Results

By type

          2023-02-01 05:30:34,634 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2023-02-01 05:30:36,163 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2023-02-01 05:30:37.365  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Feb 01, 2023 5:30:40 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Feb 01, 2023 5:30:40 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Feb 01, 2023 5:30:40 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Feb 01, 2023 5:30:40 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2023-02-01 05:30:41.071 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2023-02-01 05:30:41.515  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2023-02-01 05:30:41.762  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2023-02-01 05:30:42.819 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2023-02-01 05:30:42.823 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
2023-02-01 05:30:42.825 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2023-02-01 05:30:42.831 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2023-02-01 05:30:42.879 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2023-02-01 05:30:42.884 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
	{GET [/docs]}: redirectToUi(HttpServletRequest)
2023-02-01 05:30:43.034 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2023-02-01 05:30:43.936 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Feb 01, 2023 5:30:44 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2023-02-01 05:30:45.249  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 12.212 seconds (JVM running for 15.068)
Feb 01, 2023 5:31:05 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2023-02-01 05:31:29.567  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-02-01 05:31:29.577 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-02-01 05:31:29.663 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2023-02-01 05:31:29.668 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-02-01 05:31:29.697  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2023-02-01 05:31:29.700  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-02-01 05:31:29.701  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-02-01 05:31:29.703 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-02-01 05:31:29.704 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-02-01 05:31:29.708 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-02-01 05:31:29.719 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-02-01 05:31:29.726 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-02-01 05:31:29.795 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-02-01 05:31:29.802 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-02-01 05:31:29.803 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-02-01 05:31:29.807 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-02-01 05:31:31.734  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-02-01 05:31:31.738  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-02-01 05:31:31.739 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-02-01 05:31:31.741 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-02-01 05:31:31.753  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-02-01 05:31:31.754  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-02-01 05:31:31.756 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-02-01 05:31:31.756 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-02-01 05:31:31.757 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-02-01 05:31:31.776 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-02-01 05:31:31.777 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-02-01 05:31:31.777 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-02-01 05:31:31.784 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-02-01 05:31:31.785 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-02-01 05:31:31.785 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-02-01 05:31:31.787 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-02-01 05:31:31.828 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 350818260901981987145403816432123511694108518182
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Feb 01 05:17:54 UTC 2023
           Final Date: Mon Jan 31 05:17:53 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ef:9a:ec:49:88:38:b2:20:93:1e:35:2c:3a:40:4f:3e:33:54:b8:ce],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 370b82280b78bf4ecf1169d446138ba2d467d9ad
                       1e93b8b7c43e56fbe89066896bb62905d45c347b
                       b96427edaa75598f7f18838fe9dae0b184d5646b
                       aba39f48517d32b99da6a680ea47ee2fd5e3d3d5
                       f9de2ee01f101efb7e8a5de1e5834567b60c9f6b
                       a845e3b1e9fca147a5f6f334329dc7f3a8c0f3fd
                       3e915bdba1ef716d3e7a654e773ac267f51b95bd
                       d12bf8b2183af09c95357035b68f2ce8196c2ac6
                       ba684401555afcb9ea1007f492d02040ec7a8816
                       e732d3c8a22c7301e8cbaa84fdfa3116c1ee5c9f
                       4ed08b384aaab0fb2caaf14379ef2d4862458afd
                       4abf2a3407bc98ad55b073898d277035d49f2f61
                       a0987565e49db3c1366c12f315fce47fb921c042
                       b053c8eab52bff556f12a98d1eccf6efba80e1c0
                       808c900aab2c3393cd9efe875299309dd5cbeb4f
                       8677234b5754ccd43ec9b3883e4df356bb6f04be
                       527de10561498321e19134dc53163941b3b72e0a
                       d90c2d4121af8c0d0f54443a153c6808443808d6
                       56893d83289ebba077bc99bf64c8246edd2943a9
                       1495aba8
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [2b:4e:40:4a:0b:da:78:a2:77:ed:cf:69:ea:be:55:3d:e2:45:46:43],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-02-01 08:40:11.055  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-02-01 08:40:11.059 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-02-01 08:40:11.063 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-02-01 08:40:11.065 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-02-01 08:40:11.065  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-02-01 08:40:11.066  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-02-01 08:40:11.067  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-02-01 08:40:11.068 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-02-01 08:40:11.069 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-02-01 08:40:11.069 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-02-01 08:40:11.076 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-02-01 08:40:11.078 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-02-01 08:40:11.079 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-02-01 08:40:11.080 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-02-01 08:40:13.688  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-02-01 08:40:13.689  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-02-01 08:40:13.689 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-02-01 08:40:13.690 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-02-01 08:40:13.693  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-02-01 08:40:13.693  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-02-01 08:40:13.694 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-02-01 08:40:13.694 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-02-01 08:40:13.695 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-02-01 08:40:13.696 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-02-01 08:40:13.697 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-02-01 08:40:13.697 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-02-01 08:40:13.698 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-02-01 08:40:13.698 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-02-01 08:40:13.699 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-02-01 08:40:13.700 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-02-01 08:40:13.705 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 350818260901981987145403816432123511694108518182
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Feb 01 05:17:54 UTC 2023
           Final Date: Mon Jan 31 05:17:53 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ef:9a:ec:49:88:38:b2:20:93:1e:35:2c:3a:40:4f:3e:33:54:b8:ce],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 370b82280b78bf4ecf1169d446138ba2d467d9ad
                       1e93b8b7c43e56fbe89066896bb62905d45c347b
                       b96427edaa75598f7f18838fe9dae0b184d5646b
                       aba39f48517d32b99da6a680ea47ee2fd5e3d3d5
                       f9de2ee01f101efb7e8a5de1e5834567b60c9f6b
                       a845e3b1e9fca147a5f6f334329dc7f3a8c0f3fd
                       3e915bdba1ef716d3e7a654e773ac267f51b95bd
