Results

By type

          2022-11-01 03:02:25,508 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-11-01 03:02:26,335 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-11-01 03:02:27.063  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Nov 01, 2022 3:02:28 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Nov 01, 2022 3:02:28 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Nov 01, 2022 3:02:28 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Nov 01, 2022 3:02:28 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-11-01 03:02:29.592 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-11-01 03:02:29.884  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-11-01 03:02:30.049  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-11-01 03:02:30.734 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-11-01 03:02:30.737 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
2022-11-01 03:02:30.738 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-11-01 03:02:30.742 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-11-01 03:02:30.783 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2022-11-01 03:02:30.786 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/docs]}: redirectToUi(HttpServletRequest)
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
2022-11-01 03:02:30.912 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-11-01 03:02:31.576 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Nov 01, 2022 3:02:32 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-11-01 03:02:32.497  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 7.847 seconds (JVM running for 9.629)
Nov 01, 2022 3:02:56 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-11-01 03:03:07.036  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-01 03:03:07.048 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-01 03:03:07.098 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-11-01 03:03:07.103 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-01 03:03:07.125  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-11-01 03:03:07.128  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-01 03:03:07.129  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-01 03:03:07.131 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-01 03:03:07.131 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-01 03:03:07.136 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-01 03:03:07.147 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-01 03:03:07.154 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-01 03:03:07.205 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-01 03:03:07.211 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-01 03:03:07.211 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-01 03:03:07.216 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-01 03:03:07.851  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-01 03:03:07.855  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-01 03:03:07.855 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-01 03:03:07.857 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-01 03:03:07.868  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-01 03:03:07.869  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-01 03:03:07.870 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-01 03:03:07.871 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-01 03:03:07.872 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-01 03:03:07.885 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-01 03:03:07.885 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-01 03:03:07.886 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-01 03:03:07.893 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-01 03:03:07.893 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-01 03:03:07.895 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-01 03:03:07.897 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-01 03:03:07.930 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 574311783879577549537239222080550188213906895225
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Nov 01 03:00:14 UTC 2022
           Final Date: Sun Oct 31 03:00:13 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [af:09:99:9f:07:9d:dd:7d:49:62:b4:7d:f7:51:6b:db:37:06:07:9e]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 4d3f0a4c1a4785014af14645412ee10f2335ec73
                       5972a9463d0b18d8c351c4f84e5f7f8518dce615
                       9473397582ad5d8cbb052ad000c6ad2af9d154b7
                       1b67f44715c62d609a2e0bc94ea7b870380557ab
                       325c22e4024fd3c86c8836f06f80d9f6086c0369
                       cf8ff833bd47fcac8f9436ab915aeb8639101ca6
                       3ff9beebf50265c1c004509ee517c4dbb61d8b2f
                       794a795abcc3cf75d5a106355acf439169710ee7
                       2e604ed489883c94a2f3a4806f3bf4eb1ff2287d
                       a31df44e9040459415a373947af81f3919ed9479
                       f4e6f7061438b700348e34c756ecc6c0b1f97f46
                       ff507827d27f592479727e9426cbfcec811aa2a5
                       aa4cd8b12d17a4e5287ac6a21167051c8aeb2d57
                       00745ba145ba2bb7757bebed2f4bff0b0a07a649
