Results

By type

          2022-07-08 14:03:01,174 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-07-08 14:03:02,114 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-07-08 14:03:02.919  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Jul 08, 2022 2:03:05 PM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Jul 08, 2022 2:03:05 PM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Jul 08, 2022 2:03:05 PM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Jul 08, 2022 2:03:05 PM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-07-08 14:03:05.967 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-07-08 14:03:06.258  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-07-08 14:03:06.423  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-07-08 14:03:07.220 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-07-08 14:03:07.224 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
2022-07-08 14:03:07.226 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-07-08 14:03:07.231 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-07-08 14:03:07.274 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2022-07-08 14:03:07.278 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
	{GET [/docs]}: redirectToUi(HttpServletRequest)
2022-07-08 14:03:07.417 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-07-08 14:03:08.091 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Jul 08, 2022 2:03:08 PM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-07-08 14:03:09.177  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 9.009 seconds (JVM running for 13.078)
Jul 08, 2022 2:03:29 PM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-07-08 15:04:12.857  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-07-08 15:04:12.874 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-07-08 15:04:12.924 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-07-08 15:04:12.931 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-07-08 15:04:12.954  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-07-08 15:04:12.957  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-07-08 15:04:12.958  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-07-08 15:04:12.959 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-07-08 15:04:12.960 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-08 15:04:12.964 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-07-08 15:04:12.974 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-07-08 15:04:12.977 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-07-08 15:04:13.019 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-07-08 15:04:13.025 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-08 15:04:13.025 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-08 15:04:13.029 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-08 15:04:13.785  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-07-08 15:04:13.788  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-07-08 15:04:13.788 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-07-08 15:04:13.790 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-08 15:04:13.801  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-07-08 15:04:13.802  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-07-08 15:04:13.803 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-08 15:04:13.804 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-08 15:04:13.804 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-08 15:04:13.820 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-08 15:04:13.821 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-08 15:04:13.821 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-08 15:04:13.827 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-08 15:04:13.828 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-08 15:04:13.828 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-08 15:04:13.830 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-07-08 15:04:13.862 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 628037756600740552036266635692649894515793544784
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jul 08 13:37:13 UTC 2022
           Final Date: Wed Jul 07 13:37:12 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [00:9e:d0:69:b4:4c:d4:bc:05:13:e5:d8:21:85:97:d3:e6:41:b9:1d]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 27835692214f168471b9a265913b16d894e2631b
                       ba162795fe1908a0fe38b5d2d546ef3e75c05312
                       31d3ba5f798ad5e9772b47094480101adc256232
                       63e9cc87c8b02fb0073ab238af3ef25afc3d9dd9
                       e50bcd0bf3eaecade9ad8215e0ad6f408ccfd511
                       f9a5b68aeb5788f2bf61bce0b55d010db176d938
                       fd196e512f698cac9f859f07e183250999641ba5
                       8f002fc8aed7f4d3d77a5d9c570bfc85ecce3068
                       01a741a7e47f94426a1f166e2089873a4f23e364
                       8f2c9aed9574464e2481bd294980c6cd4305e5e4
                       35e527886583d2c22a643bb5ecf5868c0cf24437
                       7b4e5da46532218c58b087cf0c40397353853609
                       ef877a492f75bc68dc5d4c8b2e6cc15d33e1b897
                       b9c8afe49b12bb124d6dcf542f69a292b76963db
                       7298e243e3766a2ab2fa4634ac59ca46f6440356
                       ae1159b63972a301e6c09fc25c08e71365c00463
                       b5a32f9af0e458db4fdb48f9e53829a569879ad2
                       01af4364a4984e2e50258e7fb56bdcd06cd9a593
                       53641cab23b7aca58bfe672ae95271935546800b
                       838c6fe7
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [66:49:77:ac:ec:9c:af:68:af:4f:13:11:d5:10:58:4f:33:02:b5:0a]
            modulus: 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
    public exponent: 10001

