Results

By type

          2023-01-14 03:16:00,350 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2023-01-14 03:16:01,800 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2023-01-14 03:16:02.558  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Jan 14, 2023 3:16:04 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Jan 14, 2023 3:16:04 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Jan 14, 2023 3:16:04 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Jan 14, 2023 3:16:04 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2023-01-14 03:16:04.802 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2023-01-14 03:16:05.073  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2023-01-14 03:16:05.236  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2023-01-14 03:16:05.940 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2023-01-14 03:16:05.943 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
2023-01-14 03:16:05.944 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2023-01-14 03:16:05.948 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2023-01-14 03:16:05.984 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2023-01-14 03:16:05.987 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/docs]}: redirectToUi(HttpServletRequest)
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
2023-01-14 03:16:06.124 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2023-01-14 03:16:06.832 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Jan 14, 2023 3:16:07 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2023-01-14 03:16:07.741  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 8.269 seconds (JVM running for 9.946)
Jan 14, 2023 3:16:30 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2023-01-14 03:19:16.021  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-14 03:19:16.030 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-14 03:19:16.094 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2023-01-14 03:19:16.102 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-14 03:19:16.134  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2023-01-14 03:19:16.137  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-14 03:19:16.139  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-14 03:19:16.141 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-14 03:19:16.142 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-14 03:19:16.147 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-14 03:19:16.156 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-14 03:19:16.160 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-14 03:19:16.208 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-14 03:19:16.215 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-14 03:19:16.215 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-14 03:19:16.219 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-14 03:19:16.890  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-14 03:19:16.893  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-14 03:19:16.893 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-14 03:19:16.895 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-14 03:19:16.904  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-14 03:19:16.905  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-14 03:19:16.906 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-14 03:19:16.907 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-14 03:19:16.908 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-14 03:19:16.925 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-14 03:19:16.926 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-14 03:19:16.926 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-14 03:19:16.932 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-14 03:19:16.932 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-14 03:19:16.933 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-14 03:19:16.934 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-14 03:19:16.971 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 441944373117423538199248105481427934534251795373
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jan 14 03:14:02 UTC 2023
           Final Date: Thu Jan 13 03:14:01 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [3c:a1:da:91:21:00:ca:31:e4:c2:39:5e:dc:1f:26:0a:bf:7f:66:69],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8d50f25a04ae7b6140bc73e1194df920e3bf578e
                       41e5b4891e55c6aae7445e814418ff80ff3f0848
                       5db6bec98eb921f8c608656943890b21cecfffdf
                       dea0ddc36c34976d9908e57c039b34aea6424e72
                       d1cf75e20ab41ed57c3df3fa064e37b61660c86c
                       eef3fb9516d2decd67224bce42e1862ca54d8177
                       7964ded09a08a61c689d0937c406e8ebceec3f2f
                       64fca28b2c46056a5b36c310589b1d9b825fd42a
                       7fd01a56f98de74a8ea4fe2234f48e2318676536
                       7a66e541897090e6d2c5d001d343ad69c6a64171
                       966b0f45e5664c6fa680c1ff13c9de3b1d90f51a
                       48016329fc4647680646ea2dcff5b302fc862068
                       66ae633f04041cab17cb00990b5e981aaf25b7e2
                       6d6a6b4b76afc5a4dce4ab7b664f4e609833a161
                       8690dc8cb3eb6d70561dc60873c30e0b75c86498
                       4070ea19a465781bc0e9893fe461a01a64849fed
                       f86737c7ccd0975f7352d4e33dd8583f7bc9e3da
                       415d03aab0cc7ca3dd5bf1134a67662522f6b2ef
                       b15c17a8d64a70c68af9f5490e139aa7fba35fa5
                       37c5a634
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [b2:69:39:aa:e9:b9:1e:b1:55:20:fb:a4:5f:a6:0c:41:7a:1f:4c:37],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-14 10:37:52.817  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-14 10:37:52.824 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-14 10:37:52.831 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-14 10:37:52.833 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-14 10:37:52.834  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-14 10:37:52.836  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-14 10:37:52.838  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-14 10:37:52.839 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-14 10:37:52.840 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-14 10:37:52.841 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-14 10:37:52.846 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-14 10:37:52.847 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-14 10:37:52.848 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-14 10:37:52.848 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-14 10:37:53.059  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-14 10:37:53.060  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-14 10:37:53.060 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-14 10:37:53.061 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-14 10:37:53.063  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-14 10:37:53.064  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-14 10:37:53.065 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-14 10:37:53.066 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-14 10:37:53.066 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-14 10:37:53.067 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-14 10:37:53.068 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-14 10:37:53.068 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-14 10:37:53.070 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-14 10:37:53.070 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-14 10:37:53.070 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-14 10:37:53.072 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-14 10:37:53.076 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 441944373117423538199248105481427934534251795373