                       d12bf8b2183af09c95357035b68f2ce8196c2ac6
                       ba684401555afcb9ea1007f492d02040ec7a8816
                       e732d3c8a22c7301e8cbaa84fdfa3116c1ee5c9f
                       4ed08b384aaab0fb2caaf14379ef2d4862458afd
                       4abf2a3407bc98ad55b073898d277035d49f2f61
                       a0987565e49db3c1366c12f315fce47fb921c042
                       b053c8eab52bff556f12a98d1eccf6efba80e1c0
                       808c900aab2c3393cd9efe875299309dd5cbeb4f
                       8677234b5754ccd43ec9b3883e4df356bb6f04be
                       527de10561498321e19134dc53163941b3b72e0a
                       d90c2d4121af8c0d0f54443a153c6808443808d6
                       56893d83289ebba077bc99bf64c8246edd2943a9
                       1495aba8
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [be:85:a8:75:7d:ea:b5:3f:75:ec:83:d6:da:24:05:57:5d:aa:88:61],[56:66:d1:a4]
        modulus: bb0acd5f39192b767e1d8cc3b48ecf7b1456c7d62c6939237fc3ccf64145efd6567ec487b061ef8e4befa5330033c3282136ecf3ec6140107fe8208c20eb0a457b9934572979ea1746326ea444ab4c25fcc2c60cde3a2650125551571e0c3f1a12f4868457ea967a6f2f60aaae66730c537af5f93a59f5602e68e25670a7189690cf1aabdf98caa38eee9e35dccbcdcbf4ef01074c63dc79f5c12dabcccb4e9970a00117b23c5748d3844e8da9c224f0237476c7ff9c87909e7ff8380f586b584a38faac741993898b112951e068ca1b426eeae3ca51565868dd95178d31cf11c754a5febd8fb1d2c8db88c923ffcd5bffb3155794a97363f069dbb8440ae86f
public exponent: 10001

] 
2023-02-01 08:42:12.910  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-02-01 08:42:12.913 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-02-01 08:42:12.915 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2023-02-01 08:42:12.917 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-02-01 08:42:12.917  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2023-02-01 08:42:12.918  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-02-01 08:42:12.919  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-02-01 08:42:12.919 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-02-01 08:42:12.920 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-02-01 08:42:12.935 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-02-01 08:42:12.957 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-02-01 08:42:12.959 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-02-01 08:42:12.959 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-02-01 08:42:12.960 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-02-01 08:42:14.387  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-02-01 08:42:14.394  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-02-01 08:42:14.395 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-02-01 08:42:14.395 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-02-01 08:42:14.401  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-02-01 08:42:14.403  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-02-01 08:42:14.403 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-02-01 08:42:14.404 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-02-01 08:42:14.405 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-02-01 08:42:14.407 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-02-01 08:42:14.408 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-02-01 08:42:14.425 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-02-01 08:42:14.427 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-02-01 08:42:14.427 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-02-01 08:42:14.428 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-02-01 08:42:14.429 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-02-01 08:42:14.436 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 350818260901981987145403816432123511694108518182
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Feb 01 05:17:54 UTC 2023
           Final Date: Mon Jan 31 05:17:53 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ef:9a:ec:49:88:38:b2:20:93:1e:35:2c:3a:40:4f:3e:33:54:b8:ce],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 370b82280b78bf4ecf1169d446138ba2d467d9ad
                       1e93b8b7c43e56fbe89066896bb62905d45c347b
                       b96427edaa75598f7f18838fe9dae0b184d5646b
                       aba39f48517d32b99da6a680ea47ee2fd5e3d3d5
                       f9de2ee01f101efb7e8a5de1e5834567b60c9f6b
                       a845e3b1e9fca147a5f6f334329dc7f3a8c0f3fd
                       3e915bdba1ef716d3e7a654e773ac267f51b95bd
                       d12bf8b2183af09c95357035b68f2ce8196c2ac6
                       ba684401555afcb9ea1007f492d02040ec7a8816
                       e732d3c8a22c7301e8cbaa84fdfa3116c1ee5c9f
                       4ed08b384aaab0fb2caaf14379ef2d4862458afd
                       4abf2a3407bc98ad55b073898d277035d49f2f61
                       a0987565e49db3c1366c12f315fce47fb921c042
                       b053c8eab52bff556f12a98d1eccf6efba80e1c0
                       808c900aab2c3393cd9efe875299309dd5cbeb4f
                       8677234b5754ccd43ec9b3883e4df356bb6f04be
                       527de10561498321e19134dc53163941b3b72e0a
                       d90c2d4121af8c0d0f54443a153c6808443808d6
                       56893d83289ebba077bc99bf64c8246edd2943a9
                       1495aba8
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [97:13:50:6f:fd:ac:c5:ee:bc:23:52:c6:f8:b2:f4:76:1b:dc:26:08],[56:66:d1:a4]
        modulus: a79f6e1bd08a8a46dd679f6c50def11212fda5bd33ca5d618108ff062751191c44b36f1038ff71f53b1e46277940736336d147e572749d1792271cf7c5748947e02553368c2aa77767c01f86116bacefa3c685a0e8e233482688f0606c83daad62dc0a7cccc8a46eb66892c111868c587e2c45d34b1e6e0dc246d1b2e5458436f8e4462ae3aff945c43263cdef600e9065ae7e1bd3353e41c2eecb4053b506a390fc3022609c81ef2930f42a4e5ed40c2d06f58113e9626d0a49bfb535b9174449bbab3f87d40e11a5af7896699902b01db25104cecdc2b8ca82d600b6eefd13a14fb3bf6bda6e1def97449867867b74c4ab33c432df8d5dd81e3f15b0407c55
public exponent: 10001

] 
2023-02-01 08:44:15.282  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-02-01 08:44:15.301 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-02-01 08:44:15.313 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2023-02-01 08:44:15.315 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-02-01 08:44:15.318  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2023-02-01 08:44:15.323  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-02-01 08:44:15.324  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-02-01 08:44:15.324 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-02-01 08:44:15.324 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-02-01 08:44:15.325 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-02-01 08:44:15.332 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-02-01 08:44:15.333 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-02-01 08:44:15.334 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-02-01 08:44:15.334 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-02-01 08:44:16.063  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-02-01 08:44:16.066  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-02-01 08:44:16.066 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-02-01 08:44:16.068 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-02-01 08:44:16.077  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-02-01 08:44:16.078  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-02-01 08:44:16.079 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-02-01 08:44:16.080 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-02-01 08:44:16.080 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-02-01 08:44:16.100 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-02-01 08:44:16.101 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-02-01 08:44:16.102 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-02-01 08:44:16.103 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-02-01 08:44:16.105 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-02-01 08:44:16.106 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-02-01 08:44:16.124 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-02-01 08:44:16.148 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 350818260901981987145403816432123511694108518182
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Feb 01 05:17:54 UTC 2023
           Final Date: Mon Jan 31 05:17:53 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ef:9a:ec:49:88:38:b2:20:93:1e:35:2c:3a:40:4f:3e:33:54:b8:ce],[56:66:d1:a4]
