Results

By type

          2023-01-25 05:20:33,666 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2023-01-25 05:20:35,709 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2023-01-25 05:20:36.633  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Jan 25, 2023 5:20:38 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Jan 25, 2023 5:20:38 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Jan 25, 2023 5:20:38 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Jan 25, 2023 5:20:38 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2023-01-25 05:20:39.653 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2023-01-25 05:20:39.983  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2023-01-25 05:20:40.189  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2023-01-25 05:20:41.112 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2023-01-25 05:20:41.117 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
2023-01-25 05:20:41.119 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2023-01-25 05:20:41.127 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2023-01-25 05:20:41.182 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2023-01-25 05:20:41.187 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/docs]}: redirectToUi(HttpServletRequest)
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
2023-01-25 05:20:41.359 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2023-01-25 05:20:42.143 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Jan 25, 2023 5:20:43 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2023-01-25 05:20:43.486  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 13.821 seconds (JVM running for 37.649)
Jan 25, 2023 5:20:46 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2023-01-25 08:27:44.239  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-25 08:27:44.258 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-25 08:27:44.312 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-25 08:27:44.317 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-25 08:27:44.347  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-25 08:27:44.626  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-25 08:27:44.630  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-25 08:27:44.632 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-25 08:27:44.632 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-25 08:27:44.639 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-25 08:27:44.657 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-25 08:27:44.661 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-25 08:27:44.727 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-25 08:27:44.739 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-25 08:27:44.740 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-25 08:27:44.744 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-25 08:27:45.354  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-25 08:27:45.357  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-25 08:27:45.358 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-25 08:27:45.360 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-25 08:27:45.379  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-25 08:27:45.381  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-25 08:27:45.382 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-25 08:27:45.382 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-25 08:27:45.383 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-25 08:27:45.414 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-25 08:27:45.415 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-25 08:27:45.416 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-25 08:27:45.423 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-25 08:27:45.424 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-25 08:27:45.425 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-25 08:27:45.426 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-25 08:27:45.481 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 592746089583030567212750462228406120580757056754
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Jan 25 04:59:46 UTC 2023
           Final Date: Mon Jan 24 04:59:45 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [93:b5:a5:33:8e:d6:1f:09:b5:53:54:fe:b5:85:ae:89:45:b0:a4:8e],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 44a2e7304f9345ac2b9257746bb2045d7de80954
                       c0e2c2822b29c71d1d057253bdd2eaaaadbbb19e
                       d98d110d64d03b8a7478b3f0fbce9e3a6a21f026
                       511460f651b10d51d02de7a83da51b477f3b5712
                       56b2576248a1f6d40b61d1e157e84c70fc4d5ee2
                       b1b42602d0742847457ec7590d31addefb62c706
                       0acdfacf2ba6d64c605f7588bae7e90fc60f79eb
                       771fa7382b8720f89d08df7fa6fceeb8e45757e1
                       029a8b34d8efdd32c775167f187836d9d15c14fb
                       157307bddda1c91f2385510de767694c5c07cefb
                       a62d2bd09800c067e65876441d9481b6411805e9
                       c51cc17941809e61d4e33a4b668591daf1350861
                       95b812262d1909d0bff39346fae63d7e45a062eb
                       4cb50f3c4f129163a7526f946a4ee99ca308486f
                       3951ea1c25d4b95c4ae7ff4508ec5a2984e0ad4b
                       3854bef87a0b358e87ce57969888c98f767b49a8
                       8c1540f5c44f12bd3b65745130f6a1c77dac19db
                       a472a304c3be02bb9a454f8c474e627503d16f95
                       7dfb1ed921aca0f6c5e519982427449f7fd0697c
                       3aa128e4