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jan 14 03:14:02 UTC 2023
           Final Date: Thu Jan 13 03:14:01 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [3c:a1:da:91:21:00:ca:31:e4:c2:39:5e:dc:1f:26:0a:bf:7f:66:69],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8d50f25a04ae7b6140bc73e1194df920e3bf578e
                       41e5b4891e55c6aae7445e814418ff80ff3f0848
                       5db6bec98eb921f8c608656943890b21cecfffdf
                       dea0ddc36c34976d9908e57c039b34aea6424e72
                       d1cf75e20ab41ed57c3df3fa064e37b61660c86c
                       eef3fb9516d2decd67224bce42e1862ca54d8177
                       7964ded09a08a61c689d0937c406e8ebceec3f2f
                       64fca28b2c46056a5b36c310589b1d9b825fd42a
                       7fd01a56f98de74a8ea4fe2234f48e2318676536
                       7a66e541897090e6d2c5d001d343ad69c6a64171
                       966b0f45e5664c6fa680c1ff13c9de3b1d90f51a
                       48016329fc4647680646ea2dcff5b302fc862068
                       66ae633f04041cab17cb00990b5e981aaf25b7e2
                       6d6a6b4b76afc5a4dce4ab7b664f4e609833a161
                       8690dc8cb3eb6d70561dc60873c30e0b75c86498
                       4070ea19a465781bc0e9893fe461a01a64849fed
                       f86737c7ccd0975f7352d4e33dd8583f7bc9e3da
                       415d03aab0cc7ca3dd5bf1134a67662522f6b2ef
                       b15c17a8d64a70c68af9f5490e139aa7fba35fa5
                       37c5a634
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [3d:7c:95:24:96:11:f0:54:ad:56:2b:40:32:05:58:ed:95:5a:6b:8a],[56:66:d1:a4]
        modulus: d0754795c12acba763ccc2199e6248dd879eaf35a132431f945f796b070943c5ee79a774b4258df4e14f7850f02f7b9797936081598202aea799228a84ae592d7b3d2cb709a6f4d32939ca5509329eaab646d1ff81ccda492cebc801c51b1d4f572d7c89dfaa695c9225ffa359cece437ae101d36a9902959f1c8f1855b8cdc0ece0907a2268a3255a54069b7b288717b75bf986e8db6d6dd2e29a5f567b344d8c3283fbbf8cff532c219494c64eb761309002573cba02ad9e5f4c18e6c2cddd4beb120d6ebcf0f1abf8097f5b1135cb85040ac686adc6ed2a548f35c4b9a7008ef42c08034756b7606376527a147c3910e1f304c30f91cb90c6a0009c8e6f6d
public exponent: 10001

] 
2023-01-14 10:44:59.203  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-14 10:44:59.205 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-14 10:44:59.207 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-14 10:44:59.208 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-14 10:44:59.209  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-14 10:44:59.209  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-14 10:44:59.210  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-14 10:44:59.210 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-14 10:44:59.211 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-14 10:44:59.212 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-14 10:44:59.216 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-14 10:44:59.217 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-14 10:44:59.218 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-14 10:44:59.218 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-14 10:44:59.395  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-14 10:44:59.396  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-14 10:44:59.396 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-14 10:44:59.396 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-14 10:44:59.399  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-14 10:44:59.400  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-14 10:44:59.400 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-14 10:44:59.401 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-14 10:44:59.401 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-14 10:44:59.402 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-14 10:44:59.402 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-14 10:44:59.402 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-14 10:44:59.403 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-14 10:44:59.404 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-14 10:44:59.404 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-14 10:44:59.405 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-14 10:44:59.408 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 441944373117423538199248105481427934534251795373
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jan 14 03:14:02 UTC 2023
           Final Date: Thu Jan 13 03:14:01 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [3c:a1:da:91:21:00:ca:31:e4:c2:39:5e:dc:1f:26:0a:bf:7f:66:69],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8d50f25a04ae7b6140bc73e1194df920e3bf578e
                       41e5b4891e55c6aae7445e814418ff80ff3f0848
                       5db6bec98eb921f8c608656943890b21cecfffdf
                       dea0ddc36c34976d9908e57c039b34aea6424e72
                       d1cf75e20ab41ed57c3df3fa064e37b61660c86c
                       eef3fb9516d2decd67224bce42e1862ca54d8177
                       7964ded09a08a61c689d0937c406e8ebceec3f2f
                       64fca28b2c46056a5b36c310589b1d9b825fd42a
                       7fd01a56f98de74a8ea4fe2234f48e2318676536
                       7a66e541897090e6d2c5d001d343ad69c6a64171
                       966b0f45e5664c6fa680c1ff13c9de3b1d90f51a
                       48016329fc4647680646ea2dcff5b302fc862068
                       66ae633f04041cab17cb00990b5e981aaf25b7e2
                       6d6a6b4b76afc5a4dce4ab7b664f4e609833a161
                       8690dc8cb3eb6d70561dc60873c30e0b75c86498
                       4070ea19a465781bc0e9893fe461a01a64849fed
                       f86737c7ccd0975f7352d4e33dd8583f7bc9e3da
                       415d03aab0cc7ca3dd5bf1134a67662522f6b2ef
                       b15c17a8d64a70c68af9f5490e139aa7fba35fa5
                       37c5a634
