Results

By type

          2022-06-07 02:04:20,400 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-06-07 02:04:23,688 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-06-07 02:04:26.393  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Jun 07, 2022 2:04:34 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Jun 07, 2022 2:04:34 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Jun 07, 2022 2:04:34 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Jun 07, 2022 2:04:34 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-06-07 02:04:36.575 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-06-07 02:04:37.589  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-06-07 02:04:38.185  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-06-07 02:04:40.976 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-06-07 02:04:40.980 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
2022-06-07 02:04:40.981 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-06-07 02:04:40.985 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-06-07 02:04:41.100 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2022-06-07 02:04:41.179 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/docs]}: redirectToUi(HttpServletRequest)
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
2022-06-07 02:04:41.600 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-06-07 02:04:45.386 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Jun 07, 2022 2:04:47 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-06-07 02:04:48.987  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 31.304 seconds (JVM running for 37.608)
Jun 07, 2022 2:04:50 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-06-07 02:05:21.082  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-07 02:05:21.089 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-07 02:05:21.202 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-06-07 02:05:21.205 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-07 02:05:21.289  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-06-07 02:05:21.292  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-07 02:05:21.293  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-07 02:05:21.294 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-07 02:05:21.294 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-07 02:05:21.376 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-07 02:05:21.382 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-07 02:05:21.385 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-07 02:05:21.577 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-07 02:05:21.581 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-07 02:05:21.582 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-07 02:05:21.585 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-07 02:05:22.777  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-07 02:05:22.780  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-07 02:05:22.781 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-07 02:05:22.782 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-07 02:05:22.790  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-07 02:05:22.791  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-07 02:05:22.791 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 02:05:22.792 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 02:05:22.792 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 02:05:22.886 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 02:05:22.886 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 02:05:22.887 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 02:05:22.892 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 02:05:22.893 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 02:05:22.893 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 02:05:22.895 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-07 02:05:23.000 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 521423419128688653756624289027813751911183231529
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jun 07 02:01:20 UTC 2022
           Final Date: Sun Jun 06 02:01:19 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [73:9f:97:9a:49:4b:a8:c5:5a:e8:e6:73:e8:0c:b1:5e:c9:5e:68:15]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 2722d0f1a8fb6d8952c0735a17847db1dfb7caa4
                       8fa96ff15c4cd8caa8967bfb5a29b79e61eec9cb
                       174baf7c6b46ba09131cc7a83c3ddefda2b91388
                       b4f938ba2e88310354a4d2da9bdc7c714eba29cd
                       4a6de5610ee229c986ce8bfba365ec553fbc1164
                       8649cca1193b395ec9c32a638b16ddcd02bd185f
                       bcba2b70ec64b696181304065d46b8267bd3120b
                       c3cb155c0b2628900f8ab045db37d1da4e2b3bc4
                       d6ba3229ffee04a275c22490d0c24eebfea4a0f3
                       d074dcc93ea98a31972ecb510e05aefea1de5d48
                       ac2cb07c4614c6384c5fc6a541382d542935930b
                       75e0289dd8dedee5c66e5751b932c561cd9fe415
                       d85da99d1f780e119f6ed5b22e3f041d7af413af
                       71efe028f3bd36806acd47bb570fcf4fadfe8a67
                       e6aca992418585c405ed7ed11c53ff525a2d5c4d
                       3355108e2474ea89fa527d1e6fb865a1021714bd
                       a738bb7e5800b461680f56a02a989cff061f4023
                       07a71587ae39288299eefaf7c34230c98ac7765d
                       602da382068ba998665e0ee28e687999c2680cf2
