Results

By type

          2023-01-10 05:10:46,132 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2023-01-10 05:10:47,788 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2023-01-10 05:10:48.771  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Jan 10, 2023 5:10:51 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Jan 10, 2023 5:10:51 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Jan 10, 2023 5:10:51 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Jan 10, 2023 5:10:51 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2023-01-10 05:10:52.023 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2023-01-10 05:10:52.386  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2023-01-10 05:10:52.617  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2023-01-10 05:10:53.559 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2023-01-10 05:10:53.564 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
2023-01-10 05:10:53.566 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2023-01-10 05:10:53.571 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2023-01-10 05:10:53.626 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2023-01-10 05:10:53.630 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
	{GET [/docs]}: redirectToUi(HttpServletRequest)
2023-01-10 05:10:53.776 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2023-01-10 05:10:54.736 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Jan 10, 2023 5:10:55 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2023-01-10 05:10:56.023  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 11.308 seconds (JVM running for 13.563)
Jan 10, 2023 5:11:16 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2023-01-10 05:12:00.755  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-10 05:12:00.764 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-10 05:12:00.851 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2023-01-10 05:12:00.858 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-10 05:12:00.880  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2023-01-10 05:12:00.883  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-10 05:12:00.884  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-10 05:12:00.886 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-10 05:12:00.886 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-10 05:12:00.891 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-10 05:12:00.908 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-10 05:12:00.913 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-10 05:12:00.980 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-10 05:12:00.989 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-10 05:12:00.989 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-10 05:12:00.994 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-10 05:12:01.599  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-10 05:12:01.602  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-10 05:12:01.602 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-10 05:12:01.604 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-10 05:12:01.617  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-10 05:12:01.618  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-10 05:12:01.620 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-10 05:12:01.621 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-10 05:12:01.621 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-10 05:12:01.641 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-10 05:12:01.642 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-10 05:12:01.642 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-10 05:12:01.648 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-10 05:12:01.649 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-10 05:12:01.649 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-10 05:12:01.651 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-10 05:12:01.689 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 342204781540032095122627348491004786383382212838
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jan 10 05:08:30 UTC 2023
           Final Date: Sun Jan 09 05:08:29 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [5e:d1:e6:01:3f:8a:29:1c:5b:5d:98:de:28:9e:5f:30:a8:90:88:0d],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 38c64bfe75784804d62ddcdc933e24d448ca5e17
                       74b18b9123cbf51cc1d65ccce11fd063ed4b2820
                       beb2aeb7574521c1a79ca5bf0a1b1d8910b2e3eb
                       bbf1cb4d396b543332a462647d84e8eea6e66a5a
                       9336142a9bdd352601a652f4defbf1cd4cac6735
                       4acb8670ba8dfef216a0dcd5ab808ff70f988271
                       78768612d51f42262a67ab269180ee69d902ecca
                       38bfa4023d821602e9736247fbbc7ce74f620775
                       3891f8f83e5c4d75cd41d9ce387e84779e065f09
                       57f2197d09549ecbe47d83fa8eb6e423f999eddd
                       7f44169a782856ccbfc5a47b63423aaadb4a7d78
                       fd0d620b5e37a039338fb1bbc3b187ae2d720f8f
                       5b678d98c9003c634cbda3e01466347d8b42e8f1
                       ac0b443e2eb8b0378f1d2ebf69cd427161da5968
                       72ec4f66b4522b81ba68d0de00c63d3ef562fe29
                       79076af97b3be3051ec02d4c77e0428956c21a26
                       db2b545fd9f5112732e5bbafa6ac365287ec4c9e
                       356e6f207e7dd9dd39b0dff467be1f54a4c55e46
                       6cf2df1c9c53047e90e44de64b89c6fee74a25cd
                       a1f16ff2
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [30:29:09:23:00:f1:83:2f:e2:f8:04:8d:d7:a8:74:89:6c:21:31:2b],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-10 06:54:42.624  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-10 06:54:42.629 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-10 06:54:42.640 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-10 06:54:42.641 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-10 06:54:42.642  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-10 06:54:42.643  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-10 06:54:42.644  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-10 06:54:42.644 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-10 06:54:42.645 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-10 06:54:42.645 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-10 06:54:42.650 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-10 06:54:42.652 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-10 06:54:42.653 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-10 06:54:42.653 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-10 06:54:42.925  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-10 06:54:42.928  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-10 06:54:42.928 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-10 06:54:42.928 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-10 06:54:42.931  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-10 06:54:42.931  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-10 06:54:42.932 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-10 06:54:42.932 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-10 06:54:42.932 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-10 06:54:42.933 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-10 06:54:42.934 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-10 06:54:42.934 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-10 06:54:42.935 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-10 06:54:42.935 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-10 06:54:42.936 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-10 06:54:42.937 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-10 06:54:42.942 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 342204781540032095122627348491004786383382212838