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [eb:08:7e:3c:c7:08:bd:89:2d:e9:44:82:3f:3c:7a:8b:3c:2f:95:2b],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-14 10:46:49.131  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-14 10:46:49.134 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-14 10:46:49.137 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2023-01-14 10:46:49.138 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-14 10:46:49.139  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2023-01-14 10:46:49.140  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-14 10:46:49.140  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-14 10:46:49.141 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-14 10:46:49.141 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-14 10:46:49.142 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-14 10:46:49.146 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-14 10:46:49.147 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-14 10:46:49.147 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-14 10:46:49.147 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-14 10:46:49.263  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-14 10:46:49.264  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-14 10:46:49.264 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-14 10:46:49.264 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-14 10:46:49.267  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-14 10:46:49.267  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-14 10:46:49.268 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-14 10:46:49.268 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-14 10:46:49.269 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-14 10:46:49.270 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-14 10:46:49.270 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-14 10:46:49.270 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-14 10:46:49.272 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-14 10:46:49.272 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-14 10:46:49.272 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-14 10:46:49.273 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-14 10:46:49.279 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 441944373117423538199248105481427934534251795373
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jan 14 03:14:02 UTC 2023
           Final Date: Thu Jan 13 03:14:01 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [3c:a1:da:91:21:00:ca:31:e4:c2:39:5e:dc:1f:26:0a:bf:7f:66:69],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8d50f25a04ae7b6140bc73e1194df920e3bf578e
                       41e5b4891e55c6aae7445e814418ff80ff3f0848
                       5db6bec98eb921f8c608656943890b21cecfffdf
                       dea0ddc36c34976d9908e57c039b34aea6424e72
                       d1cf75e20ab41ed57c3df3fa064e37b61660c86c
                       eef3fb9516d2decd67224bce42e1862ca54d8177
                       7964ded09a08a61c689d0937c406e8ebceec3f2f
                       64fca28b2c46056a5b36c310589b1d9b825fd42a
                       7fd01a56f98de74a8ea4fe2234f48e2318676536
                       7a66e541897090e6d2c5d001d343ad69c6a64171
                       966b0f45e5664c6fa680c1ff13c9de3b1d90f51a
                       48016329fc4647680646ea2dcff5b302fc862068
                       66ae633f04041cab17cb00990b5e981aaf25b7e2
                       6d6a6b4b76afc5a4dce4ab7b664f4e609833a161
                       8690dc8cb3eb6d70561dc60873c30e0b75c86498
                       4070ea19a465781bc0e9893fe461a01a64849fed
                       f86737c7ccd0975f7352d4e33dd8583f7bc9e3da
                       415d03aab0cc7ca3dd5bf1134a67662522f6b2ef
                       b15c17a8d64a70c68af9f5490e139aa7fba35fa5
                       37c5a634
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [49:02:b0:79:7a:5f:6e:e1:60:24:58:ee:4b:ec:9f:04:c8:9a:ab:08],[56:66:d1:a4]
        modulus: 98e8802f07dbada2a4224d1109d3654eefadaeff39797feb66e62e2747abd4c884c95a38c7335dde7668d4acb6d1e743b874767db8f1ad638d2c4618fb096af522d929525b0fcd5b9f010069c1e832f3a6dcea5e44c2428676c374679515e7d4446600b71ea1cf3a19eb8b03eba9f5c65959ab993ace547d5d585ccf44bb821bce0d6883764228f8ef04b874d7c8258e7b19adfb872361fe9ade86d1c360ab0afa3727b52f0da35718f3d23160eb7e89ca74e175c779bd76454603deb3e95b23de1a32199f8411a2195cabf00d9cbcc9a83ea6e52671fc9281abccaafd687b0874f6ca30d9ee1278825aebf4a939d40891270835b24fdb00f406e9ef24093a89
public exponent: 10001

] 
2023-01-14 10:48:27.454  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-14 10:48:27.455 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-14 10:48:27.457 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2023-01-14 10:48:27.457 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-14 10:48:27.458  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2023-01-14 10:48:27.458  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-14 10:48:27.459  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-14 10:48:27.459 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-14 10:48:27.460 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-14 10:48:27.460 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-14 10:48:27.467 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-14 10:48:27.468 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-14 10:48:27.468 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-14 10:48:27.468 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-14 10:48:27.610  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-14 10:48:27.610  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-14 10:48:27.611 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-14 10:48:27.611 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-14 10:48:27.612  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-14 10:48:27.613  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-14 10:48:27.619 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-14 10:48:27.620 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-14 10:48:27.621 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-14 10:48:27.624 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-14 10:48:27.624 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-14 10:48:27.627 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-14 10:48:27.628 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-14 10:48:27.628 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-14 10:48:27.628 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-14 10:48:27.629 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-14 10:48:27.632 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 441944373117423538199248105481427934534251795373
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jan 14 03:14:02 UTC 2023
           Final Date: Thu Jan 13 03:14:01 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [3c:a1:da:91:21:00:ca:31:e4:c2:39:5e:dc:1f:26:0a:bf:7f:66:69],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8d50f25a04ae7b6140bc73e1194df920e3bf578e
                       41e5b4891e55c6aae7445e814418ff80ff3f0848
                       5db6bec98eb921f8c608656943890b21cecfffdf
                       dea0ddc36c34976d9908e57c039b34aea6424e72