                       342edeb5
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [9b:ad:ae:82:d8:9e:38:0d:b1:b3:d3:c1:49:39:1f:94:f1:ac:37:76]
            modulus: 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
    public exponent: 10001

] 
2022-06-07 03:33:30.667  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-07 03:33:30.669 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-07 03:33:30.670 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-07 03:33:30.671 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-07 03:33:30.672  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-07 03:33:30.673  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-07 03:33:30.673  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-07 03:33:30.674 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-07 03:33:30.674 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-07 03:33:30.676 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-07 03:33:30.683 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-07 03:33:30.683 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-07 03:33:30.684 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-07 03:33:30.684 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-07 03:33:30.804  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-07 03:33:30.805  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-07 03:33:30.805 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-07 03:33:30.805 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-07 03:33:30.808  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-07 03:33:30.808  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-07 03:33:30.809 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 03:33:30.809 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 03:33:30.809 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 03:33:30.810 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 03:33:30.811 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 03:33:30.811 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 03:33:30.812 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 03:33:30.812 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 03:33:30.812 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 03:33:30.814 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-07 03:33:30.879 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 521423419128688653756624289027813751911183231529
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jun 07 02:01:20 UTC 2022
           Final Date: Sun Jun 06 02:01:19 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [73:9f:97:9a:49:4b:a8:c5:5a:e8:e6:73:e8:0c:b1:5e:c9:5e:68:15]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 2722d0f1a8fb6d8952c0735a17847db1dfb7caa4
                       8fa96ff15c4cd8caa8967bfb5a29b79e61eec9cb
                       174baf7c6b46ba09131cc7a83c3ddefda2b91388
                       b4f938ba2e88310354a4d2da9bdc7c714eba29cd
                       4a6de5610ee229c986ce8bfba365ec553fbc1164
                       8649cca1193b395ec9c32a638b16ddcd02bd185f
                       bcba2b70ec64b696181304065d46b8267bd3120b
                       c3cb155c0b2628900f8ab045db37d1da4e2b3bc4
                       d6ba3229ffee04a275c22490d0c24eebfea4a0f3
                       d074dcc93ea98a31972ecb510e05aefea1de5d48
                       ac2cb07c4614c6384c5fc6a541382d542935930b
                       75e0289dd8dedee5c66e5751b932c561cd9fe415
                       d85da99d1f780e119f6ed5b22e3f041d7af413af
                       71efe028f3bd36806acd47bb570fcf4fadfe8a67
                       e6aca992418585c405ed7ed11c53ff525a2d5c4d
                       3355108e2474ea89fa527d1e6fb865a1021714bd
                       a738bb7e5800b461680f56a02a989cff061f4023
                       07a71587ae39288299eefaf7c34230c98ac7765d
                       602da382068ba998665e0ee28e687999c2680cf2
                       342edeb5
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [a9:1e:47:26:ba:8e:43:fc:42:9c:df:c1:c4:06:62:d0:54:ec:50:9a]
            modulus: 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
    public exponent: 10001

] 
2022-06-07 03:37:21.276  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-07 03:37:21.277 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-07 03:37:21.278 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-07 03:37:21.279 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-07 03:37:21.279  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-07 03:37:21.280  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-07 03:37:21.280  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-07 03:37:21.281 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-07 03:37:21.281 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-07 03:37:21.281 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-07 03:37:21.290 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-07 03:37:21.291 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-07 03:37:21.291 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-07 03:37:21.291 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-07 03:37:21.479  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-07 03:37:21.479  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-07 03:37:21.480 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-07 03:37:21.480 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-07 03:37:21.482  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-07 