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jan 10 05:08:30 UTC 2023
           Final Date: Sun Jan 09 05:08:29 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [5e:d1:e6:01:3f:8a:29:1c:5b:5d:98:de:28:9e:5f:30:a8:90:88:0d],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 38c64bfe75784804d62ddcdc933e24d448ca5e17
                       74b18b9123cbf51cc1d65ccce11fd063ed4b2820
                       beb2aeb7574521c1a79ca5bf0a1b1d8910b2e3eb
                       bbf1cb4d396b543332a462647d84e8eea6e66a5a
                       9336142a9bdd352601a652f4defbf1cd4cac6735
                       4acb8670ba8dfef216a0dcd5ab808ff70f988271
                       78768612d51f42262a67ab269180ee69d902ecca
                       38bfa4023d821602e9736247fbbc7ce74f620775
                       3891f8f83e5c4d75cd41d9ce387e84779e065f09
                       57f2197d09549ecbe47d83fa8eb6e423f999eddd
                       7f44169a782856ccbfc5a47b63423aaadb4a7d78
                       fd0d620b5e37a039338fb1bbc3b187ae2d720f8f
                       5b678d98c9003c634cbda3e01466347d8b42e8f1
                       ac0b443e2eb8b0378f1d2ebf69cd427161da5968
                       72ec4f66b4522b81ba68d0de00c63d3ef562fe29
                       79076af97b3be3051ec02d4c77e0428956c21a26
                       db2b545fd9f5112732e5bbafa6ac365287ec4c9e
                       356e6f207e7dd9dd39b0dff467be1f54a4c55e46
                       6cf2df1c9c53047e90e44de64b89c6fee74a25cd
                       a1f16ff2
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [9f:7e:56:7e:96:cd:b2:fb:00:e2:8d:37:08:45:10:2f:f4:24:f3:01],[56:66:d1:a4]
        modulus: b4557031d9562a90193f26df15840c0c480476f65852d883ac98c1f484b62daa3a283f688059ce66a4903ca366703bbe29183845e2a611d8ff13a9a9a45ab68d57aad95043ca81a3e464ad98a0489619e1eca08fba8bda1367fedc62b7ff96a7867be19055facc50b9212bd1a3011ba9d53eaa6cddc2cbe86dcbdaf3939c9a93ffe6382ba5f7ebad7bf96d797759557fd83d14cf599db323e9523c1eb4ef44e671b96fe71a3fb7da8f5ca01550ab7a2f43be18d7ede8596493bc4a98ad6a5dba7d845bab55fecf0c3b317c7ad684bdb52ef4bbefe3a0cdadb72f2120c126697c6e2cb70ed62b9eb27cfe380a9de625cf68cd471d08deac57468f9d131a15b5c7
public exponent: 10001

] 
2023-01-10 06:56:30.662  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-10 06:56:30.666 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-10 06:56:30.670 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2023-01-10 06:56:30.672 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-10 06:56:30.673  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2023-01-10 06:56:30.674  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-10 06:56:30.675  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-10 06:56:30.676 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-10 06:56:30.676 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-10 06:56:30.678 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-10 06:56:30.685 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-10 06:56:30.686 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-10 06:56:30.686 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-10 06:56:30.687 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-10 06:56:30.966  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-10 06:56:30.967  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-10 06:56:30.974 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-10 06:56:30.975 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-10 06:56:30.979  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-10 06:56:30.980  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-10 06:56:30.980 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-10 06:56:30.981 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-10 06:56:30.987 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-10 06:56:30.989 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-10 06:56:30.989 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-10 06:56:30.990 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-10 06:56:30.991 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-10 06:56:30.991 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-10 06:56:30.992 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-10 06:56:30.994 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-10 06:56:30.999 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 342204781540032095122627348491004786383382212838
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jan 10 05:08:30 UTC 2023
           Final Date: Sun Jan 09 05:08:29 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [5e:d1:e6:01:3f:8a:29:1c:5b:5d:98:de:28:9e:5f:30:a8:90:88:0d],[56:66:d1:a4]
        modulus: a7fd850ef83dcfecdd950ccc2ffed0bff23621dfabfc682ca95ba8ef0dbd6b15e5411c99379945e96c8539eaaafdddd9dd0f6cc905309d8eb9b18ffda441d8d7f2e2a71727e8bafd8226737c578c75be679f7ee124891ca07015c9494278f7c6256895abe75ff52b766eddc862ea91360b9c78955018974231aa58223cb046887768f1ddb426b80986f99ea953bdbd7e00d2193f6d615dd1530a28ac70e129748b45b1438045bb2376b6e2650f4cbbd43d0ace0121b789b319f1408f6a82b269fe4c052a6938b23f259543a93a56e52f2733b829cf14f4642d06aec208355cbb50e7695cf234e960a2743db962164afe10fc0441b621aa8c1f149776d489e58e008a1d52b6ae231683481eac9d4f8128e99554efcf1d49e1009b0e5b75f96cf4063791542c3f649dc8d0528fbf65b8818b4b75bc0deccc9eae860d5cf31e38e66d2a8fc9279e7343b3dffd8ed853871b0e3a3288c3766d62d080ace1c85fed66912b2d5be94a1d93d70931d10c5e72d4461e4954eb3275d613efb49241b66d37
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 38c64bfe75784804d62ddcdc933e24d448ca5e17
                       74b18b9123cbf51cc1d65ccce11fd063ed4b2820
                       beb2aeb7574521c1a79ca5bf0a1b1d8910b2e3eb
                       bbf1cb4d396b543332a462647d84e8eea6e66a5a
                       9336142a9bdd352601a652f4defbf1cd4cac6735
                       4acb8670ba8dfef216a0dcd5ab808ff70f988271
                       78768612d51f42262a67ab269180ee69d902ecca
                       38bfa4023d821602e9736247fbbc7ce74f620775
                       3891f8f83e5c4d75cd41d9ce387e84779e065f09
                       57f2197d09549ecbe47d83fa8eb6e423f999eddd
                       7f44169a782856ccbfc5a47b63423aaadb4a7d78
                       fd0d620b5e37a039338fb1bbc3b187ae2d720f8f
                       5b678d98c9003c634cbda3e01466347d8b42e8f1
                       ac0b443e2eb8b0378f1d2ebf69cd427161da5968
                       72ec4f66b4522b81ba68d0de00c63d3ef562fe29
                       79076af97b3be3051ec02d4c77e0428956c21a26
                       db2b545fd9f5112732e5bbafa6ac365287ec4c9e
                       356e6f207e7dd9dd39b0dff467be1f54a4c55e46
                       6cf2df1c9c53047e90e44de64b89c6fee74a25cd
                       a1f16ff2
