Results

By type

          2022-04-10 01:39:46,887 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-04-10 01:39:51,404 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-04-10 01:39:54.485  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Apr 10, 2022 1:40:04 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Apr 10, 2022 1:40:04 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Apr 10, 2022 1:40:04 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Apr 10, 2022 1:40:04 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-04-10 01:40:06.704 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-04-10 01:40:08.086  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-04-10 01:40:08.784  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-04-10 01:40:11.706 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-04-10 01:40:11.785 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
2022-04-10 01:40:11.787 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-04-10 01:40:11.794 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-04-10 01:40:11.989 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2022-04-10 01:40:11.994 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
	{GET [/docs]}: redirectToUi(HttpServletRequest)
2022-04-10 01:40:12.593 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-04-10 01:40:17.397 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Apr 10, 2022 1:40:20 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-04-10 01:40:21.809  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 38.7 seconds (JVM running for 46.399)
Apr 10, 2022 1:40:28 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-04-10 01:41:12.401  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-10 01:41:12.489 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-10 01:41:12.604 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-04-10 01:41:12.606 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-10 01:41:12.786  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-04-10 01:41:12.789  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-10 01:41:12.790  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-10 01:41:12.791 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-10 01:41:12.792 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-10 01:41:12.796 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-10 01:41:12.802 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-10 01:41:12.804 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-10 01:41:12.997 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-10 01:41:13.001 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-10 01:41:13.001 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-10 01:41:13.083 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-10 01:41:14.292  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-10 01:41:14.296  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-10 01:41:14.296 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-10 01:41:14.298 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-10 01:41:14.391  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-10 01:41:14.392  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-10 01:41:14.392 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-10 01:41:14.393 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-10 01:41:14.393 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-10 01:41:14.402 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-10 01:41:14.402 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-10 01:41:14.403 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-10 01:41:14.407 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-10 01:41:14.407 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-10 01:41:14.407 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-10 01:41:14.484 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-10 01:41:14.591 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 233655193531165248000344744005619972282849193069
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Apr 10 01:36:32 UTC 2022
           Final Date: Fri Apr 09 01:36:31 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [03:98:bd:bc:95:a8:f3:eb:38:c8:bd:04:d5:fb:22:4c:c1:6e:bc:e4]
            modulus: 96e5d1f21d22aa2803e8ebdd22951f41d2307e086a703db89dec4249242184701b0ea52687d2225fc2bd4a6eb49660e751fcee8976d2b26bcd2f1b57db4447f5e508c64fb53b008d05b2ad4fe3a4f55803d78bb37975907755bd501228c5a758d11aad42a62d3441aa6240c50fc284b039852767a398ab78034415734ce5fc4082e44c5b84c8a95d295f17a231a63f6fdc94b2629d85a4af68b9bd9150a98b9b89c1e1894a748de83f9218f2225b18d4e9b2e9580019b7884be9c7881435b21d7446470654fe510b9754d1cce73a29f77fecfb5cd7d9312b65610c26573a91f6ac89d9c99263041f5788fcebfb97813c05362a5ff13cd078f1fd60e276436ffb17a049dbdab5d3a30257e3b2944812fd4f61efab480f8eb05b893ea6caa807de40abffebc6729a4109fa86a02e8676a55baf8c791a07050299736b2662388add0357412eb6dbce2cbb1aadd25684dd7525122aba9e4b3e08d039cf9febf4f212dfaada8d7d5b0e3cc95625b6b7382e706575c457cbb1d7aa26e170d2bebe0df3
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 9665f5bf3c4a39ffa164187f92702c6030418ed5
                       e37396dd0754081734ad7a934e0ea571c5b47ba0
                       6bdd6184f1ed27a6c40cb21e189f3238adebe591
                       160db623c83b7da807b6f529230788faac7b0fe8
                       35f6aec6fd207eb976ec621b17326b06c7540e83
                       2b15ee6c7e9a31252c9a0f2d06d6aa12650e06c9
                       297902d8f18f141d9d12c9403519f07b441cb148
                       eb87c659c72d8382ae59f29ded1cf067e7f20e3a
                       0d948f09fb44ced8d9cb790a4d94e1993eb55eff
                       4f48158a803f9d212a784404abcc7fac4b922871
                       3bd22b503ed3aee668097b5c3dc6f8eaccb58455
                       6726ba3ce5fc01813b59a845bbd65bd5eb5c52be
                       9981dc4fa26bd602ec75348696a15fa9da08bd5a
                       3e12e5f2edb2a2e62c0d16767958974b5027327e
                       d8a5604bd9cf3db38b5096a5f3e3ba924767b655
                       649b3b14b98b0f81aba254f7d7e3f84063ea3710
                       39e016d1252e19691d5395854d4dfec1e36c56d5
                       2b701544e6525710850b4a79c0dad11d483c7d63
                       91a2f411e011892d634ead8a91a365250d759ae8
                       375a2a16
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [0d:23:6e:6f:8b:82:7d:a2:46:73:35:fa:09:ea:91:a0:58:2a:07:4e]
            modulus: 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
    public exponent: 10001

] 
