fc60b4
                       9e7c7a674f4a40a4bfc595bfe0f24bf4842082f6
                       197158895854771e21fd0c0bba7badffb37ae349
                       6f2bfcaf1b4143b1542ca72605f173e1e25705ad
                       0a11556a6a070a13c8f8b1ffefc6b979cf1b9271
                       2502c244aa216ebd93b86c7b328a8629743c4013
                       a91bb89d3d32d1d9c33e969626e27e4b285fcbdd
                       cf5e567beef742785b9b49c8ec6c4042bf9bee1c
                       8ed0288d212792bbd591f36e3d45dd437b822cac
                       932fec2cdb739f295ce7c33a40c4bc097d392457
                       4be466ba8e5d11424a29c2a7ac1abdc5da07a257
                       5e7fdc3acd583905c523ff002bae9a6745b9a50d
                       c2cbf3bc0cfb698452301abe31e1878d4d905e83
                       5ded6c7463aaa304ab27e353a77b6a28853b627a
                       69c85a9913002df4efbec2952d94271eac1d0572
                       22ffca4430e0659807231a73944ea5d182eaa585
                       3f18c9b4e1427daa989248c1488e18c1f1d856de
                       b3704065c47eac6100288a8678d9a65891934d4a
                       099d6b6b
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [f5:61:18:03:64:64:d4:4a:95:7c:0a:8b:3c:4f:42:5c:fe:fd:d6:92],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-21 07:45:48.374  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-21 07:45:48.377 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-21 07:45:48.379 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2023-01-21 07:45:48.380 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-21 07:45:48.380  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2023-01-21 07:45:48.381  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-21 07:45:48.381  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-21 07:45:48.382 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-21 07:45:48.382 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-21 07:45:48.382 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-21 07:45:48.386 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-21 07:45:48.387 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-21 07:45:48.387 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-21 07:45:48.388 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-21 07:45:49.372  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-21 07:45:49.373  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-21 07:45:49.374 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-21 07:45:49.374 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-21 07:45:49.376  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-21 07:45:49.376  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-21 07:45:49.377 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-21 07:45:49.377 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-21 07:45:49.377 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-21 07:45:49.378 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-21 07:45:49.379 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-21 07:45:49.379 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-21 07:45:49.380 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-21 07:45:49.380 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-21 07:45:49.380 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-21 07:45:49.381 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-21 07:45:49.385 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 559506165462563634341717311238627344864815806441
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jan 21 05:08:36 UTC 2023
           Final Date: Thu Jan 20 05:08:35 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [1d:1b:1e:40:60:7f:e3:7b:92:10:8c:c3:b1:95:51:3a:cd:10:1c:96],[56:66:d1:a4]
        modulus: b3c61493e246943f00649f891840d985c9cb6108fc37e903278754985c8ffab4c5c7fd11e0007e755167981f04aa7f2579946694eeebeac94e501b57c84a2d333f8cefbf3756e383e849f1d5772bc584d6d7618bc3f91307dad9d1292fdceaaf5930d6dddbc7315fd84d801ee9959b17dc6a4289be3e39c0099fdb89fdfe35bcebc7df470917a4fd931adb0f25026d08a6271c33418862761430ec6a8a130d315c4465372b0aef0a8d20fd03e8f2a0e7b10b6f69305141ec7bd0564f61a0b22d610892a38c9105f5e6244a1939d8105ec2e632bb9e0e266f73f7a8993ebe131f0105f1054d24101a42ba63b02cf1314ede6b8e0376aa21c2a043cb153d2290085f4d32476169919f68d8dd8f9f705946c1d93399be224fc48ce3c01694c0ef217130fb4ebd9bd6e17a8edf71be00e78659109374d3cc39c4a50845fbdfe1e883d720aeae9b33832723806aeeb7d198d12171360d3fe84c776f70267f34a9562d5967bbfc886e2dbe595e65122c423c28e2a458284a11fcbb8f90509e4ff26d9b
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 04521e9fada73deadc16805d9cfd43598a4cc65d
                       aeea4f041694655a6e3433a0483025adb1fc60b4
                       9e7c7a674f4a40a4bfc595bfe0f24bf4842082f6
                       197158895854771e21fd0c0bba7badffb37ae349
                       6f2bfcaf1b4143b1542ca72605f173e1e25705ad
                       0a11556a6a070a13c8f8b1ffefc6b979cf1b9271
                       2502c244aa216ebd93b86c7b328a8629743c4013
                       a91bb89d3d32d1d9c33e969626e27e4b285fcbdd
                       cf5e567beef742785b9b49c8ec6c4042bf9bee1c
                       8ed0288d212792bbd591f36e3d45dd437b822cac
                       932fec2cdb739f295ce7c33a40c4bc097d392457
                       4be466ba8e5d11424a29c2a7ac1abdc5da07a257
                       5e7fdc3acd583905c523ff002bae9a6745b9a50d
                       c2cbf3bc0cfb698452301abe31e1878d4d905e83
                       5ded6c7463aaa304ab27e353a77b6a28853b627a
                       69c85a9913002df4efbec2952d94271eac1d0572
                       22ffca4430e0659807231a73944ea5d182eaa585
                       3f18c9b4e1427daa989248c1488e18c1f1d856de
                       b3704065c47eac6100288a8678d9a65891934d4a
                       099d6b6b