                       ea9d7e83066889098f669762eb69e537d9ad61fe
                       288dea63250fb6b2440b4a86fc069add570cc3bf
                       920439de95c77e2908b4bad39422d0e3b80cf103
                       c44024c6b89f09dfdfcf26776b9906b51d93159a
                       4a45a22ac696dfbf03ef2b6ec3fb3d70e5b881ac
                       3907e261
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [25:63:5f:cf:92:34:bb:64:81:5f:6e:8d:96:fb:f7:23:6c:7d:71:04]
            modulus: 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
    public exponent: 10001

] 
2022-11-01 04:19:35.107  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-01 04:19:35.111 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-01 04:19:35.115 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-01 04:19:35.117 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-01 04:19:35.121  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-01 04:19:35.123  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-01 04:19:35.124  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-01 04:19:35.124 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-01 04:19:35.126 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-01 04:19:35.130 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-01 04:19:35.146 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-01 04:19:35.148 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-01 04:19:35.148 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-01 04:19:35.149 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-01 04:19:35.338  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-01 04:19:35.339  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-01 04:19:35.340 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-01 04:19:35.340 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-01 04:19:35.344  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-01 04:19:35.345  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-01 04:19:35.346 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-01 04:19:35.346 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-01 04:19:35.347 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-01 04:19:35.348 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-01 04:19:35.350 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-01 04:19:35.350 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-01 04:19:35.351 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-01 04:19:35.352 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-01 04:19:35.352 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-01 04:19:35.354 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-01 04:19:35.360 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 574311783879577549537239222080550188213906895225
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Nov 01 03:00:14 UTC 2022
           Final Date: Sun Oct 31 03:00:13 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [af:09:99:9f:07:9d:dd:7d:49:62:b4:7d:f7:51:6b:db:37:06:07:9e]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 4d3f0a4c1a4785014af14645412ee10f2335ec73
                       5972a9463d0b18d8c351c4f84e5f7f8518dce615
                       9473397582ad5d8cbb052ad000c6ad2af9d154b7
                       1b67f44715c62d609a2e0bc94ea7b870380557ab
                       325c22e4024fd3c86c8836f06f80d9f6086c0369
                       cf8ff833bd47fcac8f9436ab915aeb8639101ca6
                       3ff9beebf50265c1c004509ee517c4dbb61d8b2f
                       794a795abcc3cf75d5a106355acf439169710ee7
                       2e604ed489883c94a2f3a4806f3bf4eb1ff2287d
                       a31df44e9040459415a373947af81f3919ed9479
                       f4e6f7061438b700348e34c756ecc6c0b1f97f46
                       ff507827d27f592479727e9426cbfcec811aa2a5
                       aa4cd8b12d17a4e5287ac6a21167051c8aeb2d57
                       00745ba145ba2bb7757bebed2f4bff0b0a07a649
                       ea9d7e83066889098f669762eb69e537d9ad61fe
                       288dea63250fb6b2440b4a86fc069add570cc3bf
                       920439de95c77e2908b4bad39422d0e3b80cf103
                       c44024c6b89f09dfdfcf26776b9906b51d93159a
                       4a45a22ac696dfbf03ef2b6ec3fb3d70e5b881ac
                       3907e261
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [79:0d:43:15:9d:5c:92:14:2a:3b:f2:36:74:8e:16:c7:74:b0:eb:20]
            modulus: 93b1d94ee58ce4a8bc24a64a1273eeb4fd98f214f6ef79588e434eb81e41bc9cb96bb81123103978439593536ffaf815380ca69a81bb5705e028358bb87bd318d4407bc6fb36ba487e1b9d17ba1fc6f399444b479d109cfdfa9f8e61bfc1892a5015fe20236e0b88476b95474ba4c663c91e985a0622312b6978d51b63eaa99bd85fd6dc7059f761617ab0cf6180ffe70e46f20be4ec7b1706b1b6d8afa55c2ddf912e2ddc913865d6796ffc04f0bcbbcac3b158ffc5b61990f0aad51b1e249d0c8f4814cd0670f66d3be7fe93b118d4a421d7430a7f967c1e6d13884da75eda81498685831266ae23dfb44fa2bf116d6a0a4a069dafdecf56faca88eee2ce93
    public exponent: 10001

] 