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [1b:73:39:30:51:cd:03:f1:30:2e:48:51:ca:98:bc:59:54:b4:f2:39],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-25 08:36:51.000  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-25 08:36:51.003 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-25 08:36:51.007 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-25 08:36:51.009 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-25 08:36:51.009  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-25 08:36:51.010  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-25 08:36:51.011  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-25 08:36:51.012 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-25 08:36:51.013 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-25 08:36:51.014 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-25 08:36:51.021 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-25 08:36:51.024 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-25 08:36:51.024 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-25 08:36:51.025 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-25 08:36:51.246  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-25 08:36:51.247  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-25 08:36:51.248 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-25 08:36:51.249 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-25 08:36:51.252  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-25 08:36:51.253  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-25 08:36:51.253 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-25 08:36:51.254 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-25 08:36:51.254 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-25 08:36:51.257 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-25 08:36:51.258 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-25 08:36:51.258 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-25 08:36:51.260 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-25 08:36:51.261 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-25 08:36:51.261 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-25 08:36:51.263 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-25 08:36:51.268 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 592746089583030567212750462228406120580757056754
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Jan 25 04:59:46 UTC 2023
           Final Date: Mon Jan 24 04:59:45 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [93:b5:a5:33:8e:d6:1f:09:b5:53:54:fe:b5:85:ae:89:45:b0:a4:8e],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 44a2e7304f9345ac2b9257746bb2045d7de80954
                       c0e2c2822b29c71d1d057253bdd2eaaaadbbb19e
                       d98d110d64d03b8a7478b3f0fbce9e3a6a21f026
                       511460f651b10d51d02de7a83da51b477f3b5712
                       56b2576248a1f6d40b61d1e157e84c70fc4d5ee2
                       b1b42602d0742847457ec7590d31addefb62c706
                       0acdfacf2ba6d64c605f7588bae7e90fc60f79eb
                       771fa7382b8720f89d08df7fa6fceeb8e45757e1
                       029a8b34d8efdd32c775167f187836d9d15c14fb
                       157307bddda1c91f2385510de767694c5c07cefb
                       a62d2bd09800c067e65876441d9481b6411805e9
                       c51cc17941809e61d4e33a4b668591daf1350861
                       95b812262d1909d0bff39346fae63d7e45a062eb
                       4cb50f3c4f129163a7526f946a4ee99ca308486f
                       3951ea1c25d4b95c4ae7ff4508ec5a2984e0ad4b
                       3854bef87a0b358e87ce57969888c98f767b49a8
                       8c1540f5c44f12bd3b65745130f6a1c77dac19db
                       a472a304c3be02bb9a454f8c474e627503d16f95
                       7dfb1ed921aca0f6c5e519982427449f7fd0697c
                       3aa128e4
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [c3:e1:01:db:03:26:26:63:6d:49:13:e9:68:14:37:e1:36:8e:20:42],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-25 08:44:54.506  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-25 08:44:54.511 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-25 08:44:54.517 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-25 08:44:54.518 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-25 08:44:54.519  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-25 08:44:54.520  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-25 08:44:54.521  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-25 08:44:54.522 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-25 08:44:54.522 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-25 08:44:54.523 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-25 08:44:54.528 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-25 08:44:54.529 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-25 08:44:54.530 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-25 08:44:54.530 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-25 08:44:54.687  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-25 08:44:54.688  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-25 08:44:54.689 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-25 08:44:54.690 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-25 08:44:54.693  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-25 08:44:54.697  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-25 08:44:54.698 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-25 08:44:54.699 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-25 08:44:54.699 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-25 08:44:54.701 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-25 08:44:54.701 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-25 08:44:54.702 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-25 08:44:54.704 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-25 08:44:54.705 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-25 08:44:54.705 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-25 08:44:54.707 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-25 08:44:54.713 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 592746089583030567212750462228406120580757056754
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Jan 25 04:59:46 UTC 2023
           Final Date: Mon Jan 24 04:59:45 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [93:b5:a5:33:8e:d6:1f:09:b5:53:54:fe:b5:85:ae:89:45:b0:a4:8e],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 44a2e7304f9345ac2b9257746bb2045d7de80954