                       d1cf75e20ab41ed57c3df3fa064e37b61660c86c
                       eef3fb9516d2decd67224bce42e1862ca54d8177
                       7964ded09a08a61c689d0937c406e8ebceec3f2f
                       64fca28b2c46056a5b36c310589b1d9b825fd42a
                       7fd01a56f98de74a8ea4fe2234f48e2318676536
                       7a66e541897090e6d2c5d001d343ad69c6a64171
                       966b0f45e5664c6fa680c1ff13c9de3b1d90f51a
                       48016329fc4647680646ea2dcff5b302fc862068
                       66ae633f04041cab17cb00990b5e981aaf25b7e2
                       6d6a6b4b76afc5a4dce4ab7b664f4e609833a161
                       8690dc8cb3eb6d70561dc60873c30e0b75c86498
                       4070ea19a465781bc0e9893fe461a01a64849fed
                       f86737c7ccd0975f7352d4e33dd8583f7bc9e3da
                       415d03aab0cc7ca3dd5bf1134a67662522f6b2ef
                       b15c17a8d64a70c68af9f5490e139aa7fba35fa5
                       37c5a634
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [41:f5:93:b2:5f:3e:01:7d:54:fe:b7:07:88:66:05:96:69:62:cb:ac],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-14 10:52:01.927  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-14 10:52:01.928 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-14 10:52:01.930 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-14 10:52:01.930 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-14 10:52:01.930  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-14 10:52:01.931  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-14 10:52:01.931  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-14 10:52:01.932 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-14 10:52:01.932 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-14 10:52:01.932 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-14 10:52:01.937 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-14 10:52:01.937 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-14 10:52:01.938 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-14 10:52:01.938 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-14 10:52:02.079  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-14 10:52:02.079  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-14 10:52:02.080 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-14 10:52:02.080 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-14 10:52:02.081  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-14 10:52:02.082  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-14 10:52:02.082 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-14 10:52:02.083 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-14 10:52:02.083 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-14 10:52:02.084 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-14 10:52:02.084 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-14 10:52:02.085 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-14 10:52:02.085 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-14 10:52:02.086 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-14 10:52:02.086 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-14 10:52:02.087 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-14 10:52:02.090 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 441944373117423538199248105481427934534251795373
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jan 14 03:14:02 UTC 2023
           Final Date: Thu Jan 13 03:14:01 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [3c:a1:da:91:21:00:ca:31:e4:c2:39:5e:dc:1f:26:0a:bf:7f:66:69],[56:66:d1:a4]
        modulus: b3fb861a104f7ad626021e77d5ccc967e0f89b7ab9f1b86ae5261aa1d37b1546b86437abfde4d945ed23d5a36b9751df53beae68abadb6aa480e96d631bd5fafa40cd84ef6bf8e9af5de8c9cb65a79c2e415a4616a0eec5e824706933efe006bafa71e0c607186de99c346eb51e1d9249acb582a719dc7f4ea208be3c314c666918e4e9a98d2f1a60e02de76e83d3b0ab3c47e157a4df5a89de73d025db08e7aef87b40c050e4fd95ae357a781dac47aa598f857a3f72a448bee1af5b2b98d47c6564dcc29b32b13a65a7b9d6b7066b125d85db12b36f582bceca6200f38e6f31219cf06b45831e93c5195fd2165a75561b162ab2579b168aed0f81d91adf4c9fe8b872857911a1fb582f5a735d50bd7e6cfbde8f9ad8cc7338b62334b3d50666f5070f57818dae70054d0b130d93f81ae1b2554088a2200f40fcc4cc45f87f530d62b47242379675f10ed2d41302b10f9f0263ada4b87b4421ba7e88516d86c4aefd584c0802b82fa7a9baa307627cad66480d680b995f419f637b8fc69fc01
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8d50f25a04ae7b6140bc73e1194df920e3bf578e
                       41e5b4891e55c6aae7445e814418ff80ff3f0848
                       5db6bec98eb921f8c608656943890b21cecfffdf
                       dea0ddc36c34976d9908e57c039b34aea6424e72
                       d1cf75e20ab41ed57c3df3fa064e37b61660c86c
                       eef3fb9516d2decd67224bce42e1862ca54d8177
                       7964ded09a08a61c689d0937c406e8ebceec3f2f
                       64fca28b2c46056a5b36c310589b1d9b825fd42a
                       7fd01a56f98de74a8ea4fe2234f48e2318676536
                       7a66e541897090e6d2c5d001d343ad69c6a64171
                       966b0f45e5664c6fa680c1ff13c9de3b1d90f51a
                       48016329fc4647680646ea2dcff5b302fc862068
                       66ae633f04041cab17cb00990b5e981aaf25b7e2
                       6d6a6b4b76afc5a4dce4ab7b664f4e609833a161
                       8690dc8cb3eb6d70561dc60873c30e0b75c86498
                       4070ea19a465781bc0e9893fe461a01a64849fed
                       f86737c7ccd0975f7352d4e33dd8583f7bc9e3da
                       415d03aab0cc7ca3dd5bf1134a67662522f6b2ef
                       b15c17a8d64a70c68af9f5490e139aa7fba35fa5
                       37c5a634
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [32:6e:4c:c6:cd:a3:2c:c1:da:dc:9a:69:63:0a:8d:54:d8:26:39:23],[56:66:d1:a4]
        modulus: c717875d0e11458d437dd368dd230255d756bdc013bef3a92fcbfcdc0e87a61301ef8a6699e9e74403d9a91d4e6f87563f50b71080b2a7633e75c577f7c3aa526ca8ea9858603424ea080a7a34761932f7f0568008a7ba382bf8e7f8d61c2a3839fe75f99c1f29c156be181aa54b6031c27c5547864a5f3b3673f99f62d53b33ce240193db1fc342b35770420af7b6400c2f0d7d61666530b13be40c448c76fda76b50e1d88f380169d81f76aea31132acbbcce6859a661e4b658d3e814898d408a12d75edc1855c4dc6f0c45ec96333d45a63393bf743d384460caa3e9e56ba831631c99de38444ce88e37aaf274f86c3ae8b0a486c381ecc5b4da166e6915b
public exponent: 10001

] 