2022-04-10 03:26:55.805  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-10 03:26:55.806 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-10 03:26:55.808 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-10 03:26:55.808 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-10 03:26:55.810  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-10 03:26:55.810  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-10 03:26:55.811  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-10 03:26:55.811 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-10 03:26:55.811 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-10 03:26:55.812 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-10 03:26:55.819 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-10 03:26:55.884 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-10 03:26:55.885 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-10 03:26:55.886 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-10 03:26:56.093  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-10 03:26:56.094  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-10 03:26:56.094 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-10 03:26:56.095 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-10 03:26:56.100  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-10 03:26:56.100  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-10 03:26:56.101 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-10 03:26:56.101 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-10 03:26:56.101 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-10 03:26:56.103 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-10 03:26:56.103 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-10 03:26:56.103 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-10 03:26:56.104 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-10 03:26:56.104 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-10 03:26:56.104 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-10 03:26:56.106 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-10 03:26:56.186 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 233655193531165248000344744005619972282849193069
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Apr 10 01:36:32 UTC 2022
           Final Date: Fri Apr 09 01:36:31 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [03:98:bd:bc:95:a8:f3:eb:38:c8:bd:04:d5:fb:22:4c:c1:6e:bc:e4]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 9665f5bf3c4a39ffa164187f92702c6030418ed5
                       e37396dd0754081734ad7a934e0ea571c5b47ba0
                       6bdd6184f1ed27a6c40cb21e189f3238adebe591
                       160db623c83b7da807b6f529230788faac7b0fe8
                       35f6aec6fd207eb976ec621b17326b06c7540e83
                       2b15ee6c7e9a31252c9a0f2d06d6aa12650e06c9
                       297902d8f18f141d9d12c9403519f07b441cb148
                       eb87c659c72d8382ae59f29ded1cf067e7f20e3a
                       0d948f09fb44ced8d9cb790a4d94e1993eb55eff
                       4f48158a803f9d212a784404abcc7fac4b922871
                       3bd22b503ed3aee668097b5c3dc6f8eaccb58455
                       6726ba3ce5fc01813b59a845bbd65bd5eb5c52be
                       9981dc4fa26bd602ec75348696a15fa9da08bd5a
                       3e12e5f2edb2a2e62c0d16767958974b5027327e
                       d8a5604bd9cf3db38b5096a5f3e3ba924767b655
                       649b3b14b98b0f81aba254f7d7e3f84063ea3710
                       39e016d1252e19691d5395854d4dfec1e36c56d5
                       2b701544e6525710850b4a79c0dad11d483c7d63
                       91a2f411e011892d634ead8a91a365250d759ae8
                       375a2a16
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [53:3e:f4:29:38:e8:87:8d:e4:fa:36:aa:2b:e2:1f:c5:a3:00:7d:58]
            modulus: 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
    public exponent: 10001

] 
2022-04-10 03:30:22.631  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-10 03:30:22.632 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-10 03:30:22.634 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-10 03:30:22.635 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-10 03:30:22.636  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-10 03:30:22.637  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-10 03:30:22.638  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-10 03:30:22.638 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-10 03:30:22.639 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-10 03:30:22.639 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-10 03:30:22.647 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-10 03:30:22.648 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-10 03:30:22.648 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-10 03:30:22.648 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-10 03:30:22.758  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-10 03:30:22.759  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-10 03:30:22.783 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-10 03:30:22.784 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-10 03:30:22.787  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-10 03:30:22.787  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-10 03:30:22.788 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-10 03:30:22.788 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-10 03:30:22.789 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-10 03:30:22.789 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-10 03:30:22.790 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-10 03:30:22.790 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-10 03:30:22.791 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-10 03:30:22.793 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-10 03:30:22.793 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-10 03:30:22.795 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-10 03:30:22.798 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 233655193531165248000344744005619972282849193069
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Apr 10 01:36:32 UTC 2022
           Final Date: Fri Apr 09 01:36:31 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [03:98:bd:bc:95:a8:f3:eb:38:c8:bd:04:d5:fb:22:4c:c1:6e:bc:e4]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 9665f5bf3c4a39ffa164187f92702c6030418ed5
                       e37396dd0754081734ad7a934e0ea571c5b47ba0
                       6bdd6184f1ed27a6c40cb21e189f3238adebe591
                       160db623c83b7da807b6f529230788faac7b0fe8