                       c0e2c2822b29c71d1d057253bdd2eaaaadbbb19e
                       d98d110d64d03b8a7478b3f0fbce9e3a6a21f026
                       511460f651b10d51d02de7a83da51b477f3b5712
                       56b2576248a1f6d40b61d1e157e84c70fc4d5ee2
                       b1b42602d0742847457ec7590d31addefb62c706
                       0acdfacf2ba6d64c605f7588bae7e90fc60f79eb
                       771fa7382b8720f89d08df7fa6fceeb8e45757e1
                       029a8b34d8efdd32c775167f187836d9d15c14fb
                       157307bddda1c91f2385510de767694c5c07cefb
                       a62d2bd09800c067e65876441d9481b6411805e9
                       c51cc17941809e61d4e33a4b668591daf1350861
                       95b812262d1909d0bff39346fae63d7e45a062eb
                       4cb50f3c4f129163a7526f946a4ee99ca308486f
                       3951ea1c25d4b95c4ae7ff4508ec5a2984e0ad4b
                       3854bef87a0b358e87ce57969888c98f767b49a8
                       8c1540f5c44f12bd3b65745130f6a1c77dac19db
                       a472a304c3be02bb9a454f8c474e627503d16f95
                       7dfb1ed921aca0f6c5e519982427449f7fd0697c
                       3aa128e4
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [df:19:6c:6c:61:df:1e:08:e5:ad:d2:54:f6:23:42:59:13:a3:fa:e5],[56:66:d1:a4]
        modulus: da49a7555137df73d0960c09a1363c43081a3e3aa566a6531e581e13165b770a772a02f21e0f1f623bfbf12c619bbf3775aa5faf03b67bb03842396ad2307abfb8bb78940032f0b5f73c6b0dc3d2da15988a1c464e2d51c610e5ac404a44d5df46e213d46ba1dfd65d3bcfcb229c6c2d9b144e4d4934838aa40fa08fb10ea052454780e3e71c91b99d3c481247d290d1da0c138868cc4a6d7c6769f14b4b67af42b09c56d12699b88ccee21416d40f9777f5c7f0dc5d5c1e519483b3220bdf0da10615809d44f32c9edfdfad7732634f81f31ecc8eb3292dd8da7292d7d9cc39fcb0c65c6ee111fd611e683cdd4a2c91d11dbb0e875f32a4f21712129920df45
public exponent: 10001

] 
2023-01-25 08:46:42.827  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-25 08:46:42.830 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-25 08:46:42.833 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2023-01-25 08:46:42.850 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-25 08:46:42.860  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2023-01-25 08:46:42.862  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-25 08:46:42.865  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-25 08:46:42.865 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-25 08:46:42.867 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-25 08:46:42.867 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-25 08:46:42.874 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-25 08:46:42.875 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-25 08:46:42.876 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-25 08:46:42.877 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-25 08:46:43.016  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-25 08:46:43.018  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-25 08:46:43.019 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-25 08:46:43.019 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-25 08:46:43.025  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-25 08:46:43.026  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-25 08:46:43.031 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-25 08:46:43.032 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-25 08:46:43.032 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-25 08:46:43.037 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-25 08:46:43.038 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-25 08:46:43.039 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-25 08:46:43.040 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-25 08:46:43.040 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-25 08:46:43.041 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-25 08:46:43.042 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-25 08:46:43.046 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 592746089583030567212750462228406120580757056754
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Jan 25 04:59:46 UTC 2023
           Final Date: Mon Jan 24 04:59:45 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [93:b5:a5:33:8e:d6:1f:09:b5:53:54:fe:b5:85:ae:89:45:b0:a4:8e],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 44a2e7304f9345ac2b9257746bb2045d7de80954
                       c0e2c2822b29c71d1d057253bdd2eaaaadbbb19e
                       d98d110d64d03b8a7478b3f0fbce9e3a6a21f026
                       511460f651b10d51d02de7a83da51b477f3b5712
                       56b2576248a1f6d40b61d1e157e84c70fc4d5ee2
                       b1b42602d0742847457ec7590d31addefb62c706
                       0acdfacf2ba6d64c605f7588bae7e90fc60f79eb
                       771fa7382b8720f89d08df7fa6fceeb8e45757e1
                       029a8b34d8efdd32c775167f187836d9d15c14fb
                       157307bddda1c91f2385510de767694c5c07cefb
                       a62d2bd09800c067e65876441d9481b6411805e9
                       c51cc17941809e61d4e33a4b668591daf1350861
                       95b812262d1909d0bff39346fae63d7e45a062eb
                       4cb50f3c4f129163a7526f946a4ee99ca308486f
                       3951ea1c25d4b95c4ae7ff4508ec5a2984e0ad4b
                       3854bef87a0b358e87ce57969888c98f767b49a8
                       8c1540f5c44f12bd3b65745130f6a1c77dac19db
                       a472a304c3be02bb9a454f8c474e627503d16f95
                       7dfb1ed921aca0f6c5e519982427449f7fd0697c
                       3aa128e4