2023-01-14 10:59:08.437  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-14 10:59:08.441 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-14 10:59:08.444 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-14 10:59:08.445 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-14 10:59:08.446  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-14 10:59:08.446  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-14 10:59:08.447  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-14 10:59:08.447 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-14 10:59:08.448 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-14 10:59:08.448 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-14 10:59:08.453 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-14 10:59:08.454 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-14 10:59:08.454 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-14 10:59:08.455 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-14 10:59:08.578  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-14 10:59:08.579  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-14 10:59:08.579 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-14 10:59:08.580 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-14 10:59:08.581  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-14 10:59:08.582  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-14 10:59:08.582 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-14 10:59:08.582 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-14 10:59:08.583 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-14 10:59:08.584 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-14 10:59:08.584 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-14 10:59:08.585 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-14 10:59:08.586 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-14 10:59:08.586 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-14 10:59:08.587 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-14 10:59:08.587 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-14 10:59:08.591 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 441944373117423538199248105481427934534251795373
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jan 14 03:14:02 UTC 2023
           Final Date: Thu Jan 13 03:14:01 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [3c:a1:da:91:21:00:ca:31:e4:c2:39:5e:dc:1f:26:0a:bf:7f:66:69],[56:66:d1:a4]
        modulus: b3fb861a104f7ad626021e77d5ccc967e0f89b7ab9f1b86ae5261aa1d37b1546b86437abfde4d945ed23d5a36b9751df53beae68abadb6aa480e96d631bd5fafa40cd84ef6bf8e9af5de8c9cb65a79c2e415a4616a0eec5e824706933efe006bafa71e0c607186de99c346eb51e1d9249acb582a719dc7f4ea208be3c314c666918e4e9a98d2f1a60e02de76e83d3b0ab3c47e157a4df5a89de73d025db08e7aef87b40c050e4fd95ae357a781dac47aa598f857a3f72a448bee1af5b2b98d47c6564dcc29b32b13a65a7b9d6b7066b125d85db12b36f582bceca6200f38e6f31219cf06b45831e93c5195fd2165a75561b162ab2579b168aed0f81d91adf4c9fe8b872857911a1fb582f5a735d50bd7e6cfbde8f9ad8cc7338b62334b3d50666f5070f57818dae70054d0b130d93f81ae1b2554088a2200f40fcc4cc45f87f530d62b47242379675f10ed2d41302b10f9f0263ada4b87b4421ba7e88516d86c4aefd584c0802b82fa7a9baa307627cad66480d680b995f419f637b8fc69fc01
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8d50f25a04ae7b6140bc73e1194df920e3bf578e
                       41e5b4891e55c6aae7445e814418ff80ff3f0848
                       5db6bec98eb921f8c608656943890b21cecfffdf
                       dea0ddc36c34976d9908e57c039b34aea6424e72
                       d1cf75e20ab41ed57c3df3fa064e37b61660c86c
                       eef3fb9516d2decd67224bce42e1862ca54d8177
                       7964ded09a08a61c689d0937c406e8ebceec3f2f
                       64fca28b2c46056a5b36c310589b1d9b825fd42a
                       7fd01a56f98de74a8ea4fe2234f48e2318676536
                       7a66e541897090e6d2c5d001d343ad69c6a64171
                       966b0f45e5664c6fa680c1ff13c9de3b1d90f51a
                       48016329fc4647680646ea2dcff5b302fc862068
                       66ae633f04041cab17cb00990b5e981aaf25b7e2
                       6d6a6b4b76afc5a4dce4ab7b664f4e609833a161
                       8690dc8cb3eb6d70561dc60873c30e0b75c86498
                       4070ea19a465781bc0e9893fe461a01a64849fed
                       f86737c7ccd0975f7352d4e33dd8583f7bc9e3da
                       415d03aab0cc7ca3dd5bf1134a67662522f6b2ef
                       b15c17a8d64a70c68af9f5490e139aa7fba35fa5
                       37c5a634
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [8d:60:09:d0:48:be:78:ee:63:16:c0:92:53:9b:48:71:20:91:d0:27],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-14 11:05:19.596  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-14 11:05:19.599 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-14 11:05:19.601 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-14 11:05:19.602 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-14 11:05:19.603  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-14 11:05:19.604  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-14 11:05:19.604  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-14 11:05:19.604 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-14 11:05:19.605 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-14 11:05:19.605 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-14 11:05:19.609 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-14 11:05:19.610 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-14 11:05:19.610 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-14 11:05:19.611 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-14 11:05:19.775  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-14 11:05:19.776  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-14 11:05:19.776 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-14 11:05:19.776 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-14 11:05:19.778  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-14 11:05:19.778  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-14 11:05:19.779 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-14 11:05:19.779 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-14 11:05:19.779 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-14 11:05:19.780 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-14 11:05:19.781 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-14 11:05:19.781 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-14 11:05:19.782 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-14 11:05:19.782 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-14 11:05:19.782 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-14 11:05:19.783 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-14 11:05:19.786 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 441944373117423538199248105481427934534251795373
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jan 14 03:14:02 UTC 2023
           Final Date: Thu Jan 13 03:14:01 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [3c:a1:da:91:21:00:ca:31:e4:c2:39:5e:dc:1f:26:0a:bf:7f:66:69],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8d50f25a04ae7b6140bc73e1194df920e3bf578e
                       41e5b4891e55c6aae7445e814418ff80ff3f0848
                       5db6bec98eb921f8c608656943890b21cecfffdf
                       dea0ddc36c34976d9908e57c039b34aea6424e72
                       d1cf75e20ab41ed57c3df3fa064e37b61660c86c
                       eef3fb9516d2decd67224bce42e1862ca54d8177
                       7964ded09a08a61c689d0937c406e8ebceec3f2f
                       64fca28b2c46056a5b36c310589b1d9b825fd42a
                       7fd01a56f98de74a8ea4fe2234f48e2318676536
                       7a66e541897090e6d2c5d001d343ad69c6a64171
                       966b0f45e5664c6fa680c1ff13c9de3b1d90f51a