        modulus: c548e1d956b3100c231196ce98059162cba5b492ec02e56cfda24d51fcfbfbe86c61cb4a800d58d06f90e5cf9bad5c5e672a985442022f8a97d91b77df76d6045904a0dfa5bb35e400c759b989e4c908546e3c54db94b2b9a9a45b3878d74877d62db1b60fafbf4b3066c8979a203081e9f17a276fff4c24ddcc196c613888633f6a86cb9a0b202bf0f761997baf93ab3ca6f32353e31690165abc02781483c6c87eede6fabab6a667095f97654b56b2cb6d8ac531e7753be7d33be6493f03691877a67e6b9c3faa97526da8db53992eabb8ee58c99196f6d460f7e5b4e5e09be2ce598132fc04f0a392365844dc1bd46129e7bc1d58d674d8acbfb5e57f0d2a1250b6682f7fd77b4124b1c2d6ebcc35f97c11f3c68724c5cf2970998b33917598615fdf3e50ddbb07f6c6641df6e46165b9f0232c2bf037a24a94d888645b08f0c772c548c62383faac3d59550ecc299665c62e07addbda55f6e8919a0bd38bc2430f9ed8562ea80d4be8e347085b4f23d86a89aee1f418a7b5ee70c3fbb171
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 370b82280b78bf4ecf1169d446138ba2d467d9ad
                       1e93b8b7c43e56fbe89066896bb62905d45c347b
                       b96427edaa75598f7f18838fe9dae0b184d5646b
                       aba39f48517d32b99da6a680ea47ee2fd5e3d3d5
                       f9de2ee01f101efb7e8a5de1e5834567b60c9f6b
                       a845e3b1e9fca147a5f6f334329dc7f3a8c0f3fd
                       3e915bdba1ef716d3e7a654e773ac267f51b95bd
                       d12bf8b2183af09c95357035b68f2ce8196c2ac6
                       ba684401555afcb9ea1007f492d02040ec7a8816
                       e732d3c8a22c7301e8cbaa84fdfa3116c1ee5c9f
                       4ed08b384aaab0fb2caaf14379ef2d4862458afd
                       4abf2a3407bc98ad55b073898d277035d49f2f61
                       a0987565e49db3c1366c12f315fce47fb921c042
                       b053c8eab52bff556f12a98d1eccf6efba80e1c0
                       808c900aab2c3393cd9efe875299309dd5cbeb4f
                       8677234b5754ccd43ec9b3883e4df356bb6f04be
                       527de10561498321e19134dc53163941b3b72e0a
                       d90c2d4121af8c0d0f54443a153c6808443808d6
                       56893d83289ebba077bc99bf64c8246edd2943a9
                       1495aba8
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [03:76:71:ab:5f:be:52:2a:a9:83:e1:a7:07:9c:f3:3f:66:40:e8:c5],[56:66:d1:a4]
        modulus: ebede862d2f2dae9836e36c73a20a924d0a92c1711eab240c2357c497285ce3df990597aa238942a904430e4046744aada321a53177afb0e27eb349f278d5a267da3804424ec643bc08f41e789db29c8ba2e8478e1d7101118266912a9be46b1608775192c2f4498b8de8b9cc37572d7208e9e1680e8e74299702d21f3048d2078e49920e80ca31f1ecdaaba1015c255c1551faa142d518789219785f3bc6b175b4a53b1ebb199417922b78b179d7ed77561f03c71a49d211393ee862d743ad19fbb755316f8430112fff804318a5ce70cfbf05d2e015577220ccf6c50754fab5de5ed549c2659112e34ca3c2547f4f339f1e4ccc19960e8735e1fc7190fe9e1
public exponent: 10001

] 
2023-02-01 08:47:10.296  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-02-01 08:47:10.304 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-02-01 08:47:10.307 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-02-01 08:47:10.314 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-02-01 08:47:10.316  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-02-01 08:47:10.320  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-02-01 08:47:10.320  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-02-01 08:47:10.321 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-02-01 08:47:10.322 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-02-01 08:47:10.323 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-02-01 08:47:10.328 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-02-01 08:47:10.330 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-02-01 08:47:10.331 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-02-01 08:47:10.331 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-02-01 08:47:13.940  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-02-01 08:47:13.943  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-02-01 08:47:13.943 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-02-01 08:47:13.944 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-02-01 08:47:13.946  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-02-01 08:47:13.947  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-02-01 08:47:13.948 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-02-01 08:47:13.949 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-02-01 08:47:13.949 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-02-01 08:47:13.951 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-02-01 08:47:13.951 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-02-01 08:47:13.952 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-02-01 08:47:13.953 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-02-01 08:47:13.955 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-02-01 08:47:13.955 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-02-01 08:47:13.960 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-02-01 08:47:13.969 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 350818260901981987145403816432123511694108518182
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Feb 01 05:17:54 UTC 2023
           Final Date: Mon Jan 31 05:17:53 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ef:9a:ec:49:88:38:b2:20:93:1e:35:2c:3a:40:4f:3e:33:54:b8:ce],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 370b82280b78bf4ecf1169d446138ba2d467d9ad
                       1e93b8b7c43e56fbe89066896bb62905d45c347b
                       b96427edaa75598f7f18838fe9dae0b184d5646b
                       aba39f48517d32b99da6a680ea47ee2fd5e3d3d5
                       f9de2ee01f101efb7e8a5de1e5834567b60c9f6b
                       a845e3b1e9fca147a5f6f334329dc7f3a8c0f3fd
                       3e915bdba1ef716d3e7a654e773ac267f51b95bd
                       d12bf8b2183af09c95357035b68f2ce8196c2ac6
                       ba684401555afcb9ea1007f492d02040ec7a8816
                       e732d3c8a22c7301e8cbaa84fdfa3116c1ee5c9f
                       4ed08b384aaab0fb2caaf14379ef2d4862458afd
                       4abf2a3407bc98ad55b073898d277035d49f2f61
                       a0987565e49db3c1366c12f315fce47fb921c042
                       b053c8eab52bff556f12a98d1eccf6efba80e1c0
                       808c900aab2c3393cd9efe875299309dd5cbeb4f
                       8677234b5754ccd43ec9b3883e4df356bb6f04be
                       527de10561498321e19134dc53163941b3b72e0a
                       d90c2d4121af8c0d0f54443a153c6808443808d6
                       56893d83289ebba077bc99bf64c8246edd2943a9
                       1495aba8
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [99:1e:d8:f3:02:d3:42:fc:26:1d:d2:e9:1e:40:24:72:31:e4:b0:f1],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-02-01 08:57:45.960  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-02-01 08:57:45.969 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-02-01 08:57:45.974 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-02-01 08:57:45.976 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-02-01 08:57:45.977  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-02-01 08:57:45.978  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-02-01 08:57:45.978  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-02-01 08:57:45.979 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-02-01 08:57:45.980 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-02-01 08:57:45.980 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-02-01 08:57:45.990 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-02-01 08:57:45.993 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-02-01 08:57:45.994 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-02-01 08:57:45.994 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-02-01 08:57:46.810  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-02-01 08:57:46.812  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-02-01 08:57:46.812 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-02-01 08:57:46.812 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-02-01 08:57:46.825  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-02-01 08:57:46.826  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-02-01 08:57:46.826 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-02-01 08:57:46.827 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-02-01 08:57:46.827 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-02-01 08:57:46.829 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-02-01 08:57:46.829 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-02-01 08:57:46.830 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-02-01 08:57:46.834 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-02-01 08:57:46.835 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-02-01 08:57:46.836 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-02-01 08:57:46.837 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-02-01 08:57:46.844 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 350818260901981987145403816432123511694108518182
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Feb 01 05:17:54 UTC 2023
           Final Date: Mon Jan 31 05:17:53 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ef:9a:ec:49:88:38:b2:20:93:1e:35:2c:3a:40:4f:3e:33:54:b8:ce],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 370b82280b78bf4ecf1169d446138ba2d467d9ad