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [78:32:91:4b:d3:00:90:d4:92:e9:7a:81:1d:0f:85:53:fe:28:da:69],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-25 08:49:01.790  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-25 08:49:01.797 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-25 08:49:01.798 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2023-01-25 08:49:01.799 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-25 08:49:01.799  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2023-01-25 08:49:01.800  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-25 08:49:01.801  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-25 08:49:01.802 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-25 08:49:01.802 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-25 08:49:01.803 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-25 08:49:01.807 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-25 08:49:01.808 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-25 08:49:01.808 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-25 08:49:01.808 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-25 08:49:01.966  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-25 08:49:01.966  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-25 08:49:01.967 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-25 08:49:01.967 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-25 08:49:01.968  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-25 08:49:01.969  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-25 08:49:01.969 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-25 08:49:01.970 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-25 08:49:01.970 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-25 08:49:01.971 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-25 08:49:01.971 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-25 08:49:01.974 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-25 08:49:01.975 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-25 08:49:01.976 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-25 08:49:01.976 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-25 08:49:01.977 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-25 08:49:01.982 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 592746089583030567212750462228406120580757056754
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Jan 25 04:59:46 UTC 2023
           Final Date: Mon Jan 24 04:59:45 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [93:b5:a5:33:8e:d6:1f:09:b5:53:54:fe:b5:85:ae:89:45:b0:a4:8e],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 44a2e7304f9345ac2b9257746bb2045d7de80954
                       c0e2c2822b29c71d1d057253bdd2eaaaadbbb19e
                       d98d110d64d03b8a7478b3f0fbce9e3a6a21f026
                       511460f651b10d51d02de7a83da51b477f3b5712
                       56b2576248a1f6d40b61d1e157e84c70fc4d5ee2
                       b1b42602d0742847457ec7590d31addefb62c706
                       0acdfacf2ba6d64c605f7588bae7e90fc60f79eb
                       771fa7382b8720f89d08df7fa6fceeb8e45757e1
                       029a8b34d8efdd32c775167f187836d9d15c14fb
                       157307bddda1c91f2385510de767694c5c07cefb
                       a62d2bd09800c067e65876441d9481b6411805e9
                       c51cc17941809e61d4e33a4b668591daf1350861
                       95b812262d1909d0bff39346fae63d7e45a062eb
                       4cb50f3c4f129163a7526f946a4ee99ca308486f
                       3951ea1c25d4b95c4ae7ff4508ec5a2984e0ad4b
                       3854bef87a0b358e87ce57969888c98f767b49a8
                       8c1540f5c44f12bd3b65745130f6a1c77dac19db
                       a472a304c3be02bb9a454f8c474e627503d16f95
                       7dfb1ed921aca0f6c5e519982427449f7fd0697c
                       3aa128e4
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [c6:bf:70:84:e0:e3:40:24:ff:a6:a4:a4:b0:26:58:93:36:8f:4b:2b],[56:66:d1:a4]
        modulus: f2603112714ff1ff0c1ca057baae1c4ded984e4c879a7007fae7d8be02a35101c789f0e76fcc088e1efc398db1ae72387bfdb5954092595d1b7cbb3296513c55e3095524b4b60eb049904bf57889b4bedde1c991e6857eae80cf30b642c819e4ffeee4767e65e3d6bd74fd5cc3a153b4ad4b3cbb20e8067dd5139c280102435f14e7d556c8cc9f950a7ca0788ad47d267ab6909e2fe71a68cbd31c7d5dfb73d42f6d01e9348d08ed0f9b97363673aea8dcec6bbe1cec35dee4e039325a69697e3c8c8d1696d22a9454d26c1a0617b3b5c7e8ce4e5bb579214c2610414ed39de559a5708af471f005ab98b672809787d770700ecab86bf39f6c75166548fb2e87
public exponent: 10001

] 
2023-01-25 08:51:40.324  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-25 08:51:40.329 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-25 08:51:40.331 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-25 08:51:40.332 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-25 08:51:40.333  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-25 08:51:40.334  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-25 08:51:40.335  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-25 08:51:40.335 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-25 08:51:40.336 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-25 08:51:40.336 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-25 08:51:40.345 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-25 08:51:40.346 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-25 08:51:40.346 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-25 08:51:40.347 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-25 08:51:40.462  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-25 08:51:40.463  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-25 08:51:40.463 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-25 08:51:40.464 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-25 08:51:40.465  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-25 08:51:40.466  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-25 08:51:40.466 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-25 08:51:40.466 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-25 08:51:40.467 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-25 08:51:40.467 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-25 08:51:40.468 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-25 08:51:40.468 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-25 08:51:40.469 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-25 08:51:40.469 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-25 08:51:40.469 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-25 08:51:40.470 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-25 08:51:40.473 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 592746089583030567212750462228406120580757056754