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [67:d3:be:bd:19:21:bb:0c:d8:f5:00:65:85:0a:87:02:47:e6:2d:51],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-10 06:58:41.378  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-10 06:58:41.380 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-10 06:58:41.387 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2023-01-10 06:58:41.388 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-10 06:58:41.389  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2023-01-10 06:58:41.412  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-10 06:58:41.412  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-10 06:58:41.412 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-10 06:58:41.416 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-10 06:58:41.417 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-10 06:58:41.422 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-10 06:58:41.423 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-10 06:58:41.424 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-10 06:58:41.424 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-10 06:58:41.636  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-10 06:58:41.637  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-10 06:58:41.637 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-10 06:58:41.638 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-10 06:58:41.640  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-10 06:58:41.641  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-10 06:58:41.641 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-10 06:58:41.642 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-10 06:58:41.643 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-10 06:58:41.644 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-10 06:58:41.644 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-10 06:58:41.644 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-10 06:58:41.645 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-10 06:58:41.645 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-10 06:58:41.646 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-10 06:58:41.646 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-10 06:58:41.652 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 342204781540032095122627348491004786383382212838
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jan 10 05:08:30 UTC 2023
           Final Date: Sun Jan 09 05:08:29 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [5e:d1:e6:01:3f:8a:29:1c:5b:5d:98:de:28:9e:5f:30:a8:90:88:0d],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 38c64bfe75784804d62ddcdc933e24d448ca5e17
                       74b18b9123cbf51cc1d65ccce11fd063ed4b2820
                       beb2aeb7574521c1a79ca5bf0a1b1d8910b2e3eb
                       bbf1cb4d396b543332a462647d84e8eea6e66a5a
                       9336142a9bdd352601a652f4defbf1cd4cac6735
                       4acb8670ba8dfef216a0dcd5ab808ff70f988271
                       78768612d51f42262a67ab269180ee69d902ecca
                       38bfa4023d821602e9736247fbbc7ce74f620775
                       3891f8f83e5c4d75cd41d9ce387e84779e065f09
                       57f2197d09549ecbe47d83fa8eb6e423f999eddd
                       7f44169a782856ccbfc5a47b63423aaadb4a7d78
                       fd0d620b5e37a039338fb1bbc3b187ae2d720f8f
                       5b678d98c9003c634cbda3e01466347d8b42e8f1
                       ac0b443e2eb8b0378f1d2ebf69cd427161da5968
                       72ec4f66b4522b81ba68d0de00c63d3ef562fe29
                       79076af97b3be3051ec02d4c77e0428956c21a26
                       db2b545fd9f5112732e5bbafa6ac365287ec4c9e
                       356e6f207e7dd9dd39b0dff467be1f54a4c55e46
                       6cf2df1c9c53047e90e44de64b89c6fee74a25cd
                       a1f16ff2
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [3b:80:9b:eb:09:a9:ec:63:bf:f5:26:1b:f6:2d:58:c6:db:1b:99:d2],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-10 07:01:29.614  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-10 07:01:29.616 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-10 07:01:29.618 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-10 07:01:29.618 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-10 07:01:29.619  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-10 07:01:29.619  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-10 07:01:29.620  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-10 07:01:29.620 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-10 07:01:29.621 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-10 07:01:29.621 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-10 07:01:29.625 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-10 07:01:29.626 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-10 07:01:29.626 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-10 07:01:29.627 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-10 07:01:29.741  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-10 07:01:29.742  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-10 07:01:29.743 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-10 07:01:29.743 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-10 07:01:29.745  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-10 07:01:29.746  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-10 07:01:29.746 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-10 07:01:29.747 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-10 07:01:29.747 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-10 07:01:29.748 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-10 07:01:29.748 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-10 07:01:29.749 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-10 07:01:29.750 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-10 07:01:29.750 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-10 07:01:29.750 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-10 07:01:29.751 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-10 07:01:29.754 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 342204781540032095122627348491004786383382212838
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jan 10 05:08:30 UTC 2023
           Final Date: Sun Jan 09 05:08:29 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [5e:d1:e6:01:3f:8a:29:1c:5b:5d:98:de:28:9e:5f:30:a8:90:88:0d],[56:66:d1:a4]
        modulus: a7fd850ef83dcfecdd950ccc2ffed0bff23621dfabfc682ca95ba8ef0dbd6b15e5411c99379945e96c8539eaaafdddd9dd0f6cc905309d8eb9b18ffda441d8d7f2e2a71727e8bafd8226737c578c75be679f7ee124891ca07015c9494278f7c6256895abe75ff52b766eddc862ea91360b9c78955018974231aa58223cb046887768f1ddb426b80986f99ea953bdbd7e00d2193f6d615dd1530a28ac70e129748b45b1438045bb2376b6e2650f4cbbd43d0ace0121b789b319f1408f6a82b269fe4c052a6938b23f259543a93a56e52f2733b829cf14f4642d06aec208355cbb50e7695cf234e960a2743db962164afe10fc0441b621aa8c1f149776d489e58e008a1d52b6ae231683481eac9d4f8128e99554efcf1d49e1009b0e5b75f96cf4063791542c3f649dc8d0528fbf65b8818b4b75bc0deccc9eae860d5cf31e38e66d2a8fc9279e7343b3dffd8ed853871b0e3a3288c3766d62d080ace1c85fed66912b2d5be94a1d93d70931d10c5e72d4461e4954eb3275d613efb49241b66d37
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 38c64bfe75784804d62ddcdc933e24d448ca5e17
                       74b18b9123cbf51cc1d65ccce11fd063ed4b2820
                       beb2aeb7574521c1a79ca5bf0a1b1d8910b2e3eb
                       bbf1cb4d396b543332a462647d84e8eea6e66a5a
                       9336142a9bdd352601a652f4defbf1cd4cac6735
                       4acb8670ba8dfef216a0dcd5ab808ff70f988271
                       78768612d51f42262a67ab269180ee69d902ecca
                       38bfa4023d821602e9736247fbbc7ce74f620775
                       3891f8f83e5c4d75cd41d9ce387e84779e065f09
                       57f2197d09549ecbe47d83fa8eb6e423f999eddd
                       7f44169a782856ccbfc5a47b63423aaadb4a7d78
                       fd0d620b5e37a039338fb1bbc3b187ae2d720f8f
                       5b678d98c9003c634cbda3e01466347d8b42e8f1
                       ac0b443e2eb8b0378f1d2ebf69cd427161da5968