                       35f6aec6fd207eb976ec621b17326b06c7540e83
                       2b15ee6c7e9a31252c9a0f2d06d6aa12650e06c9
                       297902d8f18f141d9d12c9403519f07b441cb148
                       eb87c659c72d8382ae59f29ded1cf067e7f20e3a
                       0d948f09fb44ced8d9cb790a4d94e1993eb55eff
                       4f48158a803f9d212a784404abcc7fac4b922871
                       3bd22b503ed3aee668097b5c3dc6f8eaccb58455
                       6726ba3ce5fc01813b59a845bbd65bd5eb5c52be
                       9981dc4fa26bd602ec75348696a15fa9da08bd5a
                       3e12e5f2edb2a2e62c0d16767958974b5027327e
                       d8a5604bd9cf3db38b5096a5f3e3ba924767b655
                       649b3b14b98b0f81aba254f7d7e3f84063ea3710
                       39e016d1252e19691d5395854d4dfec1e36c56d5
                       2b701544e6525710850b4a79c0dad11d483c7d63
                       91a2f411e011892d634ead8a91a365250d759ae8
                       375a2a16
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [58:d7:a7:ea:6a:d7:cd:76:19:f5:16:af:6c:3a:a6:af:e0:8f:c3:3e]
            modulus: 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
    public exponent: 10001

] 
2022-04-10 03:31:46.499  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-10 03:31:46.501 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-10 03:31:46.503 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-04-10 03:31:46.504 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-10 03:31:46.505  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-04-10 03:31:46.506  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-10 03:31:46.506  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-10 03:31:46.507 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-10 03:31:46.507 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-10 03:31:46.508 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-10 03:31:46.512 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-10 03:31:46.512 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-10 03:31:46.512 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-10 03:31:46.512 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-10 03:31:46.674  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-10 03:31:46.674  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-10 03:31:46.675 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-10 03:31:46.675 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-10 03:31:46.685  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-10 03:31:46.686  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-10 03:31:46.686 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-10 03:31:46.687 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-10 03:31:46.687 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-10 03:31:46.688 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-10 03:31:46.688 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-10 03:31:46.689 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-10 03:31:46.690 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-10 03:31:46.690 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-10 03:31:46.690 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-10 03:31:46.691 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-10 03:31:46.694 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 233655193531165248000344744005619972282849193069
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Apr 10 01:36:32 UTC 2022
           Final Date: Fri Apr 09 01:36:31 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [03:98:bd:bc:95:a8:f3:eb:38:c8:bd:04:d5:fb:22:4c:c1:6e:bc:e4]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 9665f5bf3c4a39ffa164187f92702c6030418ed5
                       e37396dd0754081734ad7a934e0ea571c5b47ba0
                       6bdd6184f1ed27a6c40cb21e189f3238adebe591
                       160db623c83b7da807b6f529230788faac7b0fe8
                       35f6aec6fd207eb976ec621b17326b06c7540e83
                       2b15ee6c7e9a31252c9a0f2d06d6aa12650e06c9
                       297902d8f18f141d9d12c9403519f07b441cb148
                       eb87c659c72d8382ae59f29ded1cf067e7f20e3a
                       0d948f09fb44ced8d9cb790a4d94e1993eb55eff
                       4f48158a803f9d212a784404abcc7fac4b922871
                       3bd22b503ed3aee668097b5c3dc6f8eaccb58455
                       6726ba3ce5fc01813b59a845bbd65bd5eb5c52be
                       9981dc4fa26bd602ec75348696a15fa9da08bd5a
                       3e12e5f2edb2a2e62c0d16767958974b5027327e
                       d8a5604bd9cf3db38b5096a5f3e3ba924767b655
                       649b3b14b98b0f81aba254f7d7e3f84063ea3710
                       39e016d1252e19691d5395854d4dfec1e36c56d5
                       2b701544e6525710850b4a79c0dad11d483c7d63
                       91a2f411e011892d634ead8a91a365250d759ae8
                       375a2a16
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [6c:a2:d7:ee:9a:b8:52:55:0a:33:36:2b:00:0e:aa:ff:bd:77:20:93]
            modulus: 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
    public exponent: 10001

] 
2022-04-10 03:35:15.765  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-10 03:35:15.766 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-10 03:35:15.767 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-10 03:35:15.767 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-10 03:35:15.767  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-10 03:35:15.768  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-10 03:35:15.768  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-10 03:35:15.768 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-10 03:35:15.768 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-10 03:35:15.769 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-10 03:35:15.774 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-10 03:35:15.774 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-10 03:35:15.774 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-10 03:35:15.774 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-10 03:35:15.864  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-10 03:35:15.865  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-10 03:35:15.865 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-10 03:35:15.865 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-10 03:35:15.866  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-10 03:35:15.883  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-10 03:35:15.884 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-10 03:35:15.884 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-10 03:35:15.885 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-10 03:35:15.885 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-10 03:35:15.886 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-10 03:35:15.886 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-10 03:35:15.887 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-10 03:35:15.887 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-10 03:35:15.888 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-10 03:35:15.889 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-10 03:35:15.893 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 233655193531165248000344744005619972282849193069