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Jan 25 04:59:46 UTC 2023
           Final Date: Mon Jan 24 04:59:45 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [93:b5:a5:33:8e:d6:1f:09:b5:53:54:fe:b5:85:ae:89:45:b0:a4:8e],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 44a2e7304f9345ac2b9257746bb2045d7de80954
                       c0e2c2822b29c71d1d057253bdd2eaaaadbbb19e
                       d98d110d64d03b8a7478b3f0fbce9e3a6a21f026
                       511460f651b10d51d02de7a83da51b477f3b5712
                       56b2576248a1f6d40b61d1e157e84c70fc4d5ee2
                       b1b42602d0742847457ec7590d31addefb62c706
                       0acdfacf2ba6d64c605f7588bae7e90fc60f79eb
                       771fa7382b8720f89d08df7fa6fceeb8e45757e1
                       029a8b34d8efdd32c775167f187836d9d15c14fb
                       157307bddda1c91f2385510de767694c5c07cefb
                       a62d2bd09800c067e65876441d9481b6411805e9
                       c51cc17941809e61d4e33a4b668591daf1350861
                       95b812262d1909d0bff39346fae63d7e45a062eb
                       4cb50f3c4f129163a7526f946a4ee99ca308486f
                       3951ea1c25d4b95c4ae7ff4508ec5a2984e0ad4b
                       3854bef87a0b358e87ce57969888c98f767b49a8
                       8c1540f5c44f12bd3b65745130f6a1c77dac19db
                       a472a304c3be02bb9a454f8c474e627503d16f95
                       7dfb1ed921aca0f6c5e519982427449f7fd0697c
                       3aa128e4
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [44:ea:98:5f:37:70:8e:6e:42:da:5a:5a:d5:e8:85:83:e2:0b:76:c6],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-25 08:59:55.272  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-25 08:59:55.275 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-25 08:59:55.288 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2023-01-25 08:59:55.291 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-25 08:59:55.293  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2023-01-25 08:59:55.296  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-25 08:59:55.296  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-25 08:59:55.296 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-25 08:59:55.301 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-25 08:59:55.301 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-25 08:59:55.312 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-25 08:59:55.313 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-25 08:59:55.314 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-25 08:59:55.314 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-25 08:59:55.473  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-25 08:59:55.474  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-25 08:59:55.474 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-25 08:59:55.474 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-25 08:59:55.476  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-25 08:59:55.476  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-25 08:59:55.477 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-25 08:59:55.477 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-25 08:59:55.477 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-25 08:59:55.478 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-25 08:59:55.478 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-25 08:59:55.479 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-25 08:59:55.479 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-25 08:59:55.480 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-25 08:59:55.480 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-25 08:59:55.481 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-25 08:59:55.485 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 592746089583030567212750462228406120580757056754
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Jan 25 04:59:46 UTC 2023
           Final Date: Mon Jan 24 04:59:45 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [93:b5:a5:33:8e:d6:1f:09:b5:53:54:fe:b5:85:ae:89:45:b0:a4:8e],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 44a2e7304f9345ac2b9257746bb2045d7de80954
                       c0e2c2822b29c71d1d057253bdd2eaaaadbbb19e
                       d98d110d64d03b8a7478b3f0fbce9e3a6a21f026
                       511460f651b10d51d02de7a83da51b477f3b5712
                       56b2576248a1f6d40b61d1e157e84c70fc4d5ee2
                       b1b42602d0742847457ec7590d31addefb62c706
                       0acdfacf2ba6d64c605f7588bae7e90fc60f79eb
                       771fa7382b8720f89d08df7fa6fceeb8e45757e1
                       029a8b34d8efdd32c775167f187836d9d15c14fb
                       157307bddda1c91f2385510de767694c5c07cefb
                       a62d2bd09800c067e65876441d9481b6411805e9
                       c51cc17941809e61d4e33a4b668591daf1350861
                       95b812262d1909d0bff39346fae63d7e45a062eb
                       4cb50f3c4f129163a7526f946a4ee99ca308486f
                       3951ea1c25d4b95c4ae7ff4508ec5a2984e0ad4b
                       3854bef87a0b358e87ce57969888c98f767b49a8
                       8c1540f5c44f12bd3b65745130f6a1c77dac19db
                       a472a304c3be02bb9a454f8c474e627503d16f95
                       7dfb1ed921aca0f6c5e519982427449f7fd0697c
                       3aa128e4
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [93:51:68:2d:10:cf:3d:a9:85:59:5e:86:ac:1f:35:20:b2:59:de:83],[56:66:d1:a4]