                       72ec4f66b4522b81ba68d0de00c63d3ef562fe29
                       79076af97b3be3051ec02d4c77e0428956c21a26
                       db2b545fd9f5112732e5bbafa6ac365287ec4c9e
                       356e6f207e7dd9dd39b0dff467be1f54a4c55e46
                       6cf2df1c9c53047e90e44de64b89c6fee74a25cd
                       a1f16ff2
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [49:ab:56:88:db:ac:55:06:83:6b:4f:91:6b:ce:0d:81:28:70:b4:e0],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-10 07:08:50.117  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-10 07:08:50.119 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-10 07:08:50.122 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-10 07:08:50.123 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-10 07:08:50.124  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-10 07:08:50.124  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-10 07:08:50.125  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-10 07:08:50.125 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-10 07:08:50.125 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-10 07:08:50.126 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-10 07:08:50.133 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-10 07:08:50.134 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-10 07:08:50.135 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-10 07:08:50.135 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-10 07:08:50.318  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-10 07:08:50.319  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-10 07:08:50.321 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-10 07:08:50.321 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-10 07:08:50.324  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-10 07:08:50.325  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-10 07:08:50.326 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-10 07:08:50.327 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-10 07:08:50.328 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-10 07:08:50.329 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-10 07:08:50.330 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-10 07:08:50.331 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-10 07:08:50.332 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-10 07:08:50.333 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-10 07:08:50.333 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-10 07:08:50.335 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-10 07:08:50.338 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 342204781540032095122627348491004786383382212838
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jan 10 05:08:30 UTC 2023
           Final Date: Sun Jan 09 05:08:29 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [5e:d1:e6:01:3f:8a:29:1c:5b:5d:98:de:28:9e:5f:30:a8:90:88:0d],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 38c64bfe75784804d62ddcdc933e24d448ca5e17
                       74b18b9123cbf51cc1d65ccce11fd063ed4b2820
                       beb2aeb7574521c1a79ca5bf0a1b1d8910b2e3eb
                       bbf1cb4d396b543332a462647d84e8eea6e66a5a
                       9336142a9bdd352601a652f4defbf1cd4cac6735
                       4acb8670ba8dfef216a0dcd5ab808ff70f988271
                       78768612d51f42262a67ab269180ee69d902ecca
                       38bfa4023d821602e9736247fbbc7ce74f620775
                       3891f8f83e5c4d75cd41d9ce387e84779e065f09
                       57f2197d09549ecbe47d83fa8eb6e423f999eddd
                       7f44169a782856ccbfc5a47b63423aaadb4a7d78
                       fd0d620b5e37a039338fb1bbc3b187ae2d720f8f
                       5b678d98c9003c634cbda3e01466347d8b42e8f1
                       ac0b443e2eb8b0378f1d2ebf69cd427161da5968
                       72ec4f66b4522b81ba68d0de00c63d3ef562fe29
                       79076af97b3be3051ec02d4c77e0428956c21a26
                       db2b545fd9f5112732e5bbafa6ac365287ec4c9e
                       356e6f207e7dd9dd39b0dff467be1f54a4c55e46
                       6cf2df1c9c53047e90e44de64b89c6fee74a25cd
                       a1f16ff2
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [35:ef:b3:36:f6:9e:44:cc:90:2d:73:80:47:2e:dd:c3:ca:56:b3:27],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-10 07:14:51.813  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-10 07:14:51.816 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-10 07:14:51.819 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-10 07:14:51.820 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-10 07:14:51.821  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-10 07:14:51.821  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-10 07:14:51.822  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-10 07:14:51.822 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-10 07:14:51.822 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-10 07:14:51.823 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-10 07:14:51.827 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-10 07:14:51.828 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-10 07:14:51.829 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-10 07:14:51.829 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-10 07:14:51.984  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-10 07:14:51.985  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-10 07:14:51.986 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-10 07:14:51.986 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-10 07:14:51.989  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-10 07:14:51.989  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-10 07:14:51.990 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-10 07:14:51.990 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-10 07:14:51.991 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-10 07:14:51.992 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-10 07:14:51.993 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-10 07:14:51.993 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-10 07:14:51.995 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-10 07:14:51.996 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-10 07:14:51.996 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-10 07:14:51.997 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-10 07:14:52.000 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 342204781540032095122627348491004786383382212838
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jan 10 05:08:30 UTC 2023
           Final Date: Sun Jan 09 05:08:29 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [5e:d1:e6:01:3f:8a:29:1c:5b:5d:98:de:28:9e:5f:30:a8:90:88:0d],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 38c64bfe75784804d62ddcdc933e24d448ca5e17
                       74b18b9123cbf51cc1d65ccce11fd063ed4b2820
                       beb2aeb7574521c1a79ca5bf0a1b1d8910b2e3eb
                       bbf1cb4d396b543332a462647d84e8eea6e66a5a
                       9336142a9bdd352601a652f4defbf1cd4cac6735
                       4acb8670ba8dfef216a0dcd5ab808ff70f988271
                       78768612d51f42262a67ab269180ee69d902ecca
                       38bfa4023d821602e9736247fbbc7ce74f620775
                       3891f8f83e5c4d75cd41d9ce387e84779e065f09
                       57f2197d09549ecbe47d83fa8eb6e423f999eddd
                       7f44169a782856ccbfc5a47b63423aaadb4a7d78
                       fd0d620b5e37a039338fb1bbc3b187ae2d720f8f