03:37:21.482  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-07 03:37:21.482 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 03:37:21.483 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 03:37:21.483 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 03:37:21.487 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 03:37:21.487 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 03:37:21.487 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 03:37:21.488 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 03:37:21.488 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 03:37:21.488 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 03:37:21.489 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-07 03:37:21.492 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 521423419128688653756624289027813751911183231529
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jun 07 02:01:20 UTC 2022
           Final Date: Sun Jun 06 02:01:19 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [73:9f:97:9a:49:4b:a8:c5:5a:e8:e6:73:e8:0c:b1:5e:c9:5e:68:15]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 2722d0f1a8fb6d8952c0735a17847db1dfb7caa4
                       8fa96ff15c4cd8caa8967bfb5a29b79e61eec9cb
                       174baf7c6b46ba09131cc7a83c3ddefda2b91388
                       b4f938ba2e88310354a4d2da9bdc7c714eba29cd
                       4a6de5610ee229c986ce8bfba365ec553fbc1164
                       8649cca1193b395ec9c32a638b16ddcd02bd185f
                       bcba2b70ec64b696181304065d46b8267bd3120b
                       c3cb155c0b2628900f8ab045db37d1da4e2b3bc4
                       d6ba3229ffee04a275c22490d0c24eebfea4a0f3
                       d074dcc93ea98a31972ecb510e05aefea1de5d48
                       ac2cb07c4614c6384c5fc6a541382d542935930b
                       75e0289dd8dedee5c66e5751b932c561cd9fe415
                       d85da99d1f780e119f6ed5b22e3f041d7af413af
                       71efe028f3bd36806acd47bb570fcf4fadfe8a67
                       e6aca992418585c405ed7ed11c53ff525a2d5c4d
                       3355108e2474ea89fa527d1e6fb865a1021714bd
                       a738bb7e5800b461680f56a02a989cff061f4023
                       07a71587ae39288299eefaf7c34230c98ac7765d
                       602da382068ba998665e0ee28e687999c2680cf2
                       342edeb5
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [fa:4a:ec:12:58:0a:67:34:23:e1:a2:9a:25:e0:83:a2:8a:4b:ae:03]
            modulus: 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
    public exponent: 10001

] 
2022-06-07 03:39:47.871  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-07 03:39:47.873 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-07 03:39:47.874 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-06-07 03:39:47.875 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-07 03:39:47.875  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-06-07 03:39:47.876  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-07 03:39:47.876  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-07 03:39:47.876 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-07 03:39:47.877 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-07 03:39:47.877 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-07 03:39:47.882 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-07 03:39:47.883 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-07 03:39:47.883 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-07 03:39:47.883 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-07 03:39:48.222  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-07 03:39:48.223  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-07 03:39:48.223 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-07 03:39:48.224 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-07 03:39:48.225  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-07 03:39:48.226  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-07 03:39:48.226 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 03:39:48.226 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 03:39:48.227 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 03:39:48.227 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 03:39:48.228 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 03:39:48.228 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 03:39:48.229 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 03:39:48.229 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 03:39:48.230 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 03:39:48.231 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-07 03:39:48.233 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 521423419128688653756624289027813751911183231529
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jun 07 02:01:20 UTC 2022
           Final Date: Sun Jun 06 02:01:19 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [73:9f:97:9a:49:4b:a8:c5:5a:e8:e6:73:e8:0c:b1:5e:c9:5e:68:15]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 2722d0f1a8fb6d8952c0735a17847db1dfb7caa4
                       8fa96ff15c4cd8caa8967bfb5a29b79e61eec9cb
                       174baf7c6b46ba09131cc7a83c3ddefda2b91388
                       b4f938ba2e88310354a4d2da9bdc7c714eba29cd
                       4a6de5610ee229c986ce8bfba365ec553fbc1164
                       8649cca1193b395ec9c32a638b16ddcd02bd185f
                       bcba2b70ec64b696181304065d46b8267bd3120b