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [f3:55:1c:d2:1b:8c:19:34:8e:1c:26:56:48:af:9a:ff:01:e8:ba:81],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-21 07:46:07.416  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-21 07:46:07.418 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-21 07:46:07.419 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2023-01-21 07:46:07.420 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-21 07:46:07.420  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2023-01-21 07:46:07.421  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-21 07:46:07.421  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-21 07:46:07.421 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-21 07:46:07.422 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-21 07:46:07.422 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-21 07:46:07.426 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-21 07:46:07.427 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-21 07:46:07.427 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-21 07:46:07.428 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-21 07:46:07.590  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-21 07:46:07.590  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-21 07:46:07.591 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-21 07:46:07.591 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-21 07:46:07.592  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-21 07:46:07.593  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-21 07:46:07.593 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-21 07:46:07.593 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-21 07:46:07.594 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-21 07:46:07.594 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-21 07:46:07.595 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-21 07:46:07.595 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-21 07:46:07.596 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-21 07:46:07.596 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-21 07:46:07.596 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-21 07:46:07.597 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-21 07:46:07.600 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 559506165462563634341717311238627344864815806441
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jan 21 05:08:36 UTC 2023
           Final Date: Thu Jan 20 05:08:35 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [1d:1b:1e:40:60:7f:e3:7b:92:10:8c:c3:b1:95:51:3a:cd:10:1c:96],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 04521e9fada73deadc16805d9cfd43598a4cc65d
                       aeea4f041694655a6e3433a0483025adb1fc60b4
                       9e7c7a674f4a40a4bfc595bfe0f24bf4842082f6
                       197158895854771e21fd0c0bba7badffb37ae349
                       6f2bfcaf1b4143b1542ca72605f173e1e25705ad
                       0a11556a6a070a13c8f8b1ffefc6b979cf1b9271
                       2502c244aa216ebd93b86c7b328a8629743c4013
                       a91bb89d3d32d1d9c33e969626e27e4b285fcbdd
                       cf5e567beef742785b9b49c8ec6c4042bf9bee1c
                       8ed0288d212792bbd591f36e3d45dd437b822cac
                       932fec2cdb739f295ce7c33a40c4bc097d392457
                       4be466ba8e5d11424a29c2a7ac1abdc5da07a257
                       5e7fdc3acd583905c523ff002bae9a6745b9a50d
                       c2cbf3bc0cfb698452301abe31e1878d4d905e83
                       5ded6c7463aaa304ab27e353a77b6a28853b627a
                       69c85a9913002df4efbec2952d94271eac1d0572
                       22ffca4430e0659807231a73944ea5d182eaa585
                       3f18c9b4e1427daa989248c1488e18c1f1d856de
                       b3704065c47eac6100288a8678d9a65891934d4a
                       099d6b6b
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [d3:b8:7b:db:f9:c0:97:a4:c8:dd:96:15:62:da:8e:00:90:57:59:5b],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-21 08:11:27.426  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-21 08:11:27.429 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-21 08:11:27.433 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2023-01-21 08:11:27.434 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-21 08:11:27.435  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2023-01-21 08:11:27.436  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-21 08:11:27.436  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-21 08:11:27.436 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-21 08:11:27.437 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-21 08:11:27.438 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-21 08:11:27.444 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-21 08:11:27.445 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-21 08:11:27.445 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-21 08:11:27.446 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-21 08:11:27.601  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-21 08:11:27.602  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-21 08:11:27.603 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-21 08:11:27.603 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-21 08:11:27.605  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-21 08:11:27.606  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-21 08:11:27.606 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-21 08:11:27.607 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-21 08:11:27.607 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-21 08:11:27.608 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-21 08:11:27.609 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-21 08:11:27.609 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-21 08:11:27.610 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-21 08:11:27.611 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-21 08:11:27.612 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-21 08:11:27.612 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-21 08:11:27.616 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 559506165462563634341717311238627344864815806441