        modulus: b9fe3816d466d607c31a73f55a9382de62e144566bacb8e9475a1015c50da0f260d26452fece2bdd50974a6e9677747b4613e0e736b823b6456a273c55e28e79dbd46b20ccd6cfe5673269bb2d632d4af75e4097223ae3545c514e0f1fff6b4fffc7ce8ba0e4a752d79c1dd55761f839c4a86ee465c62c84b786d2a86110d0bf3dc8d4eced90c6ab8535e4fa62a5726644821724d2259980f6fa74975ea2dba7f319b8e018e22a368d60bd89345179f722a4145a9e57d23708ccfc9195ef13424f40d076c1b3312ae3c82bd7b706e57e5e47df1636ba03713fd5cd42541f888d0a0a22f78372e80e343060fa7779b9c32dade248bd212e31868e741e1c721c6b
public exponent: 10001

] 
2023-01-25 09:06:58.643  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-25 09:06:58.648 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-25 09:06:58.655 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2023-01-25 09:06:58.659 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-25 09:06:58.661  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2023-01-25 09:06:58.662  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-25 09:06:58.663  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-25 09:06:58.663 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-25 09:06:58.664 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-25 09:06:58.664 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-25 09:06:58.671 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-25 09:06:58.676 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-25 09:06:58.676 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-25 09:06:58.677 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-25 09:06:58.829  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-25 09:06:58.830  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-25 09:06:58.830 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-25 09:06:58.831 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-25 09:06:58.832  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-25 09:06:58.833  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-25 09:06:58.833 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-25 09:06:58.834 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-25 09:06:58.834 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-25 09:06:58.835 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-25 09:06:58.835 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-25 09:06:58.836 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-25 09:06:58.837 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-25 09:06:58.837 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-25 09:06:58.838 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-25 09:06:58.839 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-25 09:06:58.843 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 592746089583030567212750462228406120580757056754
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Jan 25 04:59:46 UTC 2023
           Final Date: Mon Jan 24 04:59:45 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [93:b5:a5:33:8e:d6:1f:09:b5:53:54:fe:b5:85:ae:89:45:b0:a4:8e],[56:66:d1:a4]
        modulus: c822e3e25246bc92d59e7b05f9e5c870fc7582b90fa33a96dd8024d4339b28ea9b4668b2d4be2ef4ada6b7d6486e611b2842e9af687ae1991c7c526069e01a378406747b68632a4c81f2cdfec10ed2317c0a45d559eeb16886fbeb8bddffb8d0b54d0c8f7348931efe55e9244f11fba3c9c8d845cf35a80d4d47012a2bba385c98cd78e6c60540bbd963ffafd1ad610a98da9093844afd6b2463e7de3ea1f178a180f5811b50c5c4d5e7bddc458ab58626db904a5ca7110b9ea2f03547e9db7d162178d3ebe640e4c675485ece85adc69f18370d40e77708883ba3be3b14ad0f122d4dad1bffc926f69df0e32c973ab14ca7369c72a1ee0ca3542d2194580099990a8f77b1b24cf8c5971e8830cd0b2b0ac61a965f3af9bab81e7da941ab601b00e393428a96b42bac476891d0e84b0d4df272579f9ab83a9047d7ac1314b44e10662c33b9f96b3209a47c7906da79330ac0f7073f2ac4411bfc55e66a31f1a97e94a48a2c89a5e41fca9847871d30e748b96992ac71ff5f54cd977872cfd187
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 44a2e7304f9345ac2b9257746bb2045d7de80954
                       c0e2c2822b29c71d1d057253bdd2eaaaadbbb19e
                       d98d110d64d03b8a7478b3f0fbce9e3a6a21f026
                       511460f651b10d51d02de7a83da51b477f3b5712
                       56b2576248a1f6d40b61d1e157e84c70fc4d5ee2
                       b1b42602d0742847457ec7590d31addefb62c706
                       0acdfacf2ba6d64c605f7588bae7e90fc60f79eb
                       771fa7382b8720f89d08df7fa6fceeb8e45757e1
                       029a8b34d8efdd32c775167f187836d9d15c14fb
                       157307bddda1c91f2385510de767694c5c07cefb
                       a62d2bd09800c067e65876441d9481b6411805e9
                       c51cc17941809e61d4e33a4b668591daf1350861
                       95b812262d1909d0bff39346fae63d7e45a062eb
                       4cb50f3c4f129163a7526f946a4ee99ca308486f
                       3951ea1c25d4b95c4ae7ff4508ec5a2984e0ad4b
                       3854bef87a0b358e87ce57969888c98f767b49a8
                       8c1540f5c44f12bd3b65745130f6a1c77dac19db
                       a472a304c3be02bb9a454f8c474e627503d16f95
                       7dfb1ed921aca0f6c5e519982427449f7fd0697c
                       3aa128e4
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ae:cd:1a:77:fa:1e:65:98:34:d8:28:13:ad:41:d8:6a:7e:65:e3:b8],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-25 09:07:13.842  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-25 09:07:13.843 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-25 09:07:13.846 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2023-01-25 09:07:13.846 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-25 09:07:13.847  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2023-01-25 09:07:13.847  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-25 09:07:13.848  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-25 09:07:13.848 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-25 09:07:13.848 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-25 09:07:13.853 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-25 09:07:13.860 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-25 09:07:13.861 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-25 09:07:13.861 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-25 