                       1e93b8b7c43e56fbe89066896bb62905d45c347b
                       b96427edaa75598f7f18838fe9dae0b184d5646b
                       aba39f48517d32b99da6a680ea47ee2fd5e3d3d5
                       f9de2ee01f101efb7e8a5de1e5834567b60c9f6b
                       a845e3b1e9fca147a5f6f334329dc7f3a8c0f3fd
                       3e915bdba1ef716d3e7a654e773ac267f51b95bd
                       d12bf8b2183af09c95357035b68f2ce8196c2ac6
                       ba684401555afcb9ea1007f492d02040ec7a8816
                       e732d3c8a22c7301e8cbaa84fdfa3116c1ee5c9f
                       4ed08b384aaab0fb2caaf14379ef2d4862458afd
                       4abf2a3407bc98ad55b073898d277035d49f2f61
                       a0987565e49db3c1366c12f315fce47fb921c042
                       b053c8eab52bff556f12a98d1eccf6efba80e1c0
                       808c900aab2c3393cd9efe875299309dd5cbeb4f
                       8677234b5754ccd43ec9b3883e4df356bb6f04be
                       527de10561498321e19134dc53163941b3b72e0a
                       d90c2d4121af8c0d0f54443a153c6808443808d6
                       56893d83289ebba077bc99bf64c8246edd2943a9
                       1495aba8
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [cb:14:e6:d8:48:19:8d:f4:22:73:8a:78:ed:3f:24:98:df:85:a2:f5],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-02-01 09:03:16.145  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-02-01 09:03:16.149 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-02-01 09:03:16.154 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-02-01 09:03:16.156 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-02-01 09:03:16.157  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-02-01 09:03:16.158  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-02-01 09:03:16.158  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-02-01 09:03:16.159 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-02-01 09:03:16.160 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-02-01 09:03:16.160 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-02-01 09:03:16.168 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-02-01 09:03:16.171 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-02-01 09:03:16.171 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-02-01 09:03:16.172 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-02-01 09:03:16.943  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-02-01 09:03:16.944  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-02-01 09:03:16.945 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-02-01 09:03:16.945 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-02-01 09:03:16.947  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-02-01 09:03:16.948  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-02-01 09:03:16.948 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-02-01 09:03:16.949 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-02-01 09:03:16.949 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-02-01 09:03:16.963 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-02-01 09:03:16.964 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-02-01 09:03:16.966 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-02-01 09:03:16.967 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-02-01 09:03:16.968 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-02-01 09:03:16.968 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-02-01 09:03:16.969 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-02-01 09:03:16.974 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 350818260901981987145403816432123511694108518182
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Feb 01 05:17:54 UTC 2023
           Final Date: Mon Jan 31 05:17:53 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ef:9a:ec:49:88:38:b2:20:93:1e:35:2c:3a:40:4f:3e:33:54:b8:ce],[56:66:d1:a4]
        modulus: c548e1d956b3100c231196ce98059162cba5b492ec02e56cfda24d51fcfbfbe86c61cb4a800d58d06f90e5cf9bad5c5e672a985442022f8a97d91b77df76d6045904a0dfa5bb35e400c759b989e4c908546e3c54db94b2b9a9a45b3878d74877d62db1b60fafbf4b3066c8979a203081e9f17a276fff4c24ddcc196c613888633f6a86cb9a0b202bf0f761997baf93ab3ca6f32353e31690165abc02781483c6c87eede6fabab6a667095f97654b56b2cb6d8ac531e7753be7d33be6493f03691877a67e6b9c3faa97526da8db53992eabb8ee58c99196f6d460f7e5b4e5e09be2ce598132fc04f0a392365844dc1bd46129e7bc1d58d674d8acbfb5e57f0d2a1250b6682f7fd77b4124b1c2d6ebcc35f97c11f3c68724c5cf2970998b33917598615fdf3e50ddbb07f6c6641df6e46165b9f0232c2bf037a24a94d888645b08f0c772c548c62383faac3d59550ecc299665c62e07addbda55f6e8919a0bd38bc2430f9ed8562ea80d4be8e347085b4f23d86a89aee1f418a7b5ee70c3fbb171
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 370b82280b78bf4ecf1169d446138ba2d467d9ad
                       1e93b8b7c43e56fbe89066896bb62905d45c347b
                       b96427edaa75598f7f18838fe9dae0b184d5646b
                       aba39f48517d32b99da6a680ea47ee2fd5e3d3d5
                       f9de2ee01f101efb7e8a5de1e5834567b60c9f6b
                       a845e3b1e9fca147a5f6f334329dc7f3a8c0f3fd
                       3e915bdba1ef716d3e7a654e773ac267f51b95bd
                       d12bf8b2183af09c95357035b68f2ce8196c2ac6
                       ba684401555afcb9ea1007f492d02040ec7a8816
                       e732d3c8a22c7301e8cbaa84fdfa3116c1ee5c9f
                       4ed08b384aaab0fb2caaf14379ef2d4862458afd
                       4abf2a3407bc98ad55b073898d277035d49f2f61
                       a0987565e49db3c1366c12f315fce47fb921c042
                       b053c8eab52bff556f12a98d1eccf6efba80e1c0
                       808c900aab2c3393cd9efe875299309dd5cbeb4f
                       8677234b5754ccd43ec9b3883e4df356bb6f04be
                       527de10561498321e19134dc53163941b3b72e0a
                       d90c2d4121af8c0d0f54443a153c6808443808d6
                       56893d83289ebba077bc99bf64c8246edd2943a9
                       1495aba8
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [79:4a:0c:5f:5b:2a:6e:ac:c4:59:17:ae:71:1b:a3:32:7b:fe:cd:a0],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-02-01 09:21:47.155  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-02-01 09:21:47.158 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-02-01 09:21:47.161 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-02-01 09:21:47.163 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-02-01 09:21:47.164  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-02-01 09:21:47.164  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-02-01 09:21:47.165  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-02-01 09:21:47.165 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-02-01 09:21:47.166 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-02-01 09:21:47.166 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-02-01 09:21:47.172 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-02-01 09:21:47.173 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-02-01 09:21:47.173 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-02-01 09:21:47.174 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-02-01 09:21:47.892  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-02-01 09:21:47.893  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-02-01 09:21:47.894 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-02-01 09:21:47.894 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-02-01 09:21:47.896  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-02-01 09:21:47.896  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-02-01 09:21:47.897 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-02-01 09:21:47.897 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-02-01 09:21:47.898 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-02-01 09:21:47.899 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-02-01 09:21:47.899 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-02-01 09:21:47.900 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-02-01 09:21:47.901 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-02-01 09:21:47.901 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-02-01 09:21:47.902 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-02-01 09:21:47.904 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-02-01 09:21:47.910 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 350818260901981987145403816432123511694108518182
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Feb 01 05:17:54 UTC 2023
           Final Date: Mon Jan 31 05:17:53 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ef:9a:ec:49:88:38:b2:20:93:1e:35:2c:3a:40:4f:3e:33:54:b8:ce],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 370b82280b78bf4ecf1169d446138ba2d467d9ad
                       1e93b8b7c43e56fbe89066896bb62905d45c347b