] 
2022-07-08 15:06:02.980  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-07-08 15:06:02.982 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-07-08 15:06:02.984 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-07-08 15:06:02.987 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-07-08 15:06:02.988  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-07-08 15:06:02.989  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-07-08 15:06:02.989  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-07-08 15:06:02.991 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-07-08 15:06:02.992 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-07-08 15:06:02.993 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-07-08 15:06:03.008 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-07-08 15:06:03.009 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-08 15:06:03.010 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-08 15:06:03.010 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-08 15:06:03.159  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-07-08 15:06:03.160  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-07-08 15:06:03.160 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-07-08 15:06:03.161 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-08 15:06:03.164  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-07-08 15:06:03.165  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-07-08 15:06:03.165 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-08 15:06:03.166 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-08 15:06:03.166 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-08 15:06:03.168 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-08 15:06:03.168 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-08 15:06:03.169 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-08 15:06:03.170 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-08 15:06:03.170 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-08 15:06:03.170 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-08 15:06:03.172 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-07-08 15:06:03.177 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 628037756600740552036266635692649894515793544784
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jul 08 13:37:13 UTC 2022
           Final Date: Wed Jul 07 13:37:12 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [00:9e:d0:69:b4:4c:d4:bc:05:13:e5:d8:21:85:97:d3:e6:41:b9:1d]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 27835692214f168471b9a265913b16d894e2631b
                       ba162795fe1908a0fe38b5d2d546ef3e75c05312
                       31d3ba5f798ad5e9772b47094480101adc256232
                       63e9cc87c8b02fb0073ab238af3ef25afc3d9dd9
                       e50bcd0bf3eaecade9ad8215e0ad6f408ccfd511
                       f9a5b68aeb5788f2bf61bce0b55d010db176d938
                       fd196e512f698cac9f859f07e183250999641ba5
                       8f002fc8aed7f4d3d77a5d9c570bfc85ecce3068
                       01a741a7e47f94426a1f166e2089873a4f23e364
                       8f2c9aed9574464e2481bd294980c6cd4305e5e4
                       35e527886583d2c22a643bb5ecf5868c0cf24437
                       7b4e5da46532218c58b087cf0c40397353853609
                       ef877a492f75bc68dc5d4c8b2e6cc15d33e1b897
                       b9c8afe49b12bb124d6dcf542f69a292b76963db
                       7298e243e3766a2ab2fa4634ac59ca46f6440356
                       ae1159b63972a301e6c09fc25c08e71365c00463
                       b5a32f9af0e458db4fdb48f9e53829a569879ad2
                       01af4364a4984e2e50258e7fb56bdcd06cd9a593
                       53641cab23b7aca58bfe672ae95271935546800b
                       838c6fe7
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [d6:fb:32:3c:3e:94:da:29:da:70:c3:0e:84:37:78:ad:63:fd:3f:fb]
            modulus: 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
    public exponent: 10001

] 
2022-07-08 15:07:09.383  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-07-08 15:07:09.385 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-07-08 15:07:09.387 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-07-08 15:07:09.388 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-07-08 15:07:09.389  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-07-08 15:07:09.390  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-07-08 15:07:09.391  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-07-08 15:07:09.391 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-07-08 15:07:09.392 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-07-08 15:07:09.393 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-07-08 15:07:09.408 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-07-08 15:07:09.409 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-08 15:07:09.410 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-08 15:07:09.410 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-08 15:07:09.626  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-07-08 15:07:09.626  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-07-08 15:07:09.627 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-07-08 15:07:09.627 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-08 15:07:09.630  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-07-08 15:07:09.630  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-07-08 15:07:09.631 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-08 15:07:09.632 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-08 15:07:09.632 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-08 15:07:09.633 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-08 15:07:09.633 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-08 15:07:09.633 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-08 15:07:09.635 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-08 15:07:09.635 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-08 15:07:09.636 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-08 15:07:09.637 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-07-08 15:07:09.643 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 628037756600740552036266635692649894515793544784
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jul 08 13:37:13 UTC 2022
           Final Date: Wed Jul 07 13:37:12 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [00:9e:d0:69:b4:4c:d4:bc:05:13:e5:d8:21:85:97:d3:e6:41:b9:1d]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 27835692214f168471b9a265913b16d894e2631b
                       ba162795fe1908a0fe38b5d2d546ef3e75c05312
                       31d3ba5f798ad5e9772b47094480101adc256232
                       63e9cc87c8b02fb0073ab238af3ef25afc3d9dd9
                       e50bcd0bf3eaecade9ad8215e0ad6f408ccfd511
                       f9a5b68aeb5788f2bf61bce0b55d010db176d938
                       fd196e512f698cac9f859f07e183250999641ba5
                       8f002fc8aed7f4d3d77a5d9c570bfc85ecce3068
                       01a741a7e47f94426a1f166e2089873a4f23e364
                       8f2c9aed9574464e2481bd294980c6cd4305e5e4
                       35e527886583d2c22a643bb5ecf5868c0cf24437
                       7b4e5da46532218c58b087cf0c40397353853609
                       ef877a492f75bc68dc5d4c8b2e6cc15d33e1b897
                       b9c8afe49b12bb124d6dcf542f69a292b76963db
                       7298e243e3766a2ab2fa4634ac59ca46f6440356
                       ae1159b63972a301e6c09fc25c08e71365c00463
                       b5a32f9af0e458db4fdb48f9e53829a569879ad2
                       01af4364a4984e2e50258e7fb56bdcd06cd9a593
                       53641cab23b7aca58bfe672ae95271935546800b
                       838c6fe7
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [e5:52:61:40:b5:12:31:c1:cc:99:d8:0f:81:62:09:20:3f:3e:34:c6]
            modulus: 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
    public exponent: 10001