                       c3cb155c0b2628900f8ab045db37d1da4e2b3bc4
                       d6ba3229ffee04a275c22490d0c24eebfea4a0f3
                       d074dcc93ea98a31972ecb510e05aefea1de5d48
                       ac2cb07c4614c6384c5fc6a541382d542935930b
                       75e0289dd8dedee5c66e5751b932c561cd9fe415
                       d85da99d1f780e119f6ed5b22e3f041d7af413af
                       71efe028f3bd36806acd47bb570fcf4fadfe8a67
                       e6aca992418585c405ed7ed11c53ff525a2d5c4d
                       3355108e2474ea89fa527d1e6fb865a1021714bd
                       a738bb7e5800b461680f56a02a989cff061f4023
                       07a71587ae39288299eefaf7c34230c98ac7765d
                       602da382068ba998665e0ee28e687999c2680cf2
                       342edeb5
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [9c:48:c7:09:44:ce:8f:26:e5:d7:29:eb:46:0a:4a:de:7e:46:1e:97]
            modulus: b9ae4af68c45ccf53ba7fef3bf7c4029ebf454e5ffd81fda5596a40ab66155ebb383c581d1f2ae8069e7e8210be1a2b4a4c88a8d266d6141dd32f615d8780ba2e77d50f499d4cf497764f780a9857208cfa4aa47b1c6bbc791e30049ad4883445b424fa9606f84e9060ed1e82d6a12ca9505d36780ba478f557a1905a6e308a468c87f395218653c5d0eccc2bd168949f1abac6e04451fe848e5bf32f57b1e2dbb4f3c66d5dee6c395866e767fd4a45c5a99c0fc770fc5a86a22f54527de61dbf08cd112d9cc1889226b2a8ed3e48af5d8ad0a954494fa8f05ae13a196c7eb37826184024b026f5472467d849f99eb654dfeb1c57204b1cbb4f37a2063e60751
    public exponent: 10001

] 
2022-06-07 03:41:22.818  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-07 03:41:22.819 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-07 03:41:22.820 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-06-07 03:41:22.821 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-07 03:41:22.821  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-06-07 03:41:22.822  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-07 03:41:22.822  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-07 03:41:22.822 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-07 03:41:22.823 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-07 03:41:22.823 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-07 03:41:22.827 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-07 03:41:22.828 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-07 03:41:22.828 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-07 03:41:22.829 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-07 03:41:22.974  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-07 03:41:22.975  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-07 03:41:22.976 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-07 03:41:22.976 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-07 03:41:22.977  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-07 03:41:22.978  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-07 03:41:22.979 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 03:41:22.979 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 03:41:22.979 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 03:41:22.980 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 03:41:22.980 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 03:41:22.981 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 03:41:22.981 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 03:41:22.982 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 03:41:22.982 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 03:41:22.983 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-07 03:41:22.986 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 521423419128688653756624289027813751911183231529
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jun 07 02:01:20 UTC 2022
           Final Date: Sun Jun 06 02:01:19 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [73:9f:97:9a:49:4b:a8:c5:5a:e8:e6:73:e8:0c:b1:5e:c9:5e:68:15]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 2722d0f1a8fb6d8952c0735a17847db1dfb7caa4
                       8fa96ff15c4cd8caa8967bfb5a29b79e61eec9cb
                       174baf7c6b46ba09131cc7a83c3ddefda2b91388
                       b4f938ba2e88310354a4d2da9bdc7c714eba29cd
                       4a6de5610ee229c986ce8bfba365ec553fbc1164
                       8649cca1193b395ec9c32a638b16ddcd02bd185f
                       bcba2b70ec64b696181304065d46b8267bd3120b
                       c3cb155c0b2628900f8ab045db37d1da4e2b3bc4
                       d6ba3229ffee04a275c22490d0c24eebfea4a0f3
                       d074dcc93ea98a31972ecb510e05aefea1de5d48
                       ac2cb07c4614c6384c5fc6a541382d542935930b
                       75e0289dd8dedee5c66e5751b932c561cd9fe415
                       d85da99d1f780e119f6ed5b22e3f041d7af413af
                       71efe028f3bd36806acd47bb570fcf4fadfe8a67
                       e6aca992418585c405ed7ed11c53ff525a2d5c4d
                       3355108e2474ea89fa527d1e6fb865a1021714bd
                       a738bb7e5800b461680f56a02a989cff061f4023
                       07a71587ae39288299eefaf7c34230c98ac7765d
                       602da382068ba998665e0ee28e687999c2680cf2
                       342edeb5
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [70:a4:64:b3:58:0a:9d:71:b9:b9:4a:5d:95:92:a2:6a:c7:f9:79:f3]
            modulus: 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
    public exponent: 10001

] 