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Apr 10 01:36:32 UTC 2022
           Final Date: Fri Apr 09 01:36:31 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [03:98:bd:bc:95:a8:f3:eb:38:c8:bd:04:d5:fb:22:4c:c1:6e:bc:e4]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 9665f5bf3c4a39ffa164187f92702c6030418ed5
                       e37396dd0754081734ad7a934e0ea571c5b47ba0
                       6bdd6184f1ed27a6c40cb21e189f3238adebe591
                       160db623c83b7da807b6f529230788faac7b0fe8
                       35f6aec6fd207eb976ec621b17326b06c7540e83
                       2b15ee6c7e9a31252c9a0f2d06d6aa12650e06c9
                       297902d8f18f141d9d12c9403519f07b441cb148
                       eb87c659c72d8382ae59f29ded1cf067e7f20e3a
                       0d948f09fb44ced8d9cb790a4d94e1993eb55eff
                       4f48158a803f9d212a784404abcc7fac4b922871
                       3bd22b503ed3aee668097b5c3dc6f8eaccb58455
                       6726ba3ce5fc01813b59a845bbd65bd5eb5c52be
                       9981dc4fa26bd602ec75348696a15fa9da08bd5a
                       3e12e5f2edb2a2e62c0d16767958974b5027327e
                       d8a5604bd9cf3db38b5096a5f3e3ba924767b655
                       649b3b14b98b0f81aba254f7d7e3f84063ea3710
                       39e016d1252e19691d5395854d4dfec1e36c56d5
                       2b701544e6525710850b4a79c0dad11d483c7d63
                       91a2f411e011892d634ead8a91a365250d759ae8
                       375a2a16
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [75:7e:e3:15:88:12:cc:d7:ad:cc:df:45:33:c8:e1:a7:07:51:36:92]
            modulus: bedba318a0f8d966dd34b55bc4dca775f72bf19b4c0685e6bd377be4a1c6ac256a8e6f4088be52f8e2e3c09d8e7f2289cb65dffa76d1653d281792838c29444056c5e71102854d0555ea9a15ed92e6dfc9e42ae852fffcff31d51977c17914ae2996dfb976f50d7e061734a25f6378061a9e705d606f5e3e666cdca768ffa2a13139472da06b9badc168255265ea84920c9eba597bd148bebbbf4d3c8c9b2840027026899453f929eabd9dd72669c592c34840f93cf4f9fc66afd84a793f2723550bfd5a89462d8cdc60721505846cc2d6fd6494ec6772ef3b596d1d345a52aec502b070209d0efa264ced838d7217ec418521098f45161ecab1624ab8a96019
    public exponent: 10001

] 
2022-04-10 03:38:34.025  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-10 03:38:34.027 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-10 03:38:34.029 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-04-10 03:38:34.030 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-10 03:38:34.031  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-04-10 03:38:34.032  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-10 03:38:34.032  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-10 03:38:34.033 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-10 03:38:34.034 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-10 03:38:34.035 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-10 03:38:34.039 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-10 03:38:34.039 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-10 03:38:34.039 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-10 03:38:34.040 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-10 03:38:34.158  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-10 03:38:34.183  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-10 03:38:34.184 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-10 03:38:34.184 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-10 03:38:34.186  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-10 03:38:34.186  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-10 03:38:34.187 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-10 03:38:34.187 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-10 03:38:34.188 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-10 03:38:34.188 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-10 03:38:34.189 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-10 03:38:34.189 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-10 03:38:34.190 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-10 03:38:34.191 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-10 03:38:34.191 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-10 03:38:34.193 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-10 03:38:34.198 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 233655193531165248000344744005619972282849193069
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Apr 10 01:36:32 UTC 2022
           Final Date: Fri Apr 09 01:36:31 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [03:98:bd:bc:95:a8:f3:eb:38:c8:bd:04:d5:fb:22:4c:c1:6e:bc:e4]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 9665f5bf3c4a39ffa164187f92702c6030418ed5
                       e37396dd0754081734ad7a934e0ea571c5b47ba0
                       6bdd6184f1ed27a6c40cb21e189f3238adebe591
                       160db623c83b7da807b6f529230788faac7b0fe8
                       35f6aec6fd207eb976ec621b17326b06c7540e83
                       2b15ee6c7e9a31252c9a0f2d06d6aa12650e06c9
                       297902d8f18f141d9d12c9403519f07b441cb148
                       eb87c659c72d8382ae59f29ded1cf067e7f20e3a
                       0d948f09fb44ced8d9cb790a4d94e1993eb55eff
                       4f48158a803f9d212a784404abcc7fac4b922871
                       3bd22b503ed3aee668097b5c3dc6f8eaccb58455
                       6726ba3ce5fc01813b59a845bbd65bd5eb5c52be
                       9981dc4fa26bd602ec75348696a15fa9da08bd5a
                       3e12e5f2edb2a2e62c0d16767958974b5027327e
                       d8a5604bd9cf3db38b5096a5f3e3ba924767b655
                       649b3b14b98b0f81aba254f7d7e3f84063ea3710
                       39e016d1252e19691d5395854d4dfec1e36c56d5
                       2b701544e6525710850b4a79c0dad11d483c7d63
                       91a2f411e011892d634ead8a91a365250d759ae8