                       5b678d98c9003c634cbda3e01466347d8b42e8f1
                       ac0b443e2eb8b0378f1d2ebf69cd427161da5968
                       72ec4f66b4522b81ba68d0de00c63d3ef562fe29
                       79076af97b3be3051ec02d4c77e0428956c21a26
                       db2b545fd9f5112732e5bbafa6ac365287ec4c9e
                       356e6f207e7dd9dd39b0dff467be1f54a4c55e46
                       6cf2df1c9c53047e90e44de64b89c6fee74a25cd
                       a1f16ff2
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [d6:82:44:2b:80:9b:5a:10:db:c3:74:eb:07:31:af:40:fc:10:42:2d],[56:66:d1:a4]
        modulus: bae217125963114022b165bbcdbf78870e8594e2cf5f4da4aafa1788bc81c23c91cfa05972ffa01b56e9ba6b795d9cc113eabee22eed6c27eb251d080b64ef6eb27b5f8e09f63c2cfa1fe93daa7a282a5a40192b7e0498ef8f3e33199b78dd8a554d0d6496ebc5584bf066a63c0fb80c3ced6929575210a4ff1c6d7d6d6d7432ac8feaafba72ef1a5a3d3d41bb4fc443de5e73ed6b1bae42694729dc1d290e0e2de0a9ac3397b83c1462b02deedc96b907a85a707255559fc984bacdeab803b0211c39ca907a4611c17ed0724834c4df020a94bd8c0b3b323fc3a235d650f41c09ad932438ec5173f4ade5e0e281bcd8e4a797d5f9dd4ff463a6778917f265c3
public exponent: 10001

] 
2023-01-10 07:22:03.356  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-10 07:22:03.360 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-10 07:22:03.363 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-10 07:22:03.364 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-10 07:22:03.364  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-10 07:22:03.365  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-10 07:22:03.365  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-10 07:22:03.366 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-10 07:22:03.366 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-10 07:22:03.366 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-10 07:22:03.371 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-10 07:22:03.372 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-10 07:22:03.372 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-10 07:22:03.372 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-10 07:22:03.557  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-10 07:22:03.558  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-10 07:22:03.558 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-10 07:22:03.559 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-10 07:22:03.560  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-10 07:22:03.561  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-10 07:22:03.561 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-10 07:22:03.561 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-10 07:22:03.562 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-10 07:22:03.563 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-10 07:22:03.563 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-10 07:22:03.564 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-10 07:22:03.564 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-10 07:22:03.564 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-10 07:22:03.565 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-10 07:22:03.566 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-10 07:22:03.569 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 342204781540032095122627348491004786383382212838
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jan 10 05:08:30 UTC 2023
           Final Date: Sun Jan 09 05:08:29 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [5e:d1:e6:01:3f:8a:29:1c:5b:5d:98:de:28:9e:5f:30:a8:90:88:0d],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 38c64bfe75784804d62ddcdc933e24d448ca5e17
                       74b18b9123cbf51cc1d65ccce11fd063ed4b2820
                       beb2aeb7574521c1a79ca5bf0a1b1d8910b2e3eb
                       bbf1cb4d396b543332a462647d84e8eea6e66a5a
                       9336142a9bdd352601a652f4defbf1cd4cac6735
                       4acb8670ba8dfef216a0dcd5ab808ff70f988271
                       78768612d51f42262a67ab269180ee69d902ecca
                       38bfa4023d821602e9736247fbbc7ce74f620775
                       3891f8f83e5c4d75cd41d9ce387e84779e065f09
                       57f2197d09549ecbe47d83fa8eb6e423f999eddd
                       7f44169a782856ccbfc5a47b63423aaadb4a7d78
                       fd0d620b5e37a039338fb1bbc3b187ae2d720f8f
                       5b678d98c9003c634cbda3e01466347d8b42e8f1
                       ac0b443e2eb8b0378f1d2ebf69cd427161da5968
                       72ec4f66b4522b81ba68d0de00c63d3ef562fe29
                       79076af97b3be3051ec02d4c77e0428956c21a26
                       db2b545fd9f5112732e5bbafa6ac365287ec4c9e
                       356e6f207e7dd9dd39b0dff467be1f54a4c55e46
                       6cf2df1c9c53047e90e44de64b89c6fee74a25cd
                       a1f16ff2
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [93:45:b8:42:15:cd:35:c1:51:59:a6:ea:65:dc:8a:2b:99:2b:e6:ab],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-10 07:27:48.043  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-10 07:27:48.045 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-10 07:27:48.047 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-10 07:27:48.048 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-10 07:27:48.048  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-10 07:27:48.048  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-10 07:27:48.049  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-10 07:27:48.049 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-10 07:27:48.049 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-10 07:27:48.050 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-10 07:27:48.053 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-10 07:27:48.054 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-10 07:27:48.054 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-10 07:27:48.054 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-10 07:27:48.183  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-10 07:27:48.183  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-10 07:27:48.184 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-10 07:27:48.184 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-10 07:27:48.185  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-10 07:27:48.185  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-10 07:27:48.186 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-10 07:27:48.186 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-10 07:27:48.186 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-10 07:27:48.187 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-10 07:27:48.187 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-10 07:27:48.188 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-10 07:27:48.188 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-10 07:27:48.189 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-10 07:27:48.189 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-10 07:27:48.190 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-10 07:27:48.193 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 342204781540032095122627348491004786383382212838
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jan 10 05:08:30 UTC 2023
           Final Date: Sun Jan 09 05:08:29 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [5e:d1:e6:01:3f:8a:29:1c:5b:5d:98:de:28:9e:5f:30:a8:90:88:0d],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 38c64bfe75784804d62ddcdc933e24d448ca5e17
                       74b18b9123cbf51cc1d65ccce11fd063ed4b2820