2022-06-07 03:45:26.827  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-07 03:45:26.829 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-07 03:45:26.830 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-07 03:45:26.830 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-07 03:45:26.831  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-07 03:45:26.831  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-07 03:45:26.832  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-07 03:45:26.832 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-07 03:45:26.833 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-07 03:45:26.833 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-07 03:45:26.838 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-07 03:45:26.839 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-07 03:45:26.839 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-07 03:45:26.839 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-07 03:45:26.927  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-07 03:45:26.928  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-07 03:45:26.928 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-07 03:45:26.928 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-07 03:45:26.930  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-07 03:45:26.930  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-07 03:45:26.930 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 03:45:26.931 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 03:45:26.931 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 03:45:26.932 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 03:45:26.932 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 03:45:26.933 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 03:45:26.933 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 03:45:26.934 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 03:45:26.934 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 03:45:26.935 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-07 03:45:26.937 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 521423419128688653756624289027813751911183231529
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jun 07 02:01:20 UTC 2022
           Final Date: Sun Jun 06 02:01:19 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [73:9f:97:9a:49:4b:a8:c5:5a:e8:e6:73:e8:0c:b1:5e:c9:5e:68:15]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 2722d0f1a8fb6d8952c0735a17847db1dfb7caa4
                       8fa96ff15c4cd8caa8967bfb5a29b79e61eec9cb
                       174baf7c6b46ba09131cc7a83c3ddefda2b91388
                       b4f938ba2e88310354a4d2da9bdc7c714eba29cd
                       4a6de5610ee229c986ce8bfba365ec553fbc1164
                       8649cca1193b395ec9c32a638b16ddcd02bd185f
                       bcba2b70ec64b696181304065d46b8267bd3120b
                       c3cb155c0b2628900f8ab045db37d1da4e2b3bc4
                       d6ba3229ffee04a275c22490d0c24eebfea4a0f3
                       d074dcc93ea98a31972ecb510e05aefea1de5d48
                       ac2cb07c4614c6384c5fc6a541382d542935930b
                       75e0289dd8dedee5c66e5751b932c561cd9fe415
                       d85da99d1f780e119f6ed5b22e3f041d7af413af
                       71efe028f3bd36806acd47bb570fcf4fadfe8a67
                       e6aca992418585c405ed7ed11c53ff525a2d5c4d
                       3355108e2474ea89fa527d1e6fb865a1021714bd
                       a738bb7e5800b461680f56a02a989cff061f4023
                       07a71587ae39288299eefaf7c34230c98ac7765d
                       602da382068ba998665e0ee28e687999c2680cf2
                       342edeb5
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [4b:6d:f8:e8:82:b1:90:50:42:9f:92:30:19:84:d3:f8:83:1e:45:f9]
            modulus: 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
    public exponent: 10001

] 
2022-06-07 03:52:25.697  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-07 03:52:25.698 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-07 03:52:25.700 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-06-07 03:52:25.700 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-07 03:52:25.700  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-06-07 03:52:25.701  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-07 03:52:25.701  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-07 03:52:25.702 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-07 03:52:25.702 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-07 03:52:25.702 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-07 03:52:25.707 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-07 03:52:25.707 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-07 03:52:25.707 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-07 03:52:25.708 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-07 03:52:25.793  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-07 03:52:25.793  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-07 03:52:25.793 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-07 03:52:25.794 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-07 03:52:25.795  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-07 03:52:25.795  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-07 03:52:25.796 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 03:52:25.796 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 03:52:25.796 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 03:52:25.797 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 03:52:25.797 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 03:52:25.798 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 03:52:25.799 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 03:52:25.799 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 03:52:25.799 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 03:52:25.800 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-07 03:52:25.803 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 521423419128688653756624289027813751911183231529