] 
2022-07-08 15:09:46.051  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-07-08 15:09:46.055 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-07-08 15:09:46.058 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-07-08 15:09:46.059 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-07-08 15:09:46.060  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-07-08 15:09:46.070  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-07-08 15:09:46.071  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-07-08 15:09:46.071 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-07-08 15:09:46.072 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-07-08 15:09:46.073 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-07-08 15:09:46.080 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-07-08 15:09:46.082 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-08 15:09:46.082 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-08 15:09:46.082 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-08 15:09:46.264  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-07-08 15:09:46.264  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-07-08 15:09:46.265 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-07-08 15:09:46.265 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-08 15:09:46.267  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-07-08 15:09:46.267  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-07-08 15:09:46.268 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-08 15:09:46.268 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-08 15:09:46.269 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-08 15:09:46.270 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-08 15:09:46.271 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-08 15:09:46.271 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-08 15:09:46.272 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-08 15:09:46.272 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-08 15:09:46.273 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-08 15:09:46.274 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-07-08 15:09:46.280 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 628037756600740552036266635692649894515793544784
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jul 08 13:37:13 UTC 2022
           Final Date: Wed Jul 07 13:37:12 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [00:9e:d0:69:b4:4c:d4:bc:05:13:e5:d8:21:85:97:d3:e6:41:b9:1d]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 27835692214f168471b9a265913b16d894e2631b
                       ba162795fe1908a0fe38b5d2d546ef3e75c05312
                       31d3ba5f798ad5e9772b47094480101adc256232
                       63e9cc87c8b02fb0073ab238af3ef25afc3d9dd9
                       e50bcd0bf3eaecade9ad8215e0ad6f408ccfd511
                       f9a5b68aeb5788f2bf61bce0b55d010db176d938
                       fd196e512f698cac9f859f07e183250999641ba5
                       8f002fc8aed7f4d3d77a5d9c570bfc85ecce3068
                       01a741a7e47f94426a1f166e2089873a4f23e364
                       8f2c9aed9574464e2481bd294980c6cd4305e5e4
                       35e527886583d2c22a643bb5ecf5868c0cf24437
                       7b4e5da46532218c58b087cf0c40397353853609
                       ef877a492f75bc68dc5d4c8b2e6cc15d33e1b897
                       b9c8afe49b12bb124d6dcf542f69a292b76963db
                       7298e243e3766a2ab2fa4634ac59ca46f6440356
                       ae1159b63972a301e6c09fc25c08e71365c00463
                       b5a32f9af0e458db4fdb48f9e53829a569879ad2
                       01af4364a4984e2e50258e7fb56bdcd06cd9a593
                       53641cab23b7aca58bfe672ae95271935546800b
                       838c6fe7
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [27:ec:22:dd:90:14:2b:6e:f5:c0:83:43:b9:2c:f9:b1:cc:80:b5:95]
            modulus: 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
    public exponent: 10001