2022-11-01 04:21:23.159  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-01 04:21:23.162 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-01 04:21:23.164 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-11-01 04:21:23.166 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-01 04:21:23.167  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-11-01 04:21:23.169  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-01 04:21:23.169  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-01 04:21:23.170 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-01 04:21:23.170 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-01 04:21:23.171 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-01 04:21:23.184 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-01 04:21:23.185 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-01 04:21:23.185 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-01 04:21:23.186 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-01 04:21:23.324  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-01 04:21:23.325  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-01 04:21:23.326 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-01 04:21:23.326 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-01 04:21:23.329  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-01 04:21:23.329  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-01 04:21:23.330 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-01 04:21:23.330 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-01 04:21:23.330 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-01 04:21:23.331 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-01 04:21:23.332 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-01 04:21:23.332 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-01 04:21:23.333 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-01 04:21:23.333 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-01 04:21:23.334 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-01 04:21:23.335 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-01 04:21:23.339 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 574311783879577549537239222080550188213906895225
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Nov 01 03:00:14 UTC 2022
           Final Date: Sun Oct 31 03:00:13 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [af:09:99:9f:07:9d:dd:7d:49:62:b4:7d:f7:51:6b:db:37:06:07:9e]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 4d3f0a4c1a4785014af14645412ee10f2335ec73
                       5972a9463d0b18d8c351c4f84e5f7f8518dce615
                       9473397582ad5d8cbb052ad000c6ad2af9d154b7
                       1b67f44715c62d609a2e0bc94ea7b870380557ab
                       325c22e4024fd3c86c8836f06f80d9f6086c0369
                       cf8ff833bd47fcac8f9436ab915aeb8639101ca6
                       3ff9beebf50265c1c004509ee517c4dbb61d8b2f
                       794a795abcc3cf75d5a106355acf439169710ee7
                       2e604ed489883c94a2f3a4806f3bf4eb1ff2287d
                       a31df44e9040459415a373947af81f3919ed9479
                       f4e6f7061438b700348e34c756ecc6c0b1f97f46
                       ff507827d27f592479727e9426cbfcec811aa2a5
                       aa4cd8b12d17a4e5287ac6a21167051c8aeb2d57
                       00745ba145ba2bb7757bebed2f4bff0b0a07a649
                       ea9d7e83066889098f669762eb69e537d9ad61fe
                       288dea63250fb6b2440b4a86fc069add570cc3bf
                       920439de95c77e2908b4bad39422d0e3b80cf103
                       c44024c6b89f09dfdfcf26776b9906b51d93159a
                       4a45a22ac696dfbf03ef2b6ec3fb3d70e5b881ac
                       3907e261
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [7f:62:60:19:6f:84:98:50:2f:2a:a6:9d:15:8a:98:4c:02:7b:8b:82]
            modulus: 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
    public exponent: 10001

] 
2022-11-01 04:22:23.169  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-01 04:22:23.171 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-01 04:22:23.174 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-11-01 04:22:23.175 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-01 04:22:23.176  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-11-01 04:22:23.177  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-01 04:22:23.177  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-01 04:22:23.178 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-01 04:22:23.178 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-01 04:22:23.179 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-01 04:22:23.184 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-01 04:22:23.185 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-01 04:22:23.185 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-01 04:22:23.186 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-01 04:22:23.290  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-01 04:22:23.291  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-01 04:22:23.292 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-01 04:22:23.292 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-01 04:22:23.295  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-01 04:22:23.295  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-01 04:22:23.296 