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jun 07 02:01:20 UTC 2022
           Final Date: Sun Jun 06 02:01:19 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [73:9f:97:9a:49:4b:a8:c5:5a:e8:e6:73:e8:0c:b1:5e:c9:5e:68:15]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 2722d0f1a8fb6d8952c0735a17847db1dfb7caa4
                       8fa96ff15c4cd8caa8967bfb5a29b79e61eec9cb
                       174baf7c6b46ba09131cc7a83c3ddefda2b91388
                       b4f938ba2e88310354a4d2da9bdc7c714eba29cd
                       4a6de5610ee229c986ce8bfba365ec553fbc1164
                       8649cca1193b395ec9c32a638b16ddcd02bd185f
                       bcba2b70ec64b696181304065d46b8267bd3120b
                       c3cb155c0b2628900f8ab045db37d1da4e2b3bc4
                       d6ba3229ffee04a275c22490d0c24eebfea4a0f3
                       d074dcc93ea98a31972ecb510e05aefea1de5d48
                       ac2cb07c4614c6384c5fc6a541382d542935930b
                       75e0289dd8dedee5c66e5751b932c561cd9fe415
                       d85da99d1f780e119f6ed5b22e3f041d7af413af
                       71efe028f3bd36806acd47bb570fcf4fadfe8a67
                       e6aca992418585c405ed7ed11c53ff525a2d5c4d
                       3355108e2474ea89fa527d1e6fb865a1021714bd
                       a738bb7e5800b461680f56a02a989cff061f4023
                       07a71587ae39288299eefaf7c34230c98ac7765d
                       602da382068ba998665e0ee28e687999c2680cf2
                       342edeb5
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [95:79:f9:2d:f4:33:a4:4f:f7:20:49:24:51:28:da:5b:0d:7b:14:f9]
            modulus: c924c63e3af1b5d5fef01337d41414498f8dfca3605cb632f7d8ddca30ab8d0605c67dd5fe2ddb3370486d13e5a9c2e753912c2ef13975569fb1ecd4841257f3b39f7946d8bad7ca129805da186f7293b9ac2d8638887f672fc7768305e5fa724a2948a71730a10d52c5d327eb559c30e163bc9cc2825d16803616b2ad941f0a150f93a62aeb8cfb6009dd75c9078612d5cfad2301d6654cd0d7acf1e7ddcba3f3e7a51a9950973cf8af8d4f10b62e3ed491a3b0a2eb30e41e831ebc83722ba18fddae069d64e777595e4f5144ebf310e58e8f56a2687a9248d1e97d3caa73157ea335900ad75a4e2ccd33b1fc30615ab6045327a2f04e7a84c931db7b624c2d
    public exponent: 10001

] 
2022-06-07 04:02:24.016  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-07 04:02:24.017 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-07 04:02:24.018 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-06-07 04:02:24.019 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-07 04:02:24.019  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-06-07 04:02:24.019  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-07 04:02:24.019  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-07 04:02:24.020 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-07 04:02:24.020 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-07 04:02:24.020 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-07 04:02:24.024 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-07 04:02:24.025 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-07 04:02:24.027 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-07 04:02:24.027 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-07 04:02:24.208  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-07 04:02:24.209  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-07 04:02:24.209 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-07 04:02:24.209 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-07 04:02:24.210  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-07 04:02:24.210  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-07 04:02:24.210 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 04:02:24.211 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 04:02:24.211 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 04:02:24.211 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 04:02:24.212 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 04:02:24.212 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 04:02:24.212 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 04:02:24.212 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 04:02:24.213 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 04:02:24.213 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-07 04:02:24.216 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 521423419128688653756624289027813751911183231529
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jun 07 02:01:20 UTC 2022
           Final Date: Sun Jun 06 02:01:19 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [73:9f:97:9a:49:4b:a8:c5:5a:e8:e6:73:e8:0c:b1:5e:c9:5e:68:15]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 2722d0f1a8fb6d8952c0735a17847db1dfb7caa4
                       8fa96ff15c4cd8caa8967bfb5a29b79e61eec9cb
                       174baf7c6b46ba09131cc7a83c3ddefda2b91388
                       b4f938ba2e88310354a4d2da9bdc7c714eba29cd
                       4a6de5610ee229c986ce8bfba365ec553fbc1164