                       375a2a16
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [11:59:32:96:a8:5c:da:e2:48:b5:06:ea:7f:df:07:0f:9a:88:0f:bc]
            modulus: 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
    public exponent: 10001

] 
2022-04-10 03:40:50.184  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-10 03:40:50.186 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-10 03:40:50.187 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-04-10 03:40:50.188 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-10 03:40:50.189  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-04-10 03:40:50.192  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-10 03:40:50.194  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-10 03:40:50.196 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-10 03:40:50.196 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-10 03:40:50.197 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-10 03:40:50.201 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-10 03:40:50.201 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-10 03:40:50.202 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-10 03:40:50.202 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-10 03:40:50.288  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-10 03:40:50.289  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-10 03:40:50.289 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-10 03:40:50.290 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-10 03:40:50.293  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-10 03:40:50.294  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-10 03:40:50.294 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-10 03:40:50.295 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-10 03:40:50.295 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-10 03:40:50.296 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-10 03:40:50.297 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-10 03:40:50.297 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-10 03:40:50.298 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-10 03:40:50.299 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-10 03:40:50.299 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-10 03:40:50.300 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-10 03:40:50.304 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 233655193531165248000344744005619972282849193069
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Apr 10 01:36:32 UTC 2022
           Final Date: Fri Apr 09 01:36:31 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [03:98:bd:bc:95:a8:f3:eb:38:c8:bd:04:d5:fb:22:4c:c1:6e:bc:e4]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 9665f5bf3c4a39ffa164187f92702c6030418ed5
                       e37396dd0754081734ad7a934e0ea571c5b47ba0
                       6bdd6184f1ed27a6c40cb21e189f3238adebe591
                       160db623c83b7da807b6f529230788faac7b0fe8
                       35f6aec6fd207eb976ec621b17326b06c7540e83
                       2b15ee6c7e9a31252c9a0f2d06d6aa12650e06c9
                       297902d8f18f141d9d12c9403519f07b441cb148
                       eb87c659c72d8382ae59f29ded1cf067e7f20e3a
                       0d948f09fb44ced8d9cb790a4d94e1993eb55eff
                       4f48158a803f9d212a784404abcc7fac4b922871
                       3bd22b503ed3aee668097b5c3dc6f8eaccb58455
                       6726ba3ce5fc01813b59a845bbd65bd5eb5c52be
                       9981dc4fa26bd602ec75348696a15fa9da08bd5a
                       3e12e5f2edb2a2e62c0d16767958974b5027327e
                       d8a5604bd9cf3db38b5096a5f3e3ba924767b655
                       649b3b14b98b0f81aba254f7d7e3f84063ea3710
                       39e016d1252e19691d5395854d4dfec1e36c56d5
                       2b701544e6525710850b4a79c0dad11d483c7d63
                       91a2f411e011892d634ead8a91a365250d759ae8
                       375a2a16
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [56:e5:89:26:bf:f2:b4:49:39:09:7f:b6:da:39:56:40:ee:cb:26:f1]
            modulus: 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
    public exponent: 10001

] 
2022-04-10 03:41:38.151  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-10 03:41:38.153 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-10 03:41:38.155 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-10 03:41:38.155 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-10 03:41:38.156  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-10 03:41:38.156  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-10 03:41:38.156  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-10 03:41:38.157 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-10 03:41:38.157 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-10 03:41:38.157 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-10 03:41:38.161 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-10 03:41:38.161 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-10 03:41:38.161 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-10 03:41:38.162 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-10 03:41:38.245  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-10 03:41:38.246  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-10 03:41:38.246 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-10 03:41:38.247 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-10 03:41:38.248  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-10 03:41:38.249  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-10 03:41:38.249 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-10 03:41:38.249 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-10 03:41:38.250 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-10 03:41:38.250 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-10 03:41:38.251 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-10 03:41:38.251 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-10 03:41:38.252 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-10 03:41:38.252 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-10 03:41:38.253 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-10 03:41:38.254 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-10 03:41:38.257 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 233655193531165248000344744005619972282849193069
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Apr 10 01:36:32 UTC 2022