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-01 04:22:23.296 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-01 04:22:23.297 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-01 04:22:23.298 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-01 04:22:23.298 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-01 04:22:23.299 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-01 04:22:23.300 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-01 04:22:23.300 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-01 04:22:23.300 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-01 04:22:23.301 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-01 04:22:23.307 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 574311783879577549537239222080550188213906895225
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Nov 01 03:00:14 UTC 2022
           Final Date: Sun Oct 31 03:00:13 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [af:09:99:9f:07:9d:dd:7d:49:62:b4:7d:f7:51:6b:db:37:06:07:9e]
            modulus: cff6d2ed7a4a974eee77046253cd3b251d14e011c3fc544416c6e14d580c8fda0b74723260a5397c728a254a241e78e51579482c8312606eb7ce751daf1c7e35280176276b95fff083f9d4cd46a2edbfcc868576b686412e7eaa61e120a23f7e4c998dac03340c683dc1a8e2154abcf76a3b63ce1c915aff455a8580733765959ae7f8badbc4ed3ff6b54c7dbbbd04e854a1de7aaf603064a869962fb08bec9f6fc542fcfdd73233bc969a87f72b919b58b84981fb80a2158ffffbac0fa780f01be7710305ff8bbb4e486c69719babee9c25db66b515b4a2574e85207a4b943b4ec1aee0be87fdb7967e0189cb9cff517df3b9a737d5fad5eda58bfdb800eb0a3e7173b0778848f9c91674c95bcdcc09ac0f7591da572b06645087b8f83c574ec5a9386d4847120b98b157c4003a40efa04d6a102666597204057be6665373bd6b5794f5a7674f3bb5e505160ccc795af79bd0c84bd7b96268ec5d9f9373bad10b5b2cc3a4415e11ffa3f2de175c52e361e8dddb47423c650a38153e691c35d9
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 4d3f0a4c1a4785014af14645412ee10f2335ec73
                       5972a9463d0b18d8c351c4f84e5f7f8518dce615
                       9473397582ad5d8cbb052ad000c6ad2af9d154b7
                       1b67f44715c62d609a2e0bc94ea7b870380557ab
                       325c22e4024fd3c86c8836f06f80d9f6086c0369
                       cf8ff833bd47fcac8f9436ab915aeb8639101ca6
                       3ff9beebf50265c1c004509ee517c4dbb61d8b2f
                       794a795abcc3cf75d5a106355acf439169710ee7
                       2e604ed489883c94a2f3a4806f3bf4eb1ff2287d
                       a31df44e9040459415a373947af81f3919ed9479
                       f4e6f7061438b700348e34c756ecc6c0b1f97f46
                       ff507827d27f592479727e9426cbfcec811aa2a5
                       aa4cd8b12d17a4e5287ac6a21167051c8aeb2d57
                       00745ba145ba2bb7757bebed2f4bff0b0a07a649
                       ea9d7e83066889098f669762eb69e537d9ad61fe
                       288dea63250fb6b2440b4a86fc069add570cc3bf
                       920439de95c77e2908b4bad39422d0e3b80cf103
                       c44024c6b89f09dfdfcf26776b9906b51d93159a
                       4a45a22ac696dfbf03ef2b6ec3fb3d70e5b881ac
                       3907e261
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [03:88:61:47:80:e9:45:12:94:fd:0d:36:65:84:bc:c1:06:91:a6:69]
            modulus: b816be10055c428d364ab0a607767f1ca3bda0f4750cb623d89da7aeb9f99d502d63f2cea4d7bf6add757acce4447d73661243affb586af994f48713e6d19c837d8f5ada3a1acd2772173d645316d3d5efb4f065b6d51192c900f488d6affbb5f1630c420685a51733165884b6f535c63f8d74d2fa5a0247b52452dd2d61dce4d90c4aced3ff92c71537090bf910e73a72446967ad3fbe396c902bb30fdf972866358e49fc3cf6af5d5e2e0e68087bf8580a6abcf2e8d421b4dba98ac4c8de4a6f90e871188a9c11178e6a085d4ffb7fdf9aed03f444582a840b7cb8adbbe60ae020291c52e34c6dbbc598d33acb30beb1402f209194b0e97d002ab67938bb5d
    public exponent: 10001

] 
2022-11-01 04:24:18.699  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-01 04:24:18.702 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-01 04:24:18.704 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-01 04:24:18.705 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-01 04:24:18.706  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-01 04:24:18.707  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-01 04:24:18.707  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-01 04:24:18.708 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-01 04:24:18.708 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-01 04:24:18.709 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-01 04:24:18.714 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-01 04:24:18.715 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-01 04:24:18.715 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-01 04:24:18.716 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-01 04:24:18.861  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-01 04:24:18.862  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-01 04:24:18.862 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-01 04:24:18.863 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-01 04:24:18.865  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-01 04:24:18.866  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-01 04:24:18.866 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-01 04:24:18.867 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-01 04:24:18.867 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-01 04:24:18.868 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-01 04:24:18.868 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-01 04:24:18.869 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-01 04:24:18.869 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-01 04:24:18.870 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-01 04:24:18.871 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-01 04:24:18.872 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-01 04:24:18.877 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 574311783879577549537239222080550188213906895225