                       8649cca1193b395ec9c32a638b16ddcd02bd185f
                       bcba2b70ec64b696181304065d46b8267bd3120b
                       c3cb155c0b2628900f8ab045db37d1da4e2b3bc4
                       d6ba3229ffee04a275c22490d0c24eebfea4a0f3
                       d074dcc93ea98a31972ecb510e05aefea1de5d48
                       ac2cb07c4614c6384c5fc6a541382d542935930b
                       75e0289dd8dedee5c66e5751b932c561cd9fe415
                       d85da99d1f780e119f6ed5b22e3f041d7af413af
                       71efe028f3bd36806acd47bb570fcf4fadfe8a67
                       e6aca992418585c405ed7ed11c53ff525a2d5c4d
                       3355108e2474ea89fa527d1e6fb865a1021714bd
                       a738bb7e5800b461680f56a02a989cff061f4023
                       07a71587ae39288299eefaf7c34230c98ac7765d
                       602da382068ba998665e0ee28e687999c2680cf2
                       342edeb5
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [50:07:44:48:06:11:98:88:3a:0c:eb:8d:01:34:51:fa:6b:48:c2:65]
            modulus: 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
    public exponent: 10001

] 
2022-06-07 04:03:34.169  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-07 04:03:34.171 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-07 04:03:34.172 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-06-07 04:03:34.172 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-07 04:03:34.173  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-06-07 04:03:34.173  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-07 04:03:34.174  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-07 04:03:34.174 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-07 04:03:34.174 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-07 04:03:34.174 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-07 04:03:34.179 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-07 04:03:34.179 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-07 04:03:34.179 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-07 04:03:34.180 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-07 04:03:34.269  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-07 04:03:34.269  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-07 04:03:34.269 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-07 04:03:34.270 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-07 04:03:34.271  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-07 04:03:34.271  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-07 04:03:34.271 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 04:03:34.271 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 04:03:34.271 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 04:03:34.272 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 04:03:34.272 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 04:03:34.272 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 04:03:34.273 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 04:03:34.273 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 04:03:34.273 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 04:03:34.274 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-07 04:03:34.276 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 521423419128688653756624289027813751911183231529
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jun 07 02:01:20 UTC 2022
           Final Date: Sun Jun 06 02:01:19 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [73:9f:97:9a:49:4b:a8:c5:5a:e8:e6:73:e8:0c:b1:5e:c9:5e:68:15]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 2722d0f1a8fb6d8952c0735a17847db1dfb7caa4
                       8fa96ff15c4cd8caa8967bfb5a29b79e61eec9cb
                       174baf7c6b46ba09131cc7a83c3ddefda2b91388
                       b4f938ba2e88310354a4d2da9bdc7c714eba29cd
                       4a6de5610ee229c986ce8bfba365ec553fbc1164
                       8649cca1193b395ec9c32a638b16ddcd02bd185f
                       bcba2b70ec64b696181304065d46b8267bd3120b
                       c3cb155c0b2628900f8ab045db37d1da4e2b3bc4
                       d6ba3229ffee04a275c22490d0c24eebfea4a0f3
                       d074dcc93ea98a31972ecb510e05aefea1de5d48
                       ac2cb07c4614c6384c5fc6a541382d542935930b
                       75e0289dd8dedee5c66e5751b932c561cd9fe415
                       d85da99d1f780e119f6ed5b22e3f041d7af413af
                       71efe028f3bd36806acd47bb570fcf4fadfe8a67
                       e6aca992418585c405ed7ed11c53ff525a2d5c4d
                       3355108e2474ea89fa527d1e6fb865a1021714bd
                       a738bb7e5800b461680f56a02a989cff061f4023
                       07a71587ae39288299eefaf7c34230c98ac7765d
                       602da382068ba998665e0ee28e687999c2680cf2
                       342edeb5
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [e0:9f:ee:c3:51:36:05:99:cb:82:05:1d:f8:0f:16:dd:7b:ce:22:d1]
            modulus: db75a3348ed7d51554885a9742302bf141807c085a638ce3134651900a5b8dc54ea320b50ac03cd6d65bce611a31623f7fba12179f20a7e0f33915c1eff574596347721368d95ae329adcf3c0432b030a5c0fd095ed4fcbf4a2d1136e9533f17246a95ddaee4eb4d9b75fe5ffbbf43df2446d7906712dace2f13420af60d41eff8ff73ce599625315aeedcc9c4db0a5647a6777ad68f1ca4a6649b8aaa680df98ef337411168689794d882e54900a5b51075023bf22081f1e407937ee67f9bb0a30430184813bcdb85c281b73877039cd7ff67c93e575c07ecf9d8fd099d844421261a823d58847cb461569691a1989643740a971420f0c916e5d4bfd77d48e5
    public exponent: 10001

]