                       48016329fc4647680646ea2dcff5b302fc862068
                       66ae633f04041cab17cb00990b5e981aaf25b7e2
                       6d6a6b4b76afc5a4dce4ab7b664f4e609833a161
                       8690dc8cb3eb6d70561dc60873c30e0b75c86498
                       4070ea19a465781bc0e9893fe461a01a64849fed
                       f86737c7ccd0975f7352d4e33dd8583f7bc9e3da
                       415d03aab0cc7ca3dd5bf1134a67662522f6b2ef
                       b15c17a8d64a70c68af9f5490e139aa7fba35fa5
                       37c5a634
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ca:e5:36:16:38:81:cc:05:34:6c:6d:e6:50:52:22:53:8c:76:66:ba],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-14 12:17:18.480  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-14 12:17:18.485 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-14 12:17:18.488 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2023-01-14 12:17:18.489 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-14 12:17:18.490  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2023-01-14 12:17:18.490  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-14 12:17:18.491  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-14 12:17:18.491 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-14 12:17:18.492 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-14 12:17:18.492 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-14 12:17:18.497 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-14 12:17:18.498 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-14 12:17:18.498 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-14 12:17:18.499 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-14 12:17:18.666  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-14 12:17:18.667  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-14 12:17:18.667 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-14 12:17:18.668 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-14 12:17:18.669  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-14 12:17:18.670  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-14 12:17:18.670 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-14 12:17:18.671 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-14 12:17:18.671 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-14 12:17:18.672 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-14 12:17:18.672 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-14 12:17:18.673 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-14 12:17:18.674 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-14 12:17:18.674 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-14 12:17:18.674 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-14 12:17:18.675 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-14 12:17:18.679 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 441944373117423538199248105481427934534251795373
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jan 14 03:14:02 UTC 2023
           Final Date: Thu Jan 13 03:14:01 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [3c:a1:da:91:21:00:ca:31:e4:c2:39:5e:dc:1f:26:0a:bf:7f:66:69],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8d50f25a04ae7b6140bc73e1194df920e3bf578e
                       41e5b4891e55c6aae7445e814418ff80ff3f0848
                       5db6bec98eb921f8c608656943890b21cecfffdf
                       dea0ddc36c34976d9908e57c039b34aea6424e72
                       d1cf75e20ab41ed57c3df3fa064e37b61660c86c
                       eef3fb9516d2decd67224bce42e1862ca54d8177
                       7964ded09a08a61c689d0937c406e8ebceec3f2f
                       64fca28b2c46056a5b36c310589b1d9b825fd42a
                       7fd01a56f98de74a8ea4fe2234f48e2318676536
                       7a66e541897090e6d2c5d001d343ad69c6a64171
                       966b0f45e5664c6fa680c1ff13c9de3b1d90f51a
                       48016329fc4647680646ea2dcff5b302fc862068
                       66ae633f04041cab17cb00990b5e981aaf25b7e2
                       6d6a6b4b76afc5a4dce4ab7b664f4e609833a161
                       8690dc8cb3eb6d70561dc60873c30e0b75c86498
                       4070ea19a465781bc0e9893fe461a01a64849fed
                       f86737c7ccd0975f7352d4e33dd8583f7bc9e3da
                       415d03aab0cc7ca3dd5bf1134a67662522f6b2ef
                       b15c17a8d64a70c68af9f5490e139aa7fba35fa5
                       37c5a634
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [9a:a5:dc:8e:a4:9e:f4:15:87:cc:2e:d3:6e:f6:96:fa:7a:34:97:f4],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-14 12:36:23.479  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-14 12:36:23.482 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-14 12:36:23.484 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2023-01-14 12:36:23.485 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-14 12:36:23.485  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2023-01-14 12:36:23.486  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-14 12:36:23.486  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-14 12:36:23.487 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-14 12:36:23.487 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-14 12:36:23.487 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-14 12:36:23.492 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-14 12:36:23.493 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-14 12:36:23.493 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-14 12:36:23.494 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-14 12:36:23.669  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-14 12:36:23.670  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-14 12:36:23.670 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-14 12:36:23.671 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-14 12:36:23.672  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-14 12:36:23.673  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-14 12:36:23.673 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-14 12:36:23.674 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-14 12:36:23.674 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-14 12:36:23.675 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-14 12:36:23.675 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-14 12:36:23.676 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-14 12:36:23.676 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-14 12:36:23.677 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-14 12:36:23.677 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-14 12:36:23.678 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-14 12:36:23.681 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 441944373117423538199248105481427934534251795373
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jan 14 03:14:02 UTC 2023
           Final Date: Thu Jan 13 03:14:01 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [3c:a1:da:91:21:00:ca:31:e4:c2:39:5e:dc:1f:26:0a:bf:7f:66:69],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8d50f25a04ae7b6140bc73e1194df920e3bf578e