                       b96427edaa75598f7f18838fe9dae0b184d5646b
                       aba39f48517d32b99da6a680ea47ee2fd5e3d3d5
                       f9de2ee01f101efb7e8a5de1e5834567b60c9f6b
                       a845e3b1e9fca147a5f6f334329dc7f3a8c0f3fd
                       3e915bdba1ef716d3e7a654e773ac267f51b95bd
                       d12bf8b2183af09c95357035b68f2ce8196c2ac6
                       ba684401555afcb9ea1007f492d02040ec7a8816
                       e732d3c8a22c7301e8cbaa84fdfa3116c1ee5c9f
                       4ed08b384aaab0fb2caaf14379ef2d4862458afd
                       4abf2a3407bc98ad55b073898d277035d49f2f61
                       a0987565e49db3c1366c12f315fce47fb921c042
                       b053c8eab52bff556f12a98d1eccf6efba80e1c0
                       808c900aab2c3393cd9efe875299309dd5cbeb4f
                       8677234b5754ccd43ec9b3883e4df356bb6f04be
                       527de10561498321e19134dc53163941b3b72e0a
                       d90c2d4121af8c0d0f54443a153c6808443808d6
                       56893d83289ebba077bc99bf64c8246edd2943a9
                       1495aba8
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [eb:1b:73:20:df:01:c9:6a:bc:b0:60:61:e4:b2:4f:e8:e0:50:a8:d2],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-02-01 09:27:31.047  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-02-01 09:27:31.049 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-02-01 09:27:31.053 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-02-01 09:27:31.054 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-02-01 09:27:31.056  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-02-01 09:27:31.059  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-02-01 09:27:31.060  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-02-01 09:27:31.061 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-02-01 09:27:31.062 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-02-01 09:27:31.062 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-02-01 09:27:31.067 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-02-01 09:27:31.069 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-02-01 09:27:31.070 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-02-01 09:27:31.070 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-02-01 09:27:31.800  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-02-01 09:27:31.803  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-02-01 09:27:31.806 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-02-01 09:27:31.808 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-02-01 09:27:31.821  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-02-01 09:27:31.823  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-02-01 09:27:31.838 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-02-01 09:27:31.839 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-02-01 09:27:31.839 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-02-01 09:27:31.840 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-02-01 09:27:31.841 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-02-01 09:27:31.841 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-02-01 09:27:31.842 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-02-01 09:27:31.843 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-02-01 09:27:31.843 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-02-01 09:27:31.852 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-02-01 09:27:31.855 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 350818260901981987145403816432123511694108518182
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Feb 01 05:17:54 UTC 2023
           Final Date: Mon Jan 31 05:17:53 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ef:9a:ec:49:88:38:b2:20:93:1e:35:2c:3a:40:4f:3e:33:54:b8:ce],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 370b82280b78bf4ecf1169d446138ba2d467d9ad
                       1e93b8b7c43e56fbe89066896bb62905d45c347b
                       b96427edaa75598f7f18838fe9dae0b184d5646b
                       aba39f48517d32b99da6a680ea47ee2fd5e3d3d5
                       f9de2ee01f101efb7e8a5de1e5834567b60c9f6b
                       a845e3b1e9fca147a5f6f334329dc7f3a8c0f3fd
                       3e915bdba1ef716d3e7a654e773ac267f51b95bd
                       d12bf8b2183af09c95357035b68f2ce8196c2ac6
                       ba684401555afcb9ea1007f492d02040ec7a8816
                       e732d3c8a22c7301e8cbaa84fdfa3116c1ee5c9f
                       4ed08b384aaab0fb2caaf14379ef2d4862458afd
                       4abf2a3407bc98ad55b073898d277035d49f2f61
                       a0987565e49db3c1366c12f315fce47fb921c042
                       b053c8eab52bff556f12a98d1eccf6efba80e1c0
                       808c900aab2c3393cd9efe875299309dd5cbeb4f
                       8677234b5754ccd43ec9b3883e4df356bb6f04be
                       527de10561498321e19134dc53163941b3b72e0a
                       d90c2d4121af8c0d0f54443a153c6808443808d6
                       56893d83289ebba077bc99bf64c8246edd2943a9
                       1495aba8
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [5c:2b:3b:ec:b1:79:b8:1b:e2:bd:0f:9e:98:ed:3b:e4:f1:42:ce:41],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-02-01 09:35:57.360  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-02-01 09:35:57.376 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-02-01 09:35:57.385 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2023-02-01 09:35:57.386 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-02-01 09:35:57.391  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2023-02-01 09:35:57.400  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-02-01 09:35:57.401  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-02-01 09:35:57.402 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-02-01 09:35:57.403 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-02-01 09:35:57.404 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-02-01 09:35:57.414 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-02-01 09:35:57.416 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-02-01 09:35:57.416 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-02-01 09:35:57.416 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-02-01 09:35:58.688  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-02-01 09:35:58.689  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-02-01 09:35:58.690 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-02-01 09:35:58.690 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-02-01 09:35:58.701  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-02-01 09:35:58.708  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-02-01 09:35:58.709 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-02-01 09:35:58.709 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-02-01 09:35:58.710 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-02-01 09:35:58.712 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-02-01 09:35:58.713 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-02-01 09:35:58.714 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-02-01 09:35:58.717 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-02-01 09:35:58.717 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-02-01 09:35:58.718 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-02-01 09:35:58.720 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-02-01 09:35:58.728 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 350818260901981987145403816432123511694108518182
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Feb 01 05:17:54 UTC 2023
           Final Date: Mon Jan 31 05:17:53 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ef:9a:ec:49:88:38:b2:20:93:1e:35:2c:3a:40:4f:3e:33:54:b8:ce],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 370b82280b78bf4ecf1169d446138ba2d467d9ad
                       1e93b8b7c43e56fbe89066896bb62905d45c347b
                       b96427edaa75598f7f18838fe9dae0b184d5646b
                       aba39f48517d32b99da6a680ea47ee2fd5e3d3d5
                       f9de2ee01f101efb7e8a5de1e5834567b60c9f6b
                       a845e3b1e9fca147a5f6f334329dc7f3a8c0f3fd
                       3e915bdba1ef716d3e7a654e773ac267f51b95bd
                       d12bf8b2183af09c95357035b68f2ce8196c2ac6
                       ba684401555afcb9ea1007f492d02040ec7a8816
                       e732d3c8a22c7301e8cbaa84fdfa3116c1ee5c9f
                       4ed08b384aaab0fb2caaf14379ef2d4862458afd
                       4abf2a3407bc98ad55b073898d277035d49f2f61
                       a0987565e49db3c1366c12f315fce47fb921c042
                       b053c8eab52bff556f12a98d1eccf6efba80e1c0
                       808c900aab2c3393cd9efe875299309dd5cbeb4f
                       8677234b5754ccd43ec9b3883e4df356bb6f04be