           Final Date: Fri Apr 09 01:36:31 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [03:98:bd:bc:95:a8:f3:eb:38:c8:bd:04:d5:fb:22:4c:c1:6e:bc:e4]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 9665f5bf3c4a39ffa164187f92702c6030418ed5
                       e37396dd0754081734ad7a934e0ea571c5b47ba0
                       6bdd6184f1ed27a6c40cb21e189f3238adebe591
                       160db623c83b7da807b6f529230788faac7b0fe8
                       35f6aec6fd207eb976ec621b17326b06c7540e83
                       2b15ee6c7e9a31252c9a0f2d06d6aa12650e06c9
                       297902d8f18f141d9d12c9403519f07b441cb148
                       eb87c659c72d8382ae59f29ded1cf067e7f20e3a
                       0d948f09fb44ced8d9cb790a4d94e1993eb55eff
                       4f48158a803f9d212a784404abcc7fac4b922871
                       3bd22b503ed3aee668097b5c3dc6f8eaccb58455
                       6726ba3ce5fc01813b59a845bbd65bd5eb5c52be
                       9981dc4fa26bd602ec75348696a15fa9da08bd5a
                       3e12e5f2edb2a2e62c0d16767958974b5027327e
                       d8a5604bd9cf3db38b5096a5f3e3ba924767b655
                       649b3b14b98b0f81aba254f7d7e3f84063ea3710
                       39e016d1252e19691d5395854d4dfec1e36c56d5
                       2b701544e6525710850b4a79c0dad11d483c7d63
                       91a2f411e011892d634ead8a91a365250d759ae8
                       375a2a16
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [5d:e3:a1:fe:6e:c6:2e:5e:53:47:63:d5:b0:48:aa:25:05:01:bb:96]
            modulus: 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
    public exponent: 10001

] 
2022-04-10 03:48:09.602  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-10 03:48:09.604 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-10 03:48:09.605 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-04-10 03:48:09.606 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-10 03:48:09.606  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-04-10 03:48:09.607  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-10 03:48:09.607  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-10 03:48:09.607 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-10 03:48:09.607 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-10 03:48:09.608 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-10 03:48:09.613 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-10 03:48:09.613 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-10 03:48:09.614 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-10 03:48:09.614 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-10 03:48:09.707  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-10 03:48:09.707  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-10 03:48:09.707 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-10 03:48:09.708 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-10 03:48:09.710  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-10 03:48:09.710  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-10 03:48:09.711 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-10 03:48:09.711 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-10 03:48:09.711 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-10 03:48:09.712 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-10 03:48:09.712 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-10 03:48:09.713 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-10 03:48:09.714 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-10 03:48:09.714 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-10 03:48:09.714 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-10 03:48:09.715 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-10 03:48:09.719 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 233655193531165248000344744005619972282849193069
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Apr 10 01:36:32 UTC 2022
           Final Date: Fri Apr 09 01:36:31 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [03:98:bd:bc:95:a8:f3:eb:38:c8:bd:04:d5:fb:22:4c:c1:6e:bc:e4]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 9665f5bf3c4a39ffa164187f92702c6030418ed5
                       e37396dd0754081734ad7a934e0ea571c5b47ba0
                       6bdd6184f1ed27a6c40cb21e189f3238adebe591
                       160db623c83b7da807b6f529230788faac7b0fe8
                       35f6aec6fd207eb976ec621b17326b06c7540e83
                       2b15ee6c7e9a31252c9a0f2d06d6aa12650e06c9
                       297902d8f18f141d9d12c9403519f07b441cb148
                       eb87c659c72d8382ae59f29ded1cf067e7f20e3a
                       0d948f09fb44ced8d9cb790a4d94e1993eb55eff
                       4f48158a803f9d212a784404abcc7fac4b922871
                       3bd22b503ed3aee668097b5c3dc6f8eaccb58455
                       6726ba3ce5fc01813b59a845bbd65bd5eb5c52be
                       9981dc4fa26bd602ec75348696a15fa9da08bd5a
                       3e12e5f2edb2a2e62c0d16767958974b5027327e
                       d8a5604bd9cf3db38b5096a5f3e3ba924767b655
                       649b3b14b98b0f81aba254f7d7e3f84063ea3710
                       39e016d1252e19691d5395854d4dfec1e36c56d5
                       2b701544e6525710850b4a79c0dad11d483c7d63
                       91a2f411e011892d634ead8a91a365250d759ae8
                       375a2a16
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [29:62:3d:f5:99:26:c2:bf:d1:68:8a:63:02:a7:e2:06:00:f0:d6:77]
            modulus: c81f7eac1f04f1ab815fa3a151c02d26588d7d4ba36a2c39763402f7ca3ed1106275cc45dff19ef88cc981372f788f44b9f625fa6a08359b9e5f31a0844a8199c8d63b0b4d0c4fad9ce006c1060303308003b4ccf1917b91a8bf5e3e3c334a3e8ce75ca77bc404585e8bb06967fe1a501bdb681e06228323d45a7e599c96104ccc2541b94d4a8670788d6aff8e8d290457aed38ac2003ddf31f968afbc8f42de5a000535a5f7b60eca09a0164079476202fd0184596ef62131f18012660a5d1b8be5a9753d2aa89d846b018a14e73e2d12efaadad053e3fdc2a88e8b6e39e5b4061bfc1515f2bb1dd97aa1ac409617628ca1742414b8d28c2513eed966293d33
    public exponent: 10001

] 