] 
2022-07-08 15:20:11.544  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-07-08 15:20:11.549 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-07-08 15:20:11.560 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-07-08 15:20:11.562 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-07-08 15:20:11.563  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-07-08 15:20:11.565  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-07-08 15:20:11.566  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-07-08 15:20:11.567 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-07-08 15:20:11.568 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-07-08 15:20:11.568 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-07-08 15:20:11.577 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-07-08 15:20:11.578 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-08 15:20:11.578 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-08 15:20:11.579 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-08 15:20:11.796  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-07-08 15:20:11.797  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-07-08 15:20:11.798 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-07-08 15:20:11.798 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-08 15:20:11.801  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-07-08 15:20:11.802  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-07-08 15:20:11.803 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-08 15:20:11.803 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-08 15:20:11.804 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-08 15:20:11.805 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-08 15:20:11.806 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-08 15:20:11.806 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-08 15:20:11.807 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-08 15:20:11.807 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-08 15:20:11.808 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-08 15:20:11.809 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-07-08 15:20:11.813 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 628037756600740552036266635692649894515793544784
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jul 08 13:37:13 UTC 2022
           Final Date: Wed Jul 07 13:37:12 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [00:9e:d0:69:b4:4c:d4:bc:05:13:e5:d8:21:85:97:d3:e6:41:b9:1d]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 27835692214f168471b9a265913b16d894e2631b
                       ba162795fe1908a0fe38b5d2d546ef3e75c05312
                       31d3ba5f798ad5e9772b47094480101adc256232
                       63e9cc87c8b02fb0073ab238af3ef25afc3d9dd9
                       e50bcd0bf3eaecade9ad8215e0ad6f408ccfd511
                       f9a5b68aeb5788f2bf61bce0b55d010db176d938
                       fd196e512f698cac9f859f07e183250999641ba5
                       8f002fc8aed7f4d3d77a5d9c570bfc85ecce3068
                       01a741a7e47f94426a1f166e2089873a4f23e364
                       8f2c9aed9574464e2481bd294980c6cd4305e5e4
                       35e527886583d2c22a643bb5ecf5868c0cf24437
                       7b4e5da46532218c58b087cf0c40397353853609
                       ef877a492f75bc68dc5d4c8b2e6cc15d33e1b897
                       b9c8afe49b12bb124d6dcf542f69a292b76963db
                       7298e243e3766a2ab2fa4634ac59ca46f6440356
                       ae1159b63972a301e6c09fc25c08e71365c00463
                       b5a32f9af0e458db4fdb48f9e53829a569879ad2
                       01af4364a4984e2e50258e7fb56bdcd06cd9a593
                       53641cab23b7aca58bfe672ae95271935546800b
                       838c6fe7
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [de:d8:4c:19:56:f0:04:cb:7c:e1:e3:6d:cb:62:a4:89:27:93:04:33]
            modulus: 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
    public exponent: 10001

] 
2022-07-08 15:27:16.863  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-07-08 15:27:16.869 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-07-08 15:27:16.872 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-07-08 15:27:16.873 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-07-08 15:27:16.874  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-07-08 15:27:16.875  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-07-08 15:27:16.875  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-07-08 15:27:16.876 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-07-08 15:27:16.877 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-07-08 15:27:16.877 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-07-08 15:27:16.886 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-07-08 15:27:16.887 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-08 15:27:16.887 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-08 15:27:16.887 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-08 15:27:17.069  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-07-08 15:27:17.070  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-07-08 15:27:17.070 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-07-08 15:27:17.071 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-08 15:27:17.073  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-07-08 15:27:17.073  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-07-08 15:27:17.074 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-08 15:27:17.074 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-08 15:27:17.074 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-08 15:27:17.075 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-08 15:27:17.075 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-08 15:27:17.076 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-08 15:27:17.076 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-08 15:27:17.077 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-08 15:27:17.077 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-08 15:27:17.078 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-07-08 15:27:17.082 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 628037756600740552036266635692649894515793544784
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jul 08 13:37:13 UTC 2022
           Final Date: Wed Jul 07 13:37:12 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [00:9e:d0:69:b4:4c:d4:bc:05:13:e5:d8:21:85:97:d3:e6:41:b9:1d]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 27835692214f168471b9a265913b16d894e2631b
                       ba162795fe1908a0fe38b5d2d546ef3e75c05312
                       31d3ba5f798ad5e9772b47094480101adc256232
                       63e9cc87c8b02fb0073ab238af3ef25afc3d9dd9
                       e50bcd0bf3eaecade9ad8215e0ad6f408ccfd511
                       f9a5b68aeb5788f2bf61bce0b55d010db176d938
                       fd196e512f698cac9f859f07e183250999641ba5
                       8f002fc8aed7f4d3d77a5d9c570bfc85ecce3068
                       01a741a7e47f94426a1f166e2089873a4f23e364
                       8f2c9aed9574464e2481bd294980c6cd4305e5e4
                       35e527886583d2c22a643bb5ecf5868c0cf24437
                       7b4e5da46532218c58b087cf0c40397353853609
                       ef877a492f75bc68dc5d4c8b2e6cc15d33e1b897
                       b9c8afe49b12bb124d6dcf542f69a292b76963db
                       7298e243e3766a2ab2fa4634ac59ca46f6440356
                       ae1159b63972a301e6c09fc25c08e71365c00463
                       b5a32f9af0e458db4fdb48f9e53829a569879ad2
                       01af4364a4984e2e50258e7fb56bdcd06cd9a593
                       53641cab23b7aca58bfe672ae95271935546800b
                       838c6fe7
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [60:65:1c:c9:56:1f:c5:fa:b2:d9:8a:48:c0:c4:e2:4d:c9:29:13:46]
            modulus: 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
    public exponent: 10001