                       41e5b4891e55c6aae7445e814418ff80ff3f0848
                       5db6bec98eb921f8c608656943890b21cecfffdf
                       dea0ddc36c34976d9908e57c039b34aea6424e72
                       d1cf75e20ab41ed57c3df3fa064e37b61660c86c
                       eef3fb9516d2decd67224bce42e1862ca54d8177
                       7964ded09a08a61c689d0937c406e8ebceec3f2f
                       64fca28b2c46056a5b36c310589b1d9b825fd42a
                       7fd01a56f98de74a8ea4fe2234f48e2318676536
                       7a66e541897090e6d2c5d001d343ad69c6a64171
                       966b0f45e5664c6fa680c1ff13c9de3b1d90f51a
                       48016329fc4647680646ea2dcff5b302fc862068
                       66ae633f04041cab17cb00990b5e981aaf25b7e2
                       6d6a6b4b76afc5a4dce4ab7b664f4e609833a161
                       8690dc8cb3eb6d70561dc60873c30e0b75c86498
                       4070ea19a465781bc0e9893fe461a01a64849fed
                       f86737c7ccd0975f7352d4e33dd8583f7bc9e3da
                       415d03aab0cc7ca3dd5bf1134a67662522f6b2ef
                       b15c17a8d64a70c68af9f5490e139aa7fba35fa5
                       37c5a634
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [35:2f:87:b9:c7:4f:85:6f:d2:69:4f:a3:e1:fa:c6:10:9e:c1:d4:80],[56:66:d1:a4]
        modulus: b78baca4fd233db4490a728c5804807b9e2816e57aea339bcae109e5a55e0933df54ceaefa1aecf3a87f38f7881656883c77b7a43ca8c9f8a2fbce82ec0c14611afb714758873e3e783b6628b139b7571e24e07911f632080650cb3da2f04959140b227ab7e5697328476c95f9b2a1257f6d66b292d036accb423acf25b7f44b766f08002c441031be128cca2ec86c7bbfe489a0ef6ea95369399132581f188f2ce85592c566d9ac571e5ccecc1860bb5cab4d8b80152e6517652e05419fb8ad8855d9175d55cc2f5b300c580425c9bb28954a79b5dffe81b9da7e7ea408cf265eaaa1b6f22d18dfad5d4c54d26418fc0c5d50315e3a0b5d5f26c8ce2a78d49b
public exponent: 10001

] 
2023-01-14 12:36:42.922  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-14 12:36:42.924 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-14 12:36:42.928 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2023-01-14 12:36:42.928 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-14 12:36:42.929  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2023-01-14 12:36:42.930  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-14 12:36:42.930  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-14 12:36:42.930 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-14 12:36:42.931 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-14 12:36:42.933 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-14 12:36:42.937 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-14 12:36:42.937 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-14 12:36:42.937 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-14 12:36:42.938 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-14 12:36:43.044  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-14 12:36:43.046  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-14 12:36:43.047 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-14 12:36:43.047 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-14 12:36:43.068  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-14 12:36:43.068  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-14 12:36:43.069 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-14 12:36:43.069 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-14 12:36:43.070 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-14 12:36:43.071 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-14 12:36:43.071 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-14 12:36:43.072 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-14 12:36:43.077 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-14 12:36:43.077 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-14 12:36:43.078 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-14 12:36:43.079 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-14 12:36:43.084 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 441944373117423538199248105481427934534251795373
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jan 14 03:14:02 UTC 2023
           Final Date: Thu Jan 13 03:14:01 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [3c:a1:da:91:21:00:ca:31:e4:c2:39:5e:dc:1f:26:0a:bf:7f:66:69],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8d50f25a04ae7b6140bc73e1194df920e3bf578e
                       41e5b4891e55c6aae7445e814418ff80ff3f0848
                       5db6bec98eb921f8c608656943890b21cecfffdf
                       dea0ddc36c34976d9908e57c039b34aea6424e72
                       d1cf75e20ab41ed57c3df3fa064e37b61660c86c
                       eef3fb9516d2decd67224bce42e1862ca54d8177
                       7964ded09a08a61c689d0937c406e8ebceec3f2f
                       64fca28b2c46056a5b36c310589b1d9b825fd42a
                       7fd01a56f98de74a8ea4fe2234f48e2318676536
                       7a66e541897090e6d2c5d001d343ad69c6a64171
                       966b0f45e5664c6fa680c1ff13c9de3b1d90f51a
                       48016329fc4647680646ea2dcff5b302fc862068
                       66ae633f04041cab17cb00990b5e981aaf25b7e2
                       6d6a6b4b76afc5a4dce4ab7b664f4e609833a161
                       8690dc8cb3eb6d70561dc60873c30e0b75c86498
                       4070ea19a465781bc0e9893fe461a01a64849fed
                       f86737c7ccd0975f7352d4e33dd8583f7bc9e3da
                       415d03aab0cc7ca3dd5bf1134a67662522f6b2ef
                       b15c17a8d64a70c68af9f5490e139aa7fba35fa5
                       37c5a634
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [4f:96:0b:8e:4f:b0:65:51:40:94:b1:e5:1a:24:f1:60:b8:97:28:17],[56:66:d1:a4]
        modulus: aabdb6061ddafe710be312dba2affaee225cc7b11bbb715db7d44ddc4c6905174c3a87050b21273e8ed346b80d62ce009442e1a2801aff7383579fd15a3a5f561d7f6a58f4f7e2327cc6cdbecbd1407b2f1d8444519daa0fcd792fa2cd1b7ccabe1dfe2adf5352eaff6a9e2d89807fc1e6e654a4a3e0445c9537ecabad51e401b143d30ec9f4875c717ac3b2f76a61732115d73e2849598409f912f367c9f80987d78e8fa836f6a9d19f0bed21cf2fbbc9ec4b4db29deba732af7f5d79737c712d9ef75fa3b2385eaf440d2076a678e5372623f7c4d183f4c19cf4c9ebc1b4c9f08d9fe568026e7055c3fc58fad2ebf136e149691a1048d3d9df8ec936e84953
public exponent: 10001

] 