2022-04-10 03:48:58.476  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-10 03:48:58.477 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-10 03:48:58.478 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-04-10 03:48:58.479 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-10 03:48:58.479  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-04-10 03:48:58.479  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-10 03:48:58.480  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-10 03:48:58.480 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-10 03:48:58.480 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-10 03:48:58.480 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-10 03:48:58.485 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-10 03:48:58.485 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-10 03:48:58.485 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-10 03:48:58.486 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-10 03:48:58.569  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-10 03:48:58.569  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-10 03:48:58.570 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-10 03:48:58.570 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-10 03:48:58.571  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-10 03:48:58.571  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-10 03:48:58.583 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-10 03:48:58.584 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-10 03:48:58.584 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-10 03:48:58.584 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-10 03:48:58.585 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-10 03:48:58.585 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-10 03:48:58.586 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-10 03:48:58.586 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-10 03:48:58.587 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-10 03:48:58.588 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-10 03:48:58.592 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 233655193531165248000344744005619972282849193069
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Apr 10 01:36:32 UTC 2022
           Final Date: Fri Apr 09 01:36:31 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [03:98:bd:bc:95:a8:f3:eb:38:c8:bd:04:d5:fb:22:4c:c1:6e:bc:e4]
            modulus: 96e5d1f21d22aa2803e8ebdd22951f41d2307e086a703db89dec4249242184701b0ea52687d2225fc2bd4a6eb49660e751fcee8976d2b26bcd2f1b57db4447f5e508c64fb53b008d05b2ad4fe3a4f55803d78bb37975907755bd501228c5a758d11aad42a62d3441aa6240c50fc284b039852767a398ab78034415734ce5fc4082e44c5b84c8a95d295f17a231a63f6fdc94b2629d85a4af68b9bd9150a98b9b89c1e1894a748de83f9218f2225b18d4e9b2e9580019b7884be9c7881435b21d7446470654fe510b9754d1cce73a29f77fecfb5cd7d9312b65610c26573a91f6ac89d9c99263041f5788fcebfb97813c05362a5ff13cd078f1fd60e276436ffb17a049dbdab5d3a30257e3b2944812fd4f61efab480f8eb05b893ea6caa807de40abffebc6729a4109fa86a02e8676a55baf8c791a07050299736b2662388add0357412eb6dbce2cbb1aadd25684dd7525122aba9e4b3e08d039cf9febf4f212dfaada8d7d5b0e3cc95625b6b7382e706575c457cbb1d7aa26e170d2bebe0df3
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 9665f5bf3c4a39ffa164187f92702c6030418ed5
                       e37396dd0754081734ad7a934e0ea571c5b47ba0
                       6bdd6184f1ed27a6c40cb21e189f3238adebe591
                       160db623c83b7da807b6f529230788faac7b0fe8
                       35f6aec6fd207eb976ec621b17326b06c7540e83
                       2b15ee6c7e9a31252c9a0f2d06d6aa12650e06c9
                       297902d8f18f141d9d12c9403519f07b441cb148
                       eb87c659c72d8382ae59f29ded1cf067e7f20e3a
                       0d948f09fb44ced8d9cb790a4d94e1993eb55eff
                       4f48158a803f9d212a784404abcc7fac4b922871
                       3bd22b503ed3aee668097b5c3dc6f8eaccb58455
                       6726ba3ce5fc01813b59a845bbd65bd5eb5c52be
                       9981dc4fa26bd602ec75348696a15fa9da08bd5a
                       3e12e5f2edb2a2e62c0d16767958974b5027327e
                       d8a5604bd9cf3db38b5096a5f3e3ba924767b655
                       649b3b14b98b0f81aba254f7d7e3f84063ea3710
                       39e016d1252e19691d5395854d4dfec1e36c56d5
                       2b701544e6525710850b4a79c0dad11d483c7d63
                       91a2f411e011892d634ead8a91a365250d759ae8
                       375a2a16
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [96:3a:90:09:ff:d0:da:2e:9e:32:05:30:b1:2f:2a:26:61:7b:c6:86]
            modulus: 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
    public exponent: 10001

] 
2022-04-10 03:58:54.843  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-10 03:58:54.845 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-10 03:58:54.847 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-04-10 03:58:54.848 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-10 03:58:54.848  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-04-10 03:58:54.849  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-10 03:58:54.849  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-10 03:58:54.850 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-10 03:58:54.850 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-10 03:58:54.851 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-10 03:58:54.854 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-10 03:58:54.855 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-10 03:58:54.855 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-10 03:58:54.855 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-10 03:58:54.959  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-10 03:58:54.960  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-10 03:58:54.960 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-10 03:58:54.961 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-10 03:58:54.962  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-10 03:58:54.963  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-10 03:58:54.964 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-10 03:58:54.964 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-10 03:58:54.964 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-10 03:58:54.965 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-10 03:58:54.965 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-10 03:58:54.965 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-10 03:58:54.966 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-10 03:58:54.966 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-10 03:58:54.967 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-10 03:58:54.967 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-10 03:58:54.970 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 233655193531165248000344744005619972282849193069
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Apr 10 01:36:32 UTC 2022
           Final Date: Fri Apr 09 01:36:31 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [03:98:bd:bc:95:a8:f3:eb:38:c8:bd:04:d5:fb:22:4c:c1:6e:bc:e4]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 9665f5bf3c4a39ffa164187f92702c6030418ed5