] 
2022-07-08 15:27:34.964  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-07-08 15:27:34.966 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-07-08 15:27:34.968 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-07-08 15:27:34.969 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-07-08 15:27:34.970  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-07-08 15:27:34.971  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-07-08 15:27:34.971  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-07-08 15:27:34.972 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-07-08 15:27:34.972 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-07-08 15:27:34.973 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-07-08 15:27:34.981 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-07-08 15:27:34.982 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-08 15:27:34.982 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-08 15:27:34.983 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-08 15:27:35.155  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-07-08 15:27:35.155  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-07-08 15:27:35.156 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-07-08 15:27:35.156 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-08 15:27:35.158  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-07-08 15:27:35.158  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-07-08 15:27:35.159 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-08 15:27:35.159 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-08 15:27:35.160 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-08 15:27:35.161 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-08 15:27:35.161 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-08 15:27:35.162 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-08 15:27:35.163 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-08 15:27:35.163 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-08 15:27:35.163 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-08 15:27:35.165 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-07-08 15:27:35.169 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 628037756600740552036266635692649894515793544784
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jul 08 13:37:13 UTC 2022
           Final Date: Wed Jul 07 13:37:12 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [00:9e:d0:69:b4:4c:d4:bc:05:13:e5:d8:21:85:97:d3:e6:41:b9:1d]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 27835692214f168471b9a265913b16d894e2631b
                       ba162795fe1908a0fe38b5d2d546ef3e75c05312
                       31d3ba5f798ad5e9772b47094480101adc256232
                       63e9cc87c8b02fb0073ab238af3ef25afc3d9dd9
                       e50bcd0bf3eaecade9ad8215e0ad6f408ccfd511
                       f9a5b68aeb5788f2bf61bce0b55d010db176d938
                       fd196e512f698cac9f859f07e183250999641ba5
                       8f002fc8aed7f4d3d77a5d9c570bfc85ecce3068
                       01a741a7e47f94426a1f166e2089873a4f23e364
                       8f2c9aed9574464e2481bd294980c6cd4305e5e4
                       35e527886583d2c22a643bb5ecf5868c0cf24437
                       7b4e5da46532218c58b087cf0c40397353853609
                       ef877a492f75bc68dc5d4c8b2e6cc15d33e1b897
                       b9c8afe49b12bb124d6dcf542f69a292b76963db
                       7298e243e3766a2ab2fa4634ac59ca46f6440356
                       ae1159b63972a301e6c09fc25c08e71365c00463
                       b5a32f9af0e458db4fdb48f9e53829a569879ad2
                       01af4364a4984e2e50258e7fb56bdcd06cd9a593
                       53641cab23b7aca58bfe672ae95271935546800b
                       838c6fe7
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [14:e4:cf:6c:bf:dd:a7:b1:2f:1a:d2:8c:63:b7:0c:dc:b7:00:12:3d]
            modulus: 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
    public exponent: 10001

]