09:07:13.863 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-25 09:07:13.966  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-25 09:07:13.970  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-25 09:07:13.971 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-25 09:07:13.971 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-25 09:07:13.973  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-25 09:07:13.974  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-25 09:07:13.975 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-25 09:07:13.975 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-25 09:07:13.976 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-25 09:07:13.977 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-25 09:07:13.977 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-25 09:07:13.978 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-25 09:07:13.978 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-25 09:07:13.979 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-25 09:07:13.979 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-25 09:07:13.980 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-25 09:07:13.985 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 592746089583030567212750462228406120580757056754
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Jan 25 04:59:46 UTC 2023
           Final Date: Mon Jan 24 04:59:45 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [93:b5:a5:33:8e:d6:1f:09:b5:53:54:fe:b5:85:ae:89:45:b0:a4:8e],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 44a2e7304f9345ac2b9257746bb2045d7de80954
                       c0e2c2822b29c71d1d057253bdd2eaaaadbbb19e
                       d98d110d64d03b8a7478b3f0fbce9e3a6a21f026
                       511460f651b10d51d02de7a83da51b477f3b5712
                       56b2576248a1f6d40b61d1e157e84c70fc4d5ee2
                       b1b42602d0742847457ec7590d31addefb62c706
                       0acdfacf2ba6d64c605f7588bae7e90fc60f79eb
                       771fa7382b8720f89d08df7fa6fceeb8e45757e1
                       029a8b34d8efdd32c775167f187836d9d15c14fb
                       157307bddda1c91f2385510de767694c5c07cefb
                       a62d2bd09800c067e65876441d9481b6411805e9
                       c51cc17941809e61d4e33a4b668591daf1350861
                       95b812262d1909d0bff39346fae63d7e45a062eb
                       4cb50f3c4f129163a7526f946a4ee99ca308486f
                       3951ea1c25d4b95c4ae7ff4508ec5a2984e0ad4b
                       3854bef87a0b358e87ce57969888c98f767b49a8
                       8c1540f5c44f12bd3b65745130f6a1c77dac19db
                       a472a304c3be02bb9a454f8c474e627503d16f95
                       7dfb1ed921aca0f6c5e519982427449f7fd0697c
                       3aa128e4
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [e3:26:30:df:05:0d:eb:b9:38:c6:11:f9:24:71:da:51:52:c1:56:9b],[56:66:d1:a4]
        modulus: 9c157e1390309a133dd5c1ce8b55873bd0b6f41ec03908206a286b289eb6f76f8fd7d400f092a2663aaea930c11dda1605749d9bc2d368255cce4f091815d446bba97071372daa264f9ebf026fa0288fad87db629a423b764520e05ca29cd24f59548ba1b4a6518471de87c7d94f9a595c9eaa33d1c25e965070ff8a4957d875d31acd81f226252a60d03dcc94083c268eb567cd8fb5a78ac150a6073b0ddb50d149cb9115a17f4947393dbac6365885a7b61f0593884aa872002f0a37f9c41fe07984790fe7b80af26516c917935800a1ebecf9f6ddb363949547779c93641150521a35f0266c87e32705c7fb6bfe5791f21b962d0a06476036b2d00d855601
public exponent: 10001

] 
2023-01-25 09:31:46.071  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-25 09:31:46.075 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-25 09:31:46.083 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2023-01-25 09:31:46.085 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-25 09:31:46.086  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2023-01-25 09:31:46.087  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-25 09:31:46.087  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-25 09:31:46.088 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-25 09:31:46.089 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-25 09:31:46.094 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-25 09:31:46.109 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-25 09:31:46.113 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-25 09:31:46.113 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-25 09:31:46.113 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-25 09:31:46.298  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-25 09:31:46.298  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-25 09:31:46.299 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-25 09:31:46.299 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-25 09:31:46.301  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-25 09:31:46.301  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-25 09:31:46.302 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-25 09:31:46.302 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-25 09:31:46.303 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-25 09:31:46.304 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-25 09:31:46.304 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-25 09:31:46.304 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-25 09:31:46.305 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-25 09:31:46.305 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-25 09:31:46.305 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-25 09:31:46.306 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-25 09:31:46.310 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 592746089583030567212750462228406120580757056754
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Jan 25 04:59:46 UTC 2023
           Final Date: Mon Jan 24 04:59:45 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [93:b5:a5:33:8e:d6:1f:09:b5:53:54:fe:b5:85:ae:89:45:b0:a4:8e],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 44a2e7304f9345ac2b9257746bb2045d7de80954