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Nov 01 03:00:14 UTC 2022
           Final Date: Sun Oct 31 03:00:13 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [af:09:99:9f:07:9d:dd:7d:49:62:b4:7d:f7:51:6b:db:37:06:07:9e]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 4d3f0a4c1a4785014af14645412ee10f2335ec73
                       5972a9463d0b18d8c351c4f84e5f7f8518dce615
                       9473397582ad5d8cbb052ad000c6ad2af9d154b7
                       1b67f44715c62d609a2e0bc94ea7b870380557ab
                       325c22e4024fd3c86c8836f06f80d9f6086c0369
                       cf8ff833bd47fcac8f9436ab915aeb8639101ca6
                       3ff9beebf50265c1c004509ee517c4dbb61d8b2f
                       794a795abcc3cf75d5a106355acf439169710ee7
                       2e604ed489883c94a2f3a4806f3bf4eb1ff2287d
                       a31df44e9040459415a373947af81f3919ed9479
                       f4e6f7061438b700348e34c756ecc6c0b1f97f46
                       ff507827d27f592479727e9426cbfcec811aa2a5
                       aa4cd8b12d17a4e5287ac6a21167051c8aeb2d57
                       00745ba145ba2bb7757bebed2f4bff0b0a07a649
                       ea9d7e83066889098f669762eb69e537d9ad61fe
                       288dea63250fb6b2440b4a86fc069add570cc3bf
                       920439de95c77e2908b4bad39422d0e3b80cf103
                       c44024c6b89f09dfdfcf26776b9906b51d93159a
                       4a45a22ac696dfbf03ef2b6ec3fb3d70e5b881ac
                       3907e261
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [1d:c6:d0:ce:2e:f6:e6:17:ee:3f:58:96:2d:d1:32:50:2a:cc:cb:44]
            modulus: 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
    public exponent: 10001

] 
2022-11-01 04:33:22.594  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-01 04:33:22.597 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-01 04:33:22.600 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-11-01 04:33:22.600 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-01 04:33:22.601  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-11-01 04:33:22.602  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-01 04:33:22.602  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-01 04:33:22.602 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-01 04:33:22.603 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-01 04:33:22.603 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-01 04:33:22.610 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-01 04:33:22.611 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-01 04:33:22.611 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-01 04:33:22.612 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-01 04:33:22.740  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-01 04:33:22.741  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-01 04:33:22.741 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-01 04:33:22.742 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-01 04:33:22.743  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-01 04:33:22.744  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-01 04:33:22.744 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-01 04:33:22.745 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-01 04:33:22.745 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-01 04:33:22.746 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-01 04:33:22.746 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-01 04:33:22.746 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-01 04:33:22.747 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-01 04:33:22.748 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-01 04:33:22.748 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-01 04:33:22.749 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-01 04:33:22.753 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 574311783879577549537239222080550188213906895225
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Nov 01 03:00:14 UTC 2022
           Final Date: Sun Oct 31 03:00:13 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [af:09:99:9f:07:9d:dd:7d:49:62:b4:7d:f7:51:6b:db:37:06:07:9e]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 4d3f0a4c1a4785014af14645412ee10f2335ec73
                       5972a9463d0b18d8c351c4f84e5f7f8518dce615
                       9473397582ad5d8cbb052ad000c6ad2af9d154b7