                       527de10561498321e19134dc53163941b3b72e0a
                       d90c2d4121af8c0d0f54443a153c6808443808d6
                       56893d83289ebba077bc99bf64c8246edd2943a9
                       1495aba8
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [c8:44:f8:20:ed:09:37:a6:fc:e5:2e:e6:5f:74:36:26:29:b7:df:9a],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-02-01 09:41:59.375  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-02-01 09:41:59.379 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-02-01 09:41:59.383 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2023-02-01 09:41:59.384 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-02-01 09:41:59.385  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2023-02-01 09:41:59.385  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-02-01 09:41:59.386  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-02-01 09:41:59.386 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-02-01 09:41:59.387 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-02-01 09:41:59.388 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-02-01 09:41:59.406 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-02-01 09:41:59.408 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-02-01 09:41:59.409 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-02-01 09:41:59.411 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-02-01 09:42:00.019  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-02-01 09:42:00.021  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-02-01 09:42:00.021 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-02-01 09:42:00.022 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-02-01 09:42:00.024  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-02-01 09:42:00.024  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-02-01 09:42:00.025 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-02-01 09:42:00.025 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-02-01 09:42:00.026 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-02-01 09:42:00.027 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-02-01 09:42:00.027 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-02-01 09:42:00.027 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-02-01 09:42:00.028 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-02-01 09:42:00.029 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-02-01 09:42:00.029 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-02-01 09:42:00.030 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-02-01 09:42:00.037 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 350818260901981987145403816432123511694108518182
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Feb 01 05:17:54 UTC 2023
           Final Date: Mon Jan 31 05:17:53 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ef:9a:ec:49:88:38:b2:20:93:1e:35:2c:3a:40:4f:3e:33:54:b8:ce],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 370b82280b78bf4ecf1169d446138ba2d467d9ad
                       1e93b8b7c43e56fbe89066896bb62905d45c347b
                       b96427edaa75598f7f18838fe9dae0b184d5646b
                       aba39f48517d32b99da6a680ea47ee2fd5e3d3d5
                       f9de2ee01f101efb7e8a5de1e5834567b60c9f6b
                       a845e3b1e9fca147a5f6f334329dc7f3a8c0f3fd
                       3e915bdba1ef716d3e7a654e773ac267f51b95bd
                       d12bf8b2183af09c95357035b68f2ce8196c2ac6
                       ba684401555afcb9ea1007f492d02040ec7a8816
                       e732d3c8a22c7301e8cbaa84fdfa3116c1ee5c9f
                       4ed08b384aaab0fb2caaf14379ef2d4862458afd
                       4abf2a3407bc98ad55b073898d277035d49f2f61
                       a0987565e49db3c1366c12f315fce47fb921c042
                       b053c8eab52bff556f12a98d1eccf6efba80e1c0
                       808c900aab2c3393cd9efe875299309dd5cbeb4f
                       8677234b5754ccd43ec9b3883e4df356bb6f04be
                       527de10561498321e19134dc53163941b3b72e0a
                       d90c2d4121af8c0d0f54443a153c6808443808d6
                       56893d83289ebba077bc99bf64c8246edd2943a9
                       1495aba8
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [36:c4:3d:f0:30:4c:ec:fd:f5:03:e7:db:c6:5f:73:17:d4:55:20:2f],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-02-01 09:42:34.097  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-02-01 09:42:34.099 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-02-01 09:42:34.100 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2023-02-01 09:42:34.101 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-02-01 09:42:34.102  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2023-02-01 09:42:34.102  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-02-01 09:42:34.103  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-02-01 09:42:34.103 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-02-01 09:42:34.104 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-02-01 09:42:34.104 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-02-01 09:42:34.109 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-02-01 09:42:34.109 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-02-01 09:42:34.109 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-02-01 09:42:34.110 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-02-01 09:42:35.173  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-02-01 09:42:35.188  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-02-01 09:42:35.196 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-02-01 09:42:35.197 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-02-01 09:42:35.198  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-02-01 09:42:35.199  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-02-01 09:42:35.200 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-02-01 09:42:35.201 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-02-01 09:42:35.201 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-02-01 09:42:35.202 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-02-01 09:42:35.202 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-02-01 09:42:35.202 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-02-01 09:42:35.203 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-02-01 09:42:35.204 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-02-01 09:42:35.204 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-02-01 09:42:35.205 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-02-01 09:42:35.213 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 350818260901981987145403816432123511694108518182
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Feb 01 05:17:54 UTC 2023
           Final Date: Mon Jan 31 05:17:53 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ef:9a:ec:49:88:38:b2:20:93:1e:35:2c:3a:40:4f:3e:33:54:b8:ce],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 370b82280b78bf4ecf1169d446138ba2d467d9ad
                       1e93b8b7c43e56fbe89066896bb62905d45c347b
                       b96427edaa75598f7f18838fe9dae0b184d5646b
                       aba39f48517d32b99da6a680ea47ee2fd5e3d3d5
                       f9de2ee01f101efb7e8a5de1e5834567b60c9f6b
                       a845e3b1e9fca147a5f6f334329dc7f3a8c0f3fd
                       3e915bdba1ef716d3e7a654e773ac267f51b95bd
                       d12bf8b2183af09c95357035b68f2ce8196c2ac6
                       ba684401555afcb9ea1007f492d02040ec7a8816
                       e732d3c8a22c7301e8cbaa84fdfa3116c1ee5c9f
                       4ed08b384aaab0fb2caaf14379ef2d4862458afd
                       4abf2a3407bc98ad55b073898d277035d49f2f61
                       a0987565e49db3c1366c12f315fce47fb921c042
                       b053c8eab52bff556f12a98d1eccf6efba80e1c0
                       808c900aab2c3393cd9efe875299309dd5cbeb4f
                       8677234b5754ccd43ec9b3883e4df356bb6f04be
                       527de10561498321e19134dc53163941b3b72e0a
                       d90c2d4121af8c0d0f54443a153c6808443808d6
                       56893d83289ebba077bc99bf64c8246edd2943a9
                       1495aba8