                       beb2aeb7574521c1a79ca5bf0a1b1d8910b2e3eb
                       bbf1cb4d396b543332a462647d84e8eea6e66a5a
                       9336142a9bdd352601a652f4defbf1cd4cac6735
                       4acb8670ba8dfef216a0dcd5ab808ff70f988271
                       78768612d51f42262a67ab269180ee69d902ecca
                       38bfa4023d821602e9736247fbbc7ce74f620775
                       3891f8f83e5c4d75cd41d9ce387e84779e065f09
                       57f2197d09549ecbe47d83fa8eb6e423f999eddd
                       7f44169a782856ccbfc5a47b63423aaadb4a7d78
                       fd0d620b5e37a039338fb1bbc3b187ae2d720f8f
                       5b678d98c9003c634cbda3e01466347d8b42e8f1
                       ac0b443e2eb8b0378f1d2ebf69cd427161da5968
                       72ec4f66b4522b81ba68d0de00c63d3ef562fe29
                       79076af97b3be3051ec02d4c77e0428956c21a26
                       db2b545fd9f5112732e5bbafa6ac365287ec4c9e
                       356e6f207e7dd9dd39b0dff467be1f54a4c55e46
                       6cf2df1c9c53047e90e44de64b89c6fee74a25cd
                       a1f16ff2
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ca:78:3d:b0:57:51:1f:d7:e9:b2:d5:a9:e5:4b:1c:84:25:16:44:ae],[56:66:d1:a4]
        modulus: dc2decf1a3915456f6ed11f18647011b315a4abd56933fdb60c3524f51a6ba3f7f6024d5deb9a0ba84d8fa6276576cc0f5db5acc4446078cf926d954785a7351c80fc72636d273a9681131215ee235864c85d55917d8326de0581807314551ad5f26af49221e6d2d881894a02d6f907a7786c70709e5b402cac6cd205807dffa6ef73eb43ab4136be3c84b44d7d699b208bde6447d79699576ee5bebdf7f97d4fcdcc6069198a5183f736dc3da2dbcb8173f65afd2ea051e2b6eadf7709bfcd6e05c7293abeaee3d8e2f2466793ce1abe8c66dbc1cecdc1b1971d422de21d9dc781b1867ef3a79e49ca0337d9ce069ebb7c2fec616e863181c6777c39775c241
public exponent: 10001

] 
2023-01-10 07:35:08.944  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-10 07:35:08.947 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-10 07:35:08.950 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2023-01-10 07:35:08.950 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-10 07:35:08.951  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2023-01-10 07:35:08.952  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-10 07:35:08.952  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-10 07:35:08.953 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-10 07:35:08.953 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-10 07:35:08.954 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-10 07:35:08.958 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-10 07:35:08.959 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-10 07:35:08.960 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-10 07:35:08.960 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-10 07:35:09.134  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-10 07:35:09.135  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-10 07:35:09.135 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-10 07:35:09.136 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-10 07:35:09.137  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-10 07:35:09.138  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-10 07:35:09.138 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-10 07:35:09.138 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-10 07:35:09.139 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-10 07:35:09.141 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-10 07:35:09.141 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-10 07:35:09.142 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-10 07:35:09.143 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-10 07:35:09.144 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-10 07:35:09.144 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-10 07:35:09.146 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-10 07:35:09.150 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 342204781540032095122627348491004786383382212838
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jan 10 05:08:30 UTC 2023
           Final Date: Sun Jan 09 05:08:29 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [5e:d1:e6:01:3f:8a:29:1c:5b:5d:98:de:28:9e:5f:30:a8:90:88:0d],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 38c64bfe75784804d62ddcdc933e24d448ca5e17
                       74b18b9123cbf51cc1d65ccce11fd063ed4b2820
                       beb2aeb7574521c1a79ca5bf0a1b1d8910b2e3eb
                       bbf1cb4d396b543332a462647d84e8eea6e66a5a
                       9336142a9bdd352601a652f4defbf1cd4cac6735
                       4acb8670ba8dfef216a0dcd5ab808ff70f988271
                       78768612d51f42262a67ab269180ee69d902ecca
                       38bfa4023d821602e9736247fbbc7ce74f620775
                       3891f8f83e5c4d75cd41d9ce387e84779e065f09
                       57f2197d09549ecbe47d83fa8eb6e423f999eddd
                       7f44169a782856ccbfc5a47b63423aaadb4a7d78
                       fd0d620b5e37a039338fb1bbc3b187ae2d720f8f
                       5b678d98c9003c634cbda3e01466347d8b42e8f1
                       ac0b443e2eb8b0378f1d2ebf69cd427161da5968
                       72ec4f66b4522b81ba68d0de00c63d3ef562fe29
                       79076af97b3be3051ec02d4c77e0428956c21a26
                       db2b545fd9f5112732e5bbafa6ac365287ec4c9e
                       356e6f207e7dd9dd39b0dff467be1f54a4c55e46
                       6cf2df1c9c53047e90e44de64b89c6fee74a25cd
                       a1f16ff2
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [fe:49:c0:7a:f6:a9:e4:74:8c:33:69:ce:09:ef:b7:b8:8e:55:93:33],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-10 07:41:35.140  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-10 07:41:35.143 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-10 07:41:35.145 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2023-01-10 07:41:35.146 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-10 07:41:35.146  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2023-01-10 07:41:35.147  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-10 07:41:35.147  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-10 07:41:35.152 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-10 07:41:35.152 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-10 07:41:35.153 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-10 07:41:35.158 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-10 07:41:35.158 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-10 07:41:35.159 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-10 07:41:35.159 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-10 07:41:35.403  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-10 07:41:35.405  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-10 07:41:35.405 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-10 07:41:35.406 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-10 07:41:35.408  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-10 07:41:35.408  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-10 07:41:35.409 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-10 07:41:35.409 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-10 07:41:35.409 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-10 07:41:35.410 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-10 07:41:35.411 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-10 07:41:35.411 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-10 07:41:35.412 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-10 07:41:35.412 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-10 07:41:35.412 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-10 07:41:35.413 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-10 07:41:35.417 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 342204781540032095122627348491004786383382212838