                       1b67f44715c62d609a2e0bc94ea7b870380557ab
                       325c22e4024fd3c86c8836f06f80d9f6086c0369
                       cf8ff833bd47fcac8f9436ab915aeb8639101ca6
                       3ff9beebf50265c1c004509ee517c4dbb61d8b2f
                       794a795abcc3cf75d5a106355acf439169710ee7
                       2e604ed489883c94a2f3a4806f3bf4eb1ff2287d
                       a31df44e9040459415a373947af81f3919ed9479
                       f4e6f7061438b700348e34c756ecc6c0b1f97f46
                       ff507827d27f592479727e9426cbfcec811aa2a5
                       aa4cd8b12d17a4e5287ac6a21167051c8aeb2d57
                       00745ba145ba2bb7757bebed2f4bff0b0a07a649
                       ea9d7e83066889098f669762eb69e537d9ad61fe
                       288dea63250fb6b2440b4a86fc069add570cc3bf
                       920439de95c77e2908b4bad39422d0e3b80cf103
                       c44024c6b89f09dfdfcf26776b9906b51d93159a
                       4a45a22ac696dfbf03ef2b6ec3fb3d70e5b881ac
                       3907e261
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [55:aa:8b:4b:c2:aa:12:5a:2c:86:45:38:20:b9:ab:eb:76:10:f7:67]
            modulus: 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
    public exponent: 10001

] 
2022-11-01 04:37:51.386  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-01 04:37:51.390 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-01 04:37:51.392 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-11-01 04:37:51.392 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-01 04:37:51.393  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-11-01 04:37:51.393  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-01 04:37:51.394  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-01 04:37:51.394 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-01 04:37:51.394 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-01 04:37:51.395 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-01 04:37:51.399 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-01 04:37:51.400 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-01 04:37:51.400 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-01 04:37:51.400 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-01 04:37:51.515  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-01 04:37:51.515  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-01 04:37:51.516 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-01 04:37:51.516 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-01 04:37:51.517  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-01 04:37:51.517  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-01 04:37:51.518 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-01 04:37:51.518 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-01 04:37:51.518 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-01 04:37:51.519 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-01 04:37:51.519 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-01 04:37:51.520 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-01 04:37:51.520 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-01 04:37:51.520 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-01 04:37:51.521 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-01 04:37:51.521 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-01 04:37:51.524 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 574311783879577549537239222080550188213906895225
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Nov 01 03:00:14 UTC 2022
           Final Date: Sun Oct 31 03:00:13 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [af:09:99:9f:07:9d:dd:7d:49:62:b4:7d:f7:51:6b:db:37:06:07:9e]
            modulus: cff6d2ed7a4a974eee77046253cd3b251d14e011c3fc544416c6e14d580c8fda0b74723260a5397c728a254a241e78e51579482c8312606eb7ce751daf1c7e35280176276b95fff083f9d4cd46a2edbfcc868576b686412e7eaa61e120a23f7e4c998dac03340c683dc1a8e2154abcf76a3b63ce1c915aff455a8580733765959ae7f8badbc4ed3ff6b54c7dbbbd04e854a1de7aaf603064a869962fb08bec9f6fc542fcfdd73233bc969a87f72b919b58b84981fb80a2158ffffbac0fa780f01be7710305ff8bbb4e486c69719babee9c25db66b515b4a2574e85207a4b943b4ec1aee0be87fdb7967e0189cb9cff517df3b9a737d5fad5eda58bfdb800eb0a3e7173b0778848f9c91674c95bcdcc09ac0f7591da572b06645087b8f83c574ec5a9386d4847120b98b157c4003a40efa04d6a102666597204057be6665373bd6b5794f5a7674f3bb5e505160ccc795af79bd0c84bd7b96268ec5d9f9373bad10b5b2cc3a4415e11ffa3f2de175c52e361e8dddb47423c650a38153e691c35d9
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 4d3f0a4c1a4785014af14645412ee10f2335ec73
                       5972a9463d0b18d8c351c4f84e5f7f8518dce615
                       9473397582ad5d8cbb052ad000c6ad2af9d154b7
                       1b67f44715c62d609a2e0bc94ea7b870380557ab
                       325c22e4024fd3c86c8836f06f80d9f6086c0369
                       cf8ff833bd47fcac8f9436ab915aeb8639101ca6
                       3ff9beebf50265c1c004509ee517c4dbb61d8b2f
                       794a795abcc3cf75d5a106355acf439169710ee7
                       2e604ed489883c94a2f3a4806f3bf4eb1ff2287d
                       a31df44e9040459415a373947af81f3919ed9479