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jan 21 05:08:36 UTC 2023
           Final Date: Thu Jan 20 05:08:35 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [1d:1b:1e:40:60:7f:e3:7b:92:10:8c:c3:b1:95:51:3a:cd:10:1c:96],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 04521e9fada73deadc16805d9cfd43598a4cc65d
                       aeea4f041694655a6e3433a0483025adb1fc60b4
                       9e7c7a674f4a40a4bfc595bfe0f24bf4842082f6
                       197158895854771e21fd0c0bba7badffb37ae349
                       6f2bfcaf1b4143b1542ca72605f173e1e25705ad
                       0a11556a6a070a13c8f8b1ffefc6b979cf1b9271
                       2502c244aa216ebd93b86c7b328a8629743c4013
                       a91bb89d3d32d1d9c33e969626e27e4b285fcbdd
                       cf5e567beef742785b9b49c8ec6c4042bf9bee1c
                       8ed0288d212792bbd591f36e3d45dd437b822cac
                       932fec2cdb739f295ce7c33a40c4bc097d392457
                       4be466ba8e5d11424a29c2a7ac1abdc5da07a257
                       5e7fdc3acd583905c523ff002bae9a6745b9a50d
                       c2cbf3bc0cfb698452301abe31e1878d4d905e83
                       5ded6c7463aaa304ab27e353a77b6a28853b627a
                       69c85a9913002df4efbec2952d94271eac1d0572
                       22ffca4430e0659807231a73944ea5d182eaa585
                       3f18c9b4e1427daa989248c1488e18c1f1d856de
                       b3704065c47eac6100288a8678d9a65891934d4a
                       099d6b6b
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [2f:7f:76:24:5e:4a:bd:5f:5f:52:51:5e:2f:14:d1:a6:53:00:8d:e6],[56:66:d1:a4]
        modulus: ab7c4976f29c31717c24a5f0a96a65cfc0d09fff47bee8ae28b86f17909a25b015c5bfbb61384035430b9af236d0560863ce17c8f9c686a1b9a505fcd00a66ee8cff2d1e9ddbd40ef4e255ef177bb4cabf4eaf20fdd815748a7091044890ac70e4048b85df111aaa39644fad87b560ebf5513c596b01a9a62a0ed2ddaa3457622dcf245a6f866ed2f46aee97a71ad6909c00b94f216a667ee24b911cd2498a04b11a2a34c1254904cee334bf42001e0016d2a37ede49a56fcd686092bc29cba4241028e392a451be35734b734e1be7a7c4dff01f3403c817cb752343432405a917b586575228c7fccaa72dd5418c1a8869593bf4cce06b8335964f579f28cf01
public exponent: 10001

] 
2023-01-21 08:11:33.983  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-21 08:11:33.985 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-21 08:11:33.987 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2023-01-21 08:11:33.988 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-21 08:11:33.988  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2023-01-21 08:11:33.989  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-21 08:11:33.990  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-21 08:11:33.990 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-21 08:11:33.990 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-21 08:11:33.991 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-21 08:11:33.995 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-21 08:11:33.996 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-21 08:11:33.996 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-21 08:11:33.996 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-21 08:11:34.134  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-21 08:11:34.135  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-21 08:11:34.135 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-21 08:11:34.135 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-21 08:11:34.136  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-21 08:11:34.137  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-21 08:11:34.137 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-21 08:11:34.137 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-21 08:11:34.137 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-21 08:11:34.138 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-21 08:11:34.138 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-21 08:11:34.138 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-21 08:11:34.139 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-21 08:11:34.139 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-21 08:11:34.139 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-21 08:11:34.140 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-21 08:11:34.143 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 559506165462563634341717311238627344864815806441
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jan 21 05:08:36 UTC 2023
           Final Date: Thu Jan 20 05:08:35 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [1d:1b:1e:40:60:7f:e3:7b:92:10:8c:c3:b1:95:51:3a:cd:10:1c:96],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 04521e9fada73deadc16805d9cfd43598a4cc65d
                       aeea4f041694655a6e3433a0483025adb1fc60b4
                       9e7c7a674f4a40a4bfc595bfe0f24bf4842082f6
                       197158895854771e21fd0c0bba7badffb37ae349
                       6f2bfcaf1b4143b1542ca72605f173e1e25705ad
                       0a11556a6a070a13c8f8b1ffefc6b979cf1b9271
                       2502c244aa216ebd93b86c7b328a8629743c4013
                       a91bb89d3d32d1d9c33e969626e27e4b285fcbdd
                       cf5e567beef742785b9b49c8ec6c4042bf9bee1c
                       8ed0288d212792bbd591f36e3d45dd437b822cac
                       932fec2cdb739f295ce7c33a40c4bc097d392457
                       4be466ba8e5d11424a29c2a7ac1abdc5da07a257
                       5e7fdc3acd583905c523ff002bae9a6745b9a50d
                       c2cbf3bc0cfb698452301abe31e1878d4d905e83
                       5ded6c7463aaa304ab27e353a77b6a28853b627a
                       69c85a9913002df4efbec2952d94271eac1d0572
                       22ffca4430e0659807231a73944ea5d182eaa585
                       3f18c9b4e1427daa989248c1488e18c1f1d856de
                       b3704065c47eac6100288a8678d9a65891934d4a
                       099d6b6b
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [d5:46:f8:22:08:f3:da:d5:9d:1b:52:57:35:fe:2d:9b:28:ea:a0:f7],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

]