                       c0e2c2822b29c71d1d057253bdd2eaaaadbbb19e
                       d98d110d64d03b8a7478b3f0fbce9e3a6a21f026
                       511460f651b10d51d02de7a83da51b477f3b5712
                       56b2576248a1f6d40b61d1e157e84c70fc4d5ee2
                       b1b42602d0742847457ec7590d31addefb62c706
                       0acdfacf2ba6d64c605f7588bae7e90fc60f79eb
                       771fa7382b8720f89d08df7fa6fceeb8e45757e1
                       029a8b34d8efdd32c775167f187836d9d15c14fb
                       157307bddda1c91f2385510de767694c5c07cefb
                       a62d2bd09800c067e65876441d9481b6411805e9
                       c51cc17941809e61d4e33a4b668591daf1350861
                       95b812262d1909d0bff39346fae63d7e45a062eb
                       4cb50f3c4f129163a7526f946a4ee99ca308486f
                       3951ea1c25d4b95c4ae7ff4508ec5a2984e0ad4b
                       3854bef87a0b358e87ce57969888c98f767b49a8
                       8c1540f5c44f12bd3b65745130f6a1c77dac19db
                       a472a304c3be02bb9a454f8c474e627503d16f95
                       7dfb1ed921aca0f6c5e519982427449f7fd0697c
                       3aa128e4
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [2e:4d:ec:dd:49:32:98:e5:fc:8d:08:82:62:a3:47:16:10:1f:95:d5],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-25 09:31:52.988  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-25 09:31:52.990 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-25 09:31:52.991 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2023-01-25 09:31:52.992 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-25 09:31:52.992  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2023-01-25 09:31:52.992  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-25 09:31:52.993  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-25 09:31:52.993 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-25 09:31:52.994 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-25 09:31:53.009 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-25 09:31:53.014 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-25 09:31:53.019 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-25 09:31:53.021 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-25 09:31:53.021 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-25 09:31:53.140  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-25 09:31:53.141  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-25 09:31:53.142 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-25 09:31:53.142 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-25 09:31:53.149  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-25 09:31:53.149  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-25 09:31:53.150 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-25 09:31:53.150 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-25 09:31:53.151 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-25 09:31:53.151 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-25 09:31:53.152 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-25 09:31:53.152 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-25 09:31:53.153 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-25 09:31:53.153 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-25 09:31:53.153 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-25 09:31:53.155 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-25 09:31:53.158 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 592746089583030567212750462228406120580757056754
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Jan 25 04:59:46 UTC 2023
           Final Date: Mon Jan 24 04:59:45 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [93:b5:a5:33:8e:d6:1f:09:b5:53:54:fe:b5:85:ae:89:45:b0:a4:8e],[56:66:d1:a4]
        modulus: c822e3e25246bc92d59e7b05f9e5c870fc7582b90fa33a96dd8024d4339b28ea9b4668b2d4be2ef4ada6b7d6486e611b2842e9af687ae1991c7c526069e01a378406747b68632a4c81f2cdfec10ed2317c0a45d559eeb16886fbeb8bddffb8d0b54d0c8f7348931efe55e9244f11fba3c9c8d845cf35a80d4d47012a2bba385c98cd78e6c60540bbd963ffafd1ad610a98da9093844afd6b2463e7de3ea1f178a180f5811b50c5c4d5e7bddc458ab58626db904a5ca7110b9ea2f03547e9db7d162178d3ebe640e4c675485ece85adc69f18370d40e77708883ba3be3b14ad0f122d4dad1bffc926f69df0e32c973ab14ca7369c72a1ee0ca3542d2194580099990a8f77b1b24cf8c5971e8830cd0b2b0ac61a965f3af9bab81e7da941ab601b00e393428a96b42bac476891d0e84b0d4df272579f9ab83a9047d7ac1314b44e10662c33b9f96b3209a47c7906da79330ac0f7073f2ac4411bfc55e66a31f1a97e94a48a2c89a5e41fca9847871d30e748b96992ac71ff5f54cd977872cfd187
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 44a2e7304f9345ac2b9257746bb2045d7de80954
                       c0e2c2822b29c71d1d057253bdd2eaaaadbbb19e
                       d98d110d64d03b8a7478b3f0fbce9e3a6a21f026
                       511460f651b10d51d02de7a83da51b477f3b5712
                       56b2576248a1f6d40b61d1e157e84c70fc4d5ee2
                       b1b42602d0742847457ec7590d31addefb62c706
                       0acdfacf2ba6d64c605f7588bae7e90fc60f79eb
                       771fa7382b8720f89d08df7fa6fceeb8e45757e1
                       029a8b34d8efdd32c775167f187836d9d15c14fb
                       157307bddda1c91f2385510de767694c5c07cefb
                       a62d2bd09800c067e65876441d9481b6411805e9
                       c51cc17941809e61d4e33a4b668591daf1350861
                       95b812262d1909d0bff39346fae63d7e45a062eb
                       4cb50f3c4f129163a7526f946a4ee99ca308486f
                       3951ea1c25d4b95c4ae7ff4508ec5a2984e0ad4b
                       3854bef87a0b358e87ce57969888c98f767b49a8
                       8c1540f5c44f12bd3b65745130f6a1c77dac19db
                       a472a304c3be02bb9a454f8c474e627503d16f95
                       7dfb1ed921aca0f6c5e519982427449f7fd0697c
                       3aa128e4
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [95:51:48:3a:9f:c2:f5:23:37:40:ea:52:57:93:c4:0e:a8:f7:3f:f8],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

]