2023-01-14 13:07:04.569  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-14 13:07:04.574 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-14 13:07:04.578 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2023-01-14 13:07:04.580 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-14 13:07:04.581  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2023-01-14 13:07:04.582  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-14 13:07:04.583  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-14 13:07:04.583 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-14 13:07:04.584 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-14 13:07:04.585 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-14 13:07:04.592 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-14 13:07:04.594 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-14 13:07:04.595 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-14 13:07:04.596 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-14 13:07:04.763  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-14 13:07:04.764  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-14 13:07:04.764 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-14 13:07:04.764 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-14 13:07:04.766  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-14 13:07:04.766  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-14 13:07:04.767 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-14 13:07:04.767 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-14 13:07:04.767 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-14 13:07:04.768 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-14 13:07:04.768 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-14 13:07:04.769 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-14 13:07:04.769 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-14 13:07:04.770 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-14 13:07:04.770 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-14 13:07:04.771 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-14 13:07:04.775 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 441944373117423538199248105481427934534251795373
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jan 14 03:14:02 UTC 2023
           Final Date: Thu Jan 13 03:14:01 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [3c:a1:da:91:21:00:ca:31:e4:c2:39:5e:dc:1f:26:0a:bf:7f:66:69],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8d50f25a04ae7b6140bc73e1194df920e3bf578e
                       41e5b4891e55c6aae7445e814418ff80ff3f0848
                       5db6bec98eb921f8c608656943890b21cecfffdf
                       dea0ddc36c34976d9908e57c039b34aea6424e72
                       d1cf75e20ab41ed57c3df3fa064e37b61660c86c
                       eef3fb9516d2decd67224bce42e1862ca54d8177
                       7964ded09a08a61c689d0937c406e8ebceec3f2f
                       64fca28b2c46056a5b36c310589b1d9b825fd42a
                       7fd01a56f98de74a8ea4fe2234f48e2318676536
                       7a66e541897090e6d2c5d001d343ad69c6a64171
                       966b0f45e5664c6fa680c1ff13c9de3b1d90f51a
                       48016329fc4647680646ea2dcff5b302fc862068
                       66ae633f04041cab17cb00990b5e981aaf25b7e2
                       6d6a6b4b76afc5a4dce4ab7b664f4e609833a161
                       8690dc8cb3eb6d70561dc60873c30e0b75c86498
                       4070ea19a465781bc0e9893fe461a01a64849fed
                       f86737c7ccd0975f7352d4e33dd8583f7bc9e3da
                       415d03aab0cc7ca3dd5bf1134a67662522f6b2ef
                       b15c17a8d64a70c68af9f5490e139aa7fba35fa5
                       37c5a634
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [59:35:2b:97:ee:1c:51:b1:6d:67:07:54:2a:90:bb:8c:d5:12:da:bb],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-14 13:07:10.778  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-14 13:07:10.779 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-14 13:07:10.780 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2023-01-14 13:07:10.781 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-14 13:07:10.781  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2023-01-14 13:07:10.782  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-14 13:07:10.782  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-14 13:07:10.783 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-14 13:07:10.783 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-14 13:07:10.783 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-14 13:07:10.788 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-14 13:07:10.789 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-14 13:07:10.789 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-14 13:07:10.790 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-14 13:07:10.881  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-14 13:07:10.881  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-14 13:07:10.882 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-14 13:07:10.882 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-14 13:07:10.883  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-14 13:07:10.883  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-14 13:07:10.884 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-14 13:07:10.884 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-14 13:07:10.884 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-14 13:07:10.885 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-14 13:07:10.885 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-14 13:07:10.886 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-14 13:07:10.886 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-14 13:07:10.887 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-14 13:07:10.887 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-14 13:07:10.888 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-14 13:07:10.892 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 441944373117423538199248105481427934534251795373
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jan 14 03:14:02 UTC 2023
           Final Date: Thu Jan 13 03:14:01 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [3c:a1:da:91:21:00:ca:31:e4:c2:39:5e:dc:1f:26:0a:bf:7f:66:69],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8d50f25a04ae7b6140bc73e1194df920e3bf578e
                       41e5b4891e55c6aae7445e814418ff80ff3f0848
                       5db6bec98eb921f8c608656943890b21cecfffdf
                       dea0ddc36c34976d9908e57c039b34aea6424e72
                       d1cf75e20ab41ed57c3df3fa064e37b61660c86c
                       eef3fb9516d2decd67224bce42e1862ca54d8177
                       7964ded09a08a61c689d0937c406e8ebceec3f2f
                       64fca28b2c46056a5b36c310589b1d9b825fd42a
                       7fd01a56f98de74a8ea4fe2234f48e2318676536
                       7a66e541897090e6d2c5d001d343ad69c6a64171
                       966b0f45e5664c6fa680c1ff13c9de3b1d90f51a
                       48016329fc4647680646ea2dcff5b302fc862068
                       66ae633f04041cab17cb00990b5e981aaf25b7e2
                       6d6a6b4b76afc5a4dce4ab7b664f4e609833a161
                       8690dc8cb3eb6d70561dc60873c30e0b75c86498
                       4070ea19a465781bc0e9893fe461a01a64849fed
                       f86737c7ccd0975f7352d4e33dd8583f7bc9e3da
                       415d03aab0cc7ca3dd5bf1134a67662522f6b2ef
                       b15c17a8d64a70c68af9f5490e139aa7fba35fa5
                       37c5a634
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [b0:f3:dc:37:a2:10:48:80:25:f9:21:1f:c8:22:de:12:96:70:88:de],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

]