                       e37396dd0754081734ad7a934e0ea571c5b47ba0
                       6bdd6184f1ed27a6c40cb21e189f3238adebe591
                       160db623c83b7da807b6f529230788faac7b0fe8
                       35f6aec6fd207eb976ec621b17326b06c7540e83
                       2b15ee6c7e9a31252c9a0f2d06d6aa12650e06c9
                       297902d8f18f141d9d12c9403519f07b441cb148
                       eb87c659c72d8382ae59f29ded1cf067e7f20e3a
                       0d948f09fb44ced8d9cb790a4d94e1993eb55eff
                       4f48158a803f9d212a784404abcc7fac4b922871
                       3bd22b503ed3aee668097b5c3dc6f8eaccb58455
                       6726ba3ce5fc01813b59a845bbd65bd5eb5c52be
                       9981dc4fa26bd602ec75348696a15fa9da08bd5a
                       3e12e5f2edb2a2e62c0d16767958974b5027327e
                       d8a5604bd9cf3db38b5096a5f3e3ba924767b655
                       649b3b14b98b0f81aba254f7d7e3f84063ea3710
                       39e016d1252e19691d5395854d4dfec1e36c56d5
                       2b701544e6525710850b4a79c0dad11d483c7d63
                       91a2f411e011892d634ead8a91a365250d759ae8
                       375a2a16
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [0a:5c:ad:f3:2c:93:b3:47:df:6a:73:95:d9:d7:f7:24:55:fa:76:7a]
            modulus: b10b7203b74dc8c8ba8f7509b2752b639f1a143e872d7a18730cc0b26182de20307d8dcbf096354ba5c1294ee7118b9cf1a6ce095b1d981c264acc6a9d40c7d1f272af3e6d1536d59a326aa9084bb0afec8dd445aa3df1f3854428f36037d2d75bf2ca24e3fc6b4605bf6fcf746a37c3777c9e9a80f96621bb0ab40a4370e3bfe6205ef7f9cc35e8397e37ecd7b9e05bb798728263bc9c91fea0a56b4fc66b6e68da85d7912f1623a4b050d61a4c04dcea77f2205698244b247e02d7e108764dd7013738ea5c16ce7c92b9c937ce5d0b17023579caf96337d38c5a2f37947371429baa6ad730987dbe9db2cd5da20596d6b26be9fbec83d95303a968a054d805
    public exponent: 10001

] 
2022-04-10 03:59:50.965  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-10 03:59:50.966 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-10 03:59:50.968 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-04-10 03:59:50.969 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-10 03:59:50.969  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-04-10 03:59:50.970  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-10 03:59:50.970  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-10 03:59:50.970 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-10 03:59:50.971 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-10 03:59:50.971 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-10 03:59:50.977 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-10 03:59:50.977 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-10 03:59:50.977 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-10 03:59:50.978 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-10 03:59:51.057  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-10 03:59:51.057  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-10 03:59:51.058 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-10 03:59:51.058 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-10 03:59:51.059  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-10 03:59:51.059  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-10 03:59:51.060 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-10 03:59:51.060 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-10 03:59:51.060 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-10 03:59:51.061 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-10 03:59:51.061 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-10 03:59:51.061 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-10 03:59:51.061 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-10 03:59:51.062 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-10 03:59:51.062 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-10 03:59:51.063 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-10 03:59:51.066 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 233655193531165248000344744005619972282849193069
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Apr 10 01:36:32 UTC 2022
           Final Date: Fri Apr 09 01:36:31 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [03:98:bd:bc:95:a8:f3:eb:38:c8:bd:04:d5:fb:22:4c:c1:6e:bc:e4]
            modulus: 96e5d1f21d22aa2803e8ebdd22951f41d2307e086a703db89dec4249242184701b0ea52687d2225fc2bd4a6eb49660e751fcee8976d2b26bcd2f1b57db4447f5e508c64fb53b008d05b2ad4fe3a4f55803d78bb37975907755bd501228c5a758d11aad42a62d3441aa6240c50fc284b039852767a398ab78034415734ce5fc4082e44c5b84c8a95d295f17a231a63f6fdc94b2629d85a4af68b9bd9150a98b9b89c1e1894a748de83f9218f2225b18d4e9b2e9580019b7884be9c7881435b21d7446470654fe510b9754d1cce73a29f77fecfb5cd7d9312b65610c26573a91f6ac89d9c99263041f5788fcebfb97813c05362a5ff13cd078f1fd60e276436ffb17a049dbdab5d3a30257e3b2944812fd4f61efab480f8eb05b893ea6caa807de40abffebc6729a4109fa86a02e8676a55baf8c791a07050299736b2662388add0357412eb6dbce2cbb1aadd25684dd7525122aba9e4b3e08d039cf9febf4f212dfaada8d7d5b0e3cc95625b6b7382e706575c457cbb1d7aa26e170d2bebe0df3
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 9665f5bf3c4a39ffa164187f92702c6030418ed5
                       e37396dd0754081734ad7a934e0ea571c5b47ba0
                       6bdd6184f1ed27a6c40cb21e189f3238adebe591
                       160db623c83b7da807b6f529230788faac7b0fe8
                       35f6aec6fd207eb976ec621b17326b06c7540e83
                       2b15ee6c7e9a31252c9a0f2d06d6aa12650e06c9
                       297902d8f18f141d9d12c9403519f07b441cb148
                       eb87c659c72d8382ae59f29ded1cf067e7f20e3a
                       0d948f09fb44ced8d9cb790a4d94e1993eb55eff
                       4f48158a803f9d212a784404abcc7fac4b922871
                       3bd22b503ed3aee668097b5c3dc6f8eaccb58455
                       6726ba3ce5fc01813b59a845bbd65bd5eb5c52be
                       9981dc4fa26bd602ec75348696a15fa9da08bd5a
                       3e12e5f2edb2a2e62c0d16767958974b5027327e
                       d8a5604bd9cf3db38b5096a5f3e3ba924767b655
                       649b3b14b98b0f81aba254f7d7e3f84063ea3710
                       39e016d1252e19691d5395854d4dfec1e36c56d5
                       2b701544e6525710850b4a79c0dad11d483c7d63
                       91a2f411e011892d634ead8a91a365250d759ae8
                       375a2a16
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [1c:91:b1:d8:5c:07:13:bf:dc:5f:69:7d:27:1c:6a:50:a2:b4:f3:19]
            modulus: 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
    public exponent: 10001

]