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [95:ed:41:d6:db:8a:e0:11:ae:17:fa:85:84:20:ac:f1:d3:41:10:d7],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-02-01 10:53:49.242  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-02-01 10:53:49.247 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-02-01 10:53:49.252 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2023-02-01 10:53:49.253 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-02-01 10:53:49.253  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2023-02-01 10:53:49.254  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-02-01 10:53:49.255  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-02-01 10:53:49.255 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-02-01 10:53:49.256 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-02-01 10:53:49.256 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-02-01 10:53:49.262 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-02-01 10:53:49.263 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-02-01 10:53:49.264 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-02-01 10:53:49.264 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-02-01 10:53:49.933  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-02-01 10:53:49.933  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-02-01 10:53:49.934 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-02-01 10:53:49.934 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-02-01 10:53:49.963  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-02-01 10:53:49.964  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-02-01 10:53:49.964 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-02-01 10:53:49.964 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-02-01 10:53:49.965 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-02-01 10:53:49.966 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-02-01 10:53:49.966 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-02-01 10:53:49.967 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-02-01 10:53:49.968 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-02-01 10:53:49.968 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-02-01 10:53:49.969 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-02-01 10:53:49.969 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-02-01 10:53:49.974 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 350818260901981987145403816432123511694108518182
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Feb 01 05:17:54 UTC 2023
           Final Date: Mon Jan 31 05:17:53 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ef:9a:ec:49:88:38:b2:20:93:1e:35:2c:3a:40:4f:3e:33:54:b8:ce],[56:66:d1:a4]
        modulus: c548e1d956b3100c231196ce98059162cba5b492ec02e56cfda24d51fcfbfbe86c61cb4a800d58d06f90e5cf9bad5c5e672a985442022f8a97d91b77df76d6045904a0dfa5bb35e400c759b989e4c908546e3c54db94b2b9a9a45b3878d74877d62db1b60fafbf4b3066c8979a203081e9f17a276fff4c24ddcc196c613888633f6a86cb9a0b202bf0f761997baf93ab3ca6f32353e31690165abc02781483c6c87eede6fabab6a667095f97654b56b2cb6d8ac531e7753be7d33be6493f03691877a67e6b9c3faa97526da8db53992eabb8ee58c99196f6d460f7e5b4e5e09be2ce598132fc04f0a392365844dc1bd46129e7bc1d58d674d8acbfb5e57f0d2a1250b6682f7fd77b4124b1c2d6ebcc35f97c11f3c68724c5cf2970998b33917598615fdf3e50ddbb07f6c6641df6e46165b9f0232c2bf037a24a94d888645b08f0c772c548c62383faac3d59550ecc299665c62e07addbda55f6e8919a0bd38bc2430f9ed8562ea80d4be8e347085b4f23d86a89aee1f418a7b5ee70c3fbb171
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 370b82280b78bf4ecf1169d446138ba2d467d9ad
                       1e93b8b7c43e56fbe89066896bb62905d45c347b
                       b96427edaa75598f7f18838fe9dae0b184d5646b
                       aba39f48517d32b99da6a680ea47ee2fd5e3d3d5
                       f9de2ee01f101efb7e8a5de1e5834567b60c9f6b
                       a845e3b1e9fca147a5f6f334329dc7f3a8c0f3fd
                       3e915bdba1ef716d3e7a654e773ac267f51b95bd
                       d12bf8b2183af09c95357035b68f2ce8196c2ac6
                       ba684401555afcb9ea1007f492d02040ec7a8816
                       e732d3c8a22c7301e8cbaa84fdfa3116c1ee5c9f
                       4ed08b384aaab0fb2caaf14379ef2d4862458afd
                       4abf2a3407bc98ad55b073898d277035d49f2f61
                       a0987565e49db3c1366c12f315fce47fb921c042
                       b053c8eab52bff556f12a98d1eccf6efba80e1c0
                       808c900aab2c3393cd9efe875299309dd5cbeb4f
                       8677234b5754ccd43ec9b3883e4df356bb6f04be
                       527de10561498321e19134dc53163941b3b72e0a
                       d90c2d4121af8c0d0f54443a153c6808443808d6
                       56893d83289ebba077bc99bf64c8246edd2943a9
                       1495aba8
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [6c:44:62:78:58:b8:b2:84:f7:29:86:69:aa:d9:e6:5a:84:1c:98:6c],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-02-01 10:54:00.740  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-02-01 10:54:00.741 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-02-01 10:54:00.742 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2023-02-01 10:54:00.743 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-02-01 10:54:00.743  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2023-02-01 10:54:00.743  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-02-01 10:54:00.744  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-02-01 10:54:00.744 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-02-01 10:54:00.744 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-02-01 10:54:00.745 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-02-01 10:54:00.749 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-02-01 10:54:00.749 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-02-01 10:54:00.750 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-02-01 10:54:00.750 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-02-01 10:54:01.241  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-02-01 10:54:01.241  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-02-01 10:54:01.242 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-02-01 10:54:01.242 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-02-01 10:54:01.243  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-02-01 10:54:01.243  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-02-01 10:54:01.244 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-02-01 10:54:01.244 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-02-01 10:54:01.244 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-02-01 10:54:01.245 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-02-01 10:54:01.245 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-02-01 10:54:01.245 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-02-01 10:54:01.245 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-02-01 10:54:01.246 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-02-01 10:54:01.246 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-02-01 10:54:01.248 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-02-01 10:54:01.255 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 350818260901981987145403816432123511694108518182
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Feb 01 05:17:54 UTC 2023
           Final Date: Mon Jan 31 05:17:53 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ef:9a:ec:49:88:38:b2:20:93:1e:35:2c:3a:40:4f:3e:33:54:b8:ce],[56:66:d1:a4]
        modulus: c548e1d956b3100c231196ce98059162cba5b492ec02e56cfda24d51fcfbfbe86c61cb4a800d58d06f90e5cf9bad5c5e672a985442022f8a97d91b77df76d6045904a0dfa5bb35e400c759b989e4c908546e3c54db94b2b9a9a45b3878d74877d62db1b60fafbf4b3066c8979a203081e9f17a276fff4c24ddcc196c613888633f6a86cb9a0b202bf0f761997baf93ab3ca6f32353e31690165abc02781483c6c87eede6fabab6a667095f97654b56b2cb6d8ac531e7753be7d33be6493f03691877a67e6b9c3faa97526da8db53992eabb8ee58c99196f6d460f7e5b4e5e09be2ce598132fc04f0a392365844dc1bd46129e7bc1d58d674d8acbfb5e57f0d2a1250b6682f7fd77b4124b1c2d6ebcc35f97c11f3c68724c5cf2970998b33917598615fdf3e50ddbb07f6c6641df6e46165b9f0232c2bf037a24a94d888645b08f0c772c548c62383faac3d59550ecc299665c62e07addbda55f6e8919a0bd38bc2430f9ed8562ea80d4be8e347085b4f23d86a89aee1f418a7b5ee70c3fbb171
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 370b82280b78bf4ecf1169d446138ba2d467d9ad
                       1e93b8b7c43e56fbe89066896bb62905d45c347b
                       b96427edaa75598f7f18838fe9dae0b184d5646b
                       aba39f48517d32b99da6a680ea47ee2fd5e3d3d5
                       f9de2ee01f101efb7e8a5de1e5834567b60c9f6b
                       a845e3b1e9fca147a5f6f334329dc7f3a8c0f3fd
                       3e915bdba1ef716d3e7a654e773ac267f51b95bd
                       d12bf8b2183af09c95357035b68f2ce8196c2ac6
                       ba684401555afcb9ea1007f492d02040ec7a8816
                       e732d3c8a22c7301e8cbaa84fdfa3116c1ee5c9f
                       4ed08b384aaab0fb2caaf14379ef2d4862458afd
                       4abf2a3407bc98ad55b073898d277035d49f2f61
                       a0987565e49db3c1366c12f315fce47fb921c042
                       b053c8eab52bff556f12a98d1eccf6efba80e1c0
                       808c900aab2c3393cd9efe875299309dd5cbeb4f
                       8677234b5754ccd43ec9b3883e4df356bb6f04be
                       527de10561498321e19134dc53163941b3b72e0a
                       d90c2d4121af8c0d0f54443a153c6808443808d6
                       56893d83289ebba077bc99bf64c8246edd2943a9
                       1495aba8