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jan 10 05:08:30 UTC 2023
           Final Date: Sun Jan 09 05:08:29 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [5e:d1:e6:01:3f:8a:29:1c:5b:5d:98:de:28:9e:5f:30:a8:90:88:0d],[56:66:d1:a4]
        modulus: a7fd850ef83dcfecdd950ccc2ffed0bff23621dfabfc682ca95ba8ef0dbd6b15e5411c99379945e96c8539eaaafdddd9dd0f6cc905309d8eb9b18ffda441d8d7f2e2a71727e8bafd8226737c578c75be679f7ee124891ca07015c9494278f7c6256895abe75ff52b766eddc862ea91360b9c78955018974231aa58223cb046887768f1ddb426b80986f99ea953bdbd7e00d2193f6d615dd1530a28ac70e129748b45b1438045bb2376b6e2650f4cbbd43d0ace0121b789b319f1408f6a82b269fe4c052a6938b23f259543a93a56e52f2733b829cf14f4642d06aec208355cbb50e7695cf234e960a2743db962164afe10fc0441b621aa8c1f149776d489e58e008a1d52b6ae231683481eac9d4f8128e99554efcf1d49e1009b0e5b75f96cf4063791542c3f649dc8d0528fbf65b8818b4b75bc0deccc9eae860d5cf31e38e66d2a8fc9279e7343b3dffd8ed853871b0e3a3288c3766d62d080ace1c85fed66912b2d5be94a1d93d70931d10c5e72d4461e4954eb3275d613efb49241b66d37
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 38c64bfe75784804d62ddcdc933e24d448ca5e17
                       74b18b9123cbf51cc1d65ccce11fd063ed4b2820
                       beb2aeb7574521c1a79ca5bf0a1b1d8910b2e3eb
                       bbf1cb4d396b543332a462647d84e8eea6e66a5a
                       9336142a9bdd352601a652f4defbf1cd4cac6735
                       4acb8670ba8dfef216a0dcd5ab808ff70f988271
                       78768612d51f42262a67ab269180ee69d902ecca
                       38bfa4023d821602e9736247fbbc7ce74f620775
                       3891f8f83e5c4d75cd41d9ce387e84779e065f09
                       57f2197d09549ecbe47d83fa8eb6e423f999eddd
                       7f44169a782856ccbfc5a47b63423aaadb4a7d78
                       fd0d620b5e37a039338fb1bbc3b187ae2d720f8f
                       5b678d98c9003c634cbda3e01466347d8b42e8f1
                       ac0b443e2eb8b0378f1d2ebf69cd427161da5968
                       72ec4f66b4522b81ba68d0de00c63d3ef562fe29
                       79076af97b3be3051ec02d4c77e0428956c21a26
                       db2b545fd9f5112732e5bbafa6ac365287ec4c9e
                       356e6f207e7dd9dd39b0dff467be1f54a4c55e46
                       6cf2df1c9c53047e90e44de64b89c6fee74a25cd
                       a1f16ff2
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [a8:a2:df:b3:6b:90:29:28:19:a8:8d:e8:7a:08:26:00:8c:cc:45:67],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-10 07:41:51.694  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-10 07:41:51.695 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-10 07:41:51.697 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2023-01-10 07:41:51.697 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-10 07:41:51.698  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2023-01-10 07:41:51.699  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-10 07:41:51.699  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-10 07:41:51.699 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-10 07:41:51.700 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-10 07:41:51.700 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-10 07:41:51.704 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-10 07:41:51.705 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-10 07:41:51.705 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-10 07:41:51.706 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-10 07:41:51.831  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-10 07:41:51.832  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-10 07:41:51.832 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-10 07:41:51.832 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-10 07:41:51.833  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-10 07:41:51.834  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-10 07:41:51.834 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-10 07:41:51.834 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-10 07:41:51.835 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-10 07:41:51.835 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-10 07:41:51.836 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-10 07:41:51.836 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-10 07:41:51.837 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-10 07:41:51.837 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-10 07:41:51.837 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-10 07:41:51.838 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-10 07:41:51.841 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 342204781540032095122627348491004786383382212838
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jan 10 05:08:30 UTC 2023
           Final Date: Sun Jan 09 05:08:29 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [5e:d1:e6:01:3f:8a:29:1c:5b:5d:98:de:28:9e:5f:30:a8:90:88:0d],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 38c64bfe75784804d62ddcdc933e24d448ca5e17
                       74b18b9123cbf51cc1d65ccce11fd063ed4b2820
                       beb2aeb7574521c1a79ca5bf0a1b1d8910b2e3eb
                       bbf1cb4d396b543332a462647d84e8eea6e66a5a
                       9336142a9bdd352601a652f4defbf1cd4cac6735
                       4acb8670ba8dfef216a0dcd5ab808ff70f988271
                       78768612d51f42262a67ab269180ee69d902ecca
                       38bfa4023d821602e9736247fbbc7ce74f620775
                       3891f8f83e5c4d75cd41d9ce387e84779e065f09
                       57f2197d09549ecbe47d83fa8eb6e423f999eddd
                       7f44169a782856ccbfc5a47b63423aaadb4a7d78
                       fd0d620b5e37a039338fb1bbc3b187ae2d720f8f
                       5b678d98c9003c634cbda3e01466347d8b42e8f1
                       ac0b443e2eb8b0378f1d2ebf69cd427161da5968
                       72ec4f66b4522b81ba68d0de00c63d3ef562fe29
                       79076af97b3be3051ec02d4c77e0428956c21a26
                       db2b545fd9f5112732e5bbafa6ac365287ec4c9e
                       356e6f207e7dd9dd39b0dff467be1f54a4c55e46
                       6cf2df1c9c53047e90e44de64b89c6fee74a25cd
                       a1f16ff2