                       f4e6f7061438b700348e34c756ecc6c0b1f97f46
                       ff507827d27f592479727e9426cbfcec811aa2a5
                       aa4cd8b12d17a4e5287ac6a21167051c8aeb2d57
                       00745ba145ba2bb7757bebed2f4bff0b0a07a649
                       ea9d7e83066889098f669762eb69e537d9ad61fe
                       288dea63250fb6b2440b4a86fc069add570cc3bf
                       920439de95c77e2908b4bad39422d0e3b80cf103
                       c44024c6b89f09dfdfcf26776b9906b51d93159a
                       4a45a22ac696dfbf03ef2b6ec3fb3d70e5b881ac
                       3907e261
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [c3:42:d4:5a:fe:6d:1e:50:20:d7:f9:a8:0a:d0:88:2f:63:d3:24:ed]
            modulus: ba2715d74b1578dd3103f7484dc25631af1d8019d32e60d44844ac460394695c1174ef81fd1478e160c584d914efa1fa16d6ec9d854f54c7a846cae45fdd8432b8781124eb7d9bc9dd8355d974f10ec3ea962b15194c39a02ba2510cb631cf25aea7a09d7e6295f580d150dee92a53c3052da303222b3c88d91843f361fd77b4c31ea80e1bf7efe9fdafc8798f1132786110ba32ded059f44da784c41efb8723f202d9060e99563798cbf9e2a4fbbd0b0fc4925b14d5f9ac0c453af7c6f06ffdd8317204fc0802afee2b38161d8d13f0a8bcd75510d80c5735e489b1fd64265bd2e6f62cc9f8811df1a5f5d2058b0d61bb82ccd0971f120abc457e409213f019
    public exponent: 10001

] 
2022-11-01 04:38:08.742  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-01 04:38:08.743 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-01 04:38:08.745 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-11-01 04:38:08.745 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-01 04:38:08.746  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-11-01 04:38:08.746  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-01 04:38:08.747  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-01 04:38:08.747 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-01 04:38:08.747 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-01 04:38:08.748 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-01 04:38:08.752 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-01 04:38:08.753 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-01 04:38:08.753 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-01 04:38:08.754 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-01 04:38:08.857  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-01 04:38:08.858  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-01 04:38:08.858 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-01 04:38:08.858 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-01 04:38:08.860  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-01 04:38:08.860  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-01 04:38:08.860 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-01 04:38:08.861 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-01 04:38:08.861 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-01 04:38:08.862 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-01 04:38:08.862 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-01 04:38:08.862 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-01 04:38:08.863 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-01 04:38:08.863 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-01 04:38:08.864 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-01 04:38:08.865 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-01 04:38:08.868 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 574311783879577549537239222080550188213906895225
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Nov 01 03:00:14 UTC 2022
           Final Date: Sun Oct 31 03:00:13 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [af:09:99:9f:07:9d:dd:7d:49:62:b4:7d:f7:51:6b:db:37:06:07:9e]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 4d3f0a4c1a4785014af14645412ee10f2335ec73
                       5972a9463d0b18d8c351c4f84e5f7f8518dce615
                       9473397582ad5d8cbb052ad000c6ad2af9d154b7
                       1b67f44715c62d609a2e0bc94ea7b870380557ab
                       325c22e4024fd3c86c8836f06f80d9f6086c0369
                       cf8ff833bd47fcac8f9436ab915aeb8639101ca6
                       3ff9beebf50265c1c004509ee517c4dbb61d8b2f
                       794a795abcc3cf75d5a106355acf439169710ee7
                       2e604ed489883c94a2f3a4806f3bf4eb1ff2287d
                       a31df44e9040459415a373947af81f3919ed9479
                       f4e6f7061438b700348e34c756ecc6c0b1f97f46
                       ff507827d27f592479727e9426cbfcec811aa2a5
                       aa4cd8b12d17a4e5287ac6a21167051c8aeb2d57
                       00745ba145ba2bb7757bebed2f4bff0b0a07a649
                       ea9d7e83066889098f669762eb69e537d9ad61fe
                       288dea63250fb6b2440b4a86fc069add570cc3bf
                       920439de95c77e2908b4bad39422d0e3b80cf103
                       c44024c6b89f09dfdfcf26776b9906b51d93159a
                       4a45a22ac696dfbf03ef2b6ec3fb3d70e5b881ac
                       3907e261
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [d3:3b:49:98:93:6d:5a:99:ec:05:20:17:1f:c9:b3:03:1a:71:52:bf]
            modulus: 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
    public exponent: 10001

]