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [5e:5b:d4:54:2c:7c:37:c6:2f:ad:66:99:9f:7f:9f:ca:9d:1a:ad:9a],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-02-01 12:12:40.201  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-02-01 12:12:40.205 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-02-01 12:12:40.209 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2023-02-01 12:12:40.211 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-02-01 12:12:40.212  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2023-02-01 12:12:40.213  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-02-01 12:12:40.213  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-02-01 12:12:40.214 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-02-01 12:12:40.214 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-02-01 12:12:40.215 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-02-01 12:12:40.222 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-02-01 12:12:40.223 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-02-01 12:12:40.225 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-02-01 12:12:40.225 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-02-01 12:12:41.680  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-02-01 12:12:41.681  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-02-01 12:12:41.681 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-02-01 12:12:41.682 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-02-01 12:12:41.683  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-02-01 12:12:41.683  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-02-01 12:12:41.685 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-02-01 12:12:41.685 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-02-01 12:12:41.685 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-02-01 12:12:41.686 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-02-01 12:12:41.687 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-02-01 12:12:41.687 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-02-01 12:12:41.688 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-02-01 12:12:41.690 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-02-01 12:12:41.691 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-02-01 12:12:41.692 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-02-01 12:12:41.696 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 350818260901981987145403816432123511694108518182
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Feb 01 05:17:54 UTC 2023
           Final Date: Mon Jan 31 05:17:53 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ef:9a:ec:49:88:38:b2:20:93:1e:35:2c:3a:40:4f:3e:33:54:b8:ce],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 370b82280b78bf4ecf1169d446138ba2d467d9ad
                       1e93b8b7c43e56fbe89066896bb62905d45c347b
                       b96427edaa75598f7f18838fe9dae0b184d5646b
                       aba39f48517d32b99da6a680ea47ee2fd5e3d3d5
                       f9de2ee01f101efb7e8a5de1e5834567b60c9f6b
                       a845e3b1e9fca147a5f6f334329dc7f3a8c0f3fd
                       3e915bdba1ef716d3e7a654e773ac267f51b95bd
                       d12bf8b2183af09c95357035b68f2ce8196c2ac6
                       ba684401555afcb9ea1007f492d02040ec7a8816
                       e732d3c8a22c7301e8cbaa84fdfa3116c1ee5c9f
                       4ed08b384aaab0fb2caaf14379ef2d4862458afd
                       4abf2a3407bc98ad55b073898d277035d49f2f61
                       a0987565e49db3c1366c12f315fce47fb921c042
                       b053c8eab52bff556f12a98d1eccf6efba80e1c0
                       808c900aab2c3393cd9efe875299309dd5cbeb4f
                       8677234b5754ccd43ec9b3883e4df356bb6f04be
                       527de10561498321e19134dc53163941b3b72e0a
                       d90c2d4121af8c0d0f54443a153c6808443808d6
                       56893d83289ebba077bc99bf64c8246edd2943a9
                       1495aba8
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [db:4c:13:f0:7b:0d:e9:d6:76:f9:b5:3d:f5:b6:1b:7f:90:1a:e5:e2],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-02-01 12:12:51.468  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-02-01 12:12:51.469 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-02-01 12:12:51.472 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2023-02-01 12:12:51.473 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-02-01 12:12:51.474  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2023-02-01 12:12:51.475  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-02-01 12:12:51.475  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-02-01 12:12:51.476 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-02-01 12:12:51.477 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-02-01 12:12:51.477 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-02-01 12:12:51.482 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-02-01 12:12:51.483 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-02-01 12:12:51.484 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-02-01 12:12:51.485 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-02-01 12:12:51.967  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-02-01 12:12:51.968  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-02-01 12:12:51.968 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-02-01 12:12:51.969 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-02-01 12:12:51.970  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-02-01 12:12:51.970  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-02-01 12:12:51.971 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-02-01 12:12:51.971 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-02-01 12:12:51.972 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-02-01 12:12:51.973 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-02-01 12:12:51.974 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-02-01 12:12:51.974 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-02-01 12:12:51.975 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-02-01 12:12:51.975 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-02-01 12:12:51.975 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-02-01 12:12:51.976 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-02-01 12:12:51.980 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 350818260901981987145403816432123511694108518182
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Feb 01 05:17:54 UTC 2023
           Final Date: Mon Jan 31 05:17:53 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ef:9a:ec:49:88:38:b2:20:93:1e:35:2c:3a:40:4f:3e:33:54:b8:ce],[56:66:d1:a4]
        modulus: c548e1d956b3100c231196ce98059162cba5b492ec02e56cfda24d51fcfbfbe86c61cb4a800d58d06f90e5cf9bad5c5e672a985442022f8a97d91b77df76d6045904a0dfa5bb35e400c759b989e4c908546e3c54db94b2b9a9a45b3878d74877d62db1b60fafbf4b3066c8979a203081e9f17a276fff4c24ddcc196c613888633f6a86cb9a0b202bf0f761997baf93ab3ca6f32353e31690165abc02781483c6c87eede6fabab6a667095f97654b56b2cb6d8ac531e7753be7d33be6493f03691877a67e6b9c3faa97526da8db53992eabb8ee58c99196f6d460f7e5b4e5e09be2ce598132fc04f0a392365844dc1bd46129e7bc1d58d674d8acbfb5e57f0d2a1250b6682f7fd77b4124b1c2d6ebcc35f97c11f3c68724c5cf2970998b33917598615fdf3e50ddbb07f6c6641df6e46165b9f0232c2bf037a24a94d888645b08f0c772c548c62383faac3d59550ecc299665c62e07addbda55f6e8919a0bd38bc2430f9ed8562ea80d4be8e347085b4f23d86a89aee1f418a7b5ee70c3fbb171
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 370b82280b78bf4ecf1169d446138ba2d467d9ad
                       1e93b8b7c43e56fbe89066896bb62905d45c347b
                       b96427edaa75598f7f18838fe9dae0b184d5646b
                       aba39f48517d32b99da6a680ea47ee2fd5e3d3d5
                       f9de2ee01f101efb7e8a5de1e5834567b60c9f6b
                       a845e3b1e9fca147a5f6f334329dc7f3a8c0f3fd
                       3e915bdba1ef716d3e7a654e773ac267f51b95bd
                       d12bf8b2183af09c95357035b68f2ce8196c2ac6
                       ba684401555afcb9ea1007f492d02040ec7a8816
                       e732d3c8a22c7301e8cbaa84fdfa3116c1ee5c9f
                       4ed08b384aaab0fb2caaf14379ef2d4862458afd
                       4abf2a3407bc98ad55b073898d277035d49f2f61
                       a0987565e49db3c1366c12f315fce47fb921c042
                       b053c8eab52bff556f12a98d1eccf6efba80e1c0
                       808c900aab2c3393cd9efe875299309dd5cbeb4f
                       8677234b5754ccd43ec9b3883e4df356bb6f04be
                       527de10561498321e19134dc53163941b3b72e0a
                       d90c2d4121af8c0d0f54443a153c6808443808d6
                       56893d83289ebba077bc99bf64c8246edd2943a9
                       1495aba8
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [98:14:e1:fe:c0:80:a8:86:a8:a6:58:30:7b:76:49:12:de:de:b7:85],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

]