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [e5:fa:8c:86:5f:7c:81:12:8d:7b:86:1a:39:91:2b:4e:07:cd:c9:e1],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-10 08:07:12.554  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-10 08:07:12.556 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-10 08:07:12.559 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2023-01-10 08:07:12.560 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-10 08:07:12.560  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2023-01-10 08:07:12.561  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-10 08:07:12.562  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-10 08:07:12.562 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-10 08:07:12.563 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-10 08:07:12.563 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-10 08:07:12.567 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-10 08:07:12.569 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-10 08:07:12.569 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-10 08:07:12.569 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-10 08:07:12.707  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-10 08:07:12.708  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-10 08:07:12.708 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-10 08:07:12.708 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-10 08:07:12.710  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-10 08:07:12.710  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-10 08:07:12.711 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-10 08:07:12.712 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-10 08:07:12.712 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-10 08:07:12.713 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-10 08:07:12.714 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-10 08:07:12.714 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-10 08:07:12.716 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-10 08:07:12.716 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-10 08:07:12.716 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-10 08:07:12.718 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-10 08:07:12.723 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 342204781540032095122627348491004786383382212838
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jan 10 05:08:30 UTC 2023
           Final Date: Sun Jan 09 05:08:29 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [5e:d1:e6:01:3f:8a:29:1c:5b:5d:98:de:28:9e:5f:30:a8:90:88:0d],[56:66:d1:a4]
        modulus: a7fd850ef83dcfecdd950ccc2ffed0bff23621dfabfc682ca95ba8ef0dbd6b15e5411c99379945e96c8539eaaafdddd9dd0f6cc905309d8eb9b18ffda441d8d7f2e2a71727e8bafd8226737c578c75be679f7ee124891ca07015c9494278f7c6256895abe75ff52b766eddc862ea91360b9c78955018974231aa58223cb046887768f1ddb426b80986f99ea953bdbd7e00d2193f6d615dd1530a28ac70e129748b45b1438045bb2376b6e2650f4cbbd43d0ace0121b789b319f1408f6a82b269fe4c052a6938b23f259543a93a56e52f2733b829cf14f4642d06aec208355cbb50e7695cf234e960a2743db962164afe10fc0441b621aa8c1f149776d489e58e008a1d52b6ae231683481eac9d4f8128e99554efcf1d49e1009b0e5b75f96cf4063791542c3f649dc8d0528fbf65b8818b4b75bc0deccc9eae860d5cf31e38e66d2a8fc9279e7343b3dffd8ed853871b0e3a3288c3766d62d080ace1c85fed66912b2d5be94a1d93d70931d10c5e72d4461e4954eb3275d613efb49241b66d37
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 38c64bfe75784804d62ddcdc933e24d448ca5e17
                       74b18b9123cbf51cc1d65ccce11fd063ed4b2820
                       beb2aeb7574521c1a79ca5bf0a1b1d8910b2e3eb
                       bbf1cb4d396b543332a462647d84e8eea6e66a5a
                       9336142a9bdd352601a652f4defbf1cd4cac6735
                       4acb8670ba8dfef216a0dcd5ab808ff70f988271
                       78768612d51f42262a67ab269180ee69d902ecca
                       38bfa4023d821602e9736247fbbc7ce74f620775
                       3891f8f83e5c4d75cd41d9ce387e84779e065f09
                       57f2197d09549ecbe47d83fa8eb6e423f999eddd
                       7f44169a782856ccbfc5a47b63423aaadb4a7d78
                       fd0d620b5e37a039338fb1bbc3b187ae2d720f8f
                       5b678d98c9003c634cbda3e01466347d8b42e8f1
                       ac0b443e2eb8b0378f1d2ebf69cd427161da5968
                       72ec4f66b4522b81ba68d0de00c63d3ef562fe29
                       79076af97b3be3051ec02d4c77e0428956c21a26
                       db2b545fd9f5112732e5bbafa6ac365287ec4c9e
                       356e6f207e7dd9dd39b0dff467be1f54a4c55e46
                       6cf2df1c9c53047e90e44de64b89c6fee74a25cd
                       a1f16ff2
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [a8:77:36:e4:fc:ea:2a:d8:77:4c:5b:b8:81:b0:c1:76:a3:2e:75:44],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-10 08:07:17.418  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-10 08:07:17.419 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-10 08:07:17.421 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2023-01-10 08:07:17.422 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-10 08:07:17.422  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2023-01-10 08:07:17.422  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-10 08:07:17.423  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-10 08:07:17.423 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-10 08:07:17.424 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-10 08:07:17.424 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-10 08:07:17.428 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-10 08:07:17.428 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-10 08:07:17.428 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-10 08:07:17.429 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-10 08:07:17.514  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-10 08:07:17.529  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-10 08:07:17.529 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-10 08:07:17.530 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-10 08:07:17.532  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-10 08:07:17.533  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-10 08:07:17.533 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-10 08:07:17.533 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-10 08:07:17.533 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-10 08:07:17.534 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-10 08:07:17.535 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-10 08:07:17.535 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-10 08:07:17.535 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-10 08:07:17.536 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-10 08:07:17.536 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-10 08:07:17.537 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-10 08:07:17.540 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 342204781540032095122627348491004786383382212838
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jan 10 05:08:30 UTC 2023
           Final Date: Sun Jan 09 05:08:29 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [5e:d1:e6:01:3f:8a:29:1c:5b:5d:98:de:28:9e:5f:30:a8:90:88:0d],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 38c64bfe75784804d62ddcdc933e24d448ca5e17
                       74b18b9123cbf51cc1d65ccce11fd063ed4b2820
                       beb2aeb7574521c1a79ca5bf0a1b1d8910b2e3eb
                       bbf1cb4d396b543332a462647d84e8eea6e66a5a
                       9336142a9bdd352601a652f4defbf1cd4cac6735
                       4acb8670ba8dfef216a0dcd5ab808ff70f988271
                       78768612d51f42262a67ab269180ee69d902ecca
                       38bfa4023d821602e9736247fbbc7ce74f620775
                       3891f8f83e5c4d75cd41d9ce387e84779e065f09
                       57f2197d09549ecbe47d83fa8eb6e423f999eddd
                       7f44169a782856ccbfc5a47b63423aaadb4a7d78
                       fd0d620b5e37a039338fb1bbc3b187ae2d720f8f
                       5b678d98c9003c634cbda3e01466347d8b42e8f1
                       ac0b443e2eb8b0378f1d2ebf69cd427161da5968
                       72ec4f66b4522b81ba68d0de00c63d3ef562fe29
                       79076af97b3be3051ec02d4c77e0428956c21a26
                       db2b545fd9f5112732e5bbafa6ac365287ec4c9e
                       356e6f207e7dd9dd39b0dff467be1f54a4c55e46
                       6cf2df1c9c53047e90e44de64b89c6fee74a25cd
                       a1f16ff2
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [c8:c9:cf:c6:d2:d0:32:53:7b:d5:99:fa:90:75:d4:42:bd:2b:46:e9],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

]