Results

By type

          2022-11-22 02:58:13,637 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-11-22 02:58:14,800 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-11-22 02:58:15.627  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Nov 22, 2022 2:58:17 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Nov 22, 2022 2:58:17 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Nov 22, 2022 2:58:17 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Nov 22, 2022 2:58:17 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-11-22 02:58:18.358 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-11-22 02:58:18.697  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-11-22 02:58:18.874  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-11-22 02:58:19.612 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-11-22 02:58:19.615 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
2022-11-22 02:58:19.616 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-11-22 02:58:19.620 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-11-22 02:58:19.659 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
2022-11-22 02:58:19.662 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
	{GET [/docs]}: redirectToUi(HttpServletRequest)
2022-11-22 02:58:19.793 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-11-22 02:58:20.500 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Nov 22, 2022 2:58:21 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-11-22 02:58:21.439  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 8.592 seconds (JVM running for 10.428)
Nov 22, 2022 2:58:51 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-11-22 02:59:04.434  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-22 02:59:04.443 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-22 02:59:04.484 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-11-22 02:59:04.487 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-22 02:59:04.503  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-11-22 02:59:04.505  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-22 02:59:04.506  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-22 02:59:04.508 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-22 02:59:04.508 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-22 02:59:04.512 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-22 02:59:04.521 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-22 02:59:04.525 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-22 02:59:04.586 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-22 02:59:04.593 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-22 02:59:04.594 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-22 02:59:04.598 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-22 02:59:05.258  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-22 02:59:05.263  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-22 02:59:05.264 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-22 02:59:05.266 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-22 02:59:05.282  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-22 02:59:05.284  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-22 02:59:05.285 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-22 02:59:05.286 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-22 02:59:05.286 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-22 02:59:05.312 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-22 02:59:05.313 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-22 02:59:05.313 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-22 02:59:05.320 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-22 02:59:05.321 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-22 02:59:05.321 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-22 02:59:05.322 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-22 02:59:05.355 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 138252980814687483962228627869935475982343265872
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Nov 22 02:55:56 UTC 2022
           Final Date: Sun Nov 21 02:55:55 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [54:32:35:36:66:f5:54:c2:86:98:eb:2a:b0:ae:1c:19:bf:9e:46:87],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: b2b98c507351b5ae59faff4d6dac8ba720b38af7
                       8922c94e4f1bac10625d3127bc0984b702f88581
                       c0cbe454d3606253a46b84289e5452b1bfd9e7be
                       ec8a83a230d78acdba653e56a76e4dc59dcfffc5
                       1eafce3d23b3151bff9513d63e73d3998b445001
                       a4d48746d5c3454bfb8dbcb5700623aab419f036
                       403e9d3cdcfd7c981504a8116f7821500a344764
                       bbc163b99d691d08f37936d263416d581ce6e681
                       78651843247831e225456f7a5cac38d5024c50ee
                       bdd49b6a885d6e78d87f74bf17f5ae01e68beaaa
                       475d1c30b838326761b5dc5f3c354f0fb25d0f1a
                       223518915cf25642034d305beed45e6e399bdd9e
                       97b6e1f54f83f05d40692a131f568afc9573ec8e
                       853ab8fae8b39957355bf92cbe94409ec122823d
                       f5640c8a28bf9764ee31a982fcdf5ac0264a8aaa
                       2aa371d5697688d8ebee6512df1d1425f974faba
                       dbd1ecff70ae32680ecc6f0fe1dbc960b48cefe2
                       83fe98ddd1d83addd9629703925dc026ad88f9d7
                       65656a5abb8951d3e5c113319c28ffb377230dc4
                       b9393487
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [91:25:a6:62:7c:99:9a:4d:cd:2d:d5:33:c7:ae:d0:1f:c9:c9:30:ec],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-11-22 04:40:20.661  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-22 04:40:20.664 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-22 04:40:20.667 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-22 04:40:20.668 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-22 04:40:20.668  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-22 04:40:20.669  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-22 04:40:20.670  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-22 04:40:20.670 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-22 04:40:20.670 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-22 04:40:20.671 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-22 04:40:20.675 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-22 04:40:20.676 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-22 04:40:20.677 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-22 04:40:20.677 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-22 04:40:20.907  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-22 04:40:20.909  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-22 04:40:20.910 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-22 04:40:20.910 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-22 04:40:20.915  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-22 04:40:20.916  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-22 04:40:20.917 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-22 04:40:20.917 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-22 04:40:20.918 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-22 04:40:20.920 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-22 04:40:20.920 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-22 04:40:20.921 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-22 04:40:20.922 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-22 04:40:20.923 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-22 04:40:20.923 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-22 04:40:20.925 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-22 04:40:20.930 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 138252980814687483962228627869935475982343265872
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Nov 22 02:55:56 UTC 2022
           Final Date: Sun Nov 21 02:55:55 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [54:32:35:36:66:f5:54:c2:86:98:eb:2a:b0:ae:1c:19:bf:9e:46:87],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: b2b98c507351b5ae59faff4d6dac8ba720b38af7
                       8922c94e4f1bac10625d3127bc0984b702f88581
                       c0cbe454d3606253a46b84289e5452b1bfd9e7be
                       ec8a83a230d78acdba653e56a76e4dc59dcfffc5
                       1eafce3d23b3151bff9513d63e73d3998b445001
                       a4d48746d5c3454bfb8dbcb5700623aab419f036
                       403e9d3cdcfd7c981504a8116f7821500a344764
                       bbc163b99d691d08f37936d263416d581ce6e681
                       78651843247831e225456f7a5cac38d5024c50ee
                       bdd49b6a885d6e78d87f74bf17f5ae01e68beaaa
                       475d1c30b838326761b5dc5f3c354f0fb25d0f1a
                       223518915cf25642034d305beed45e6e399bdd9e
                       97b6e1f54f83f05d40692a131f568afc9573ec8e
                       853ab8fae8b39957355bf92cbe94409ec122823d
                       f5640c8a28bf9764ee31a982fcdf5ac0264a8aaa
                       2aa371d5697688d8ebee6512df1d1425f974faba
                       dbd1ecff70ae32680ecc6f0fe1dbc960b48cefe2
                       83fe98ddd1d83addd9629703925dc026ad88f9d7
                       65656a5abb8951d3e5c113319c28ffb377230dc4
                       b9393487
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [84:2e:d7:58:20:d2:e7:d3:75:14:7b:2e:48:37:98:0d:69:da:d4:62],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-11-22 04:42:09.775  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-22 04:42:09.777 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-22 04:42:09.780 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-11-22 04:42:09.781 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-22 04:42:09.781  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-11-22 04:42:09.782  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-22 04:42:09.782  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-22 04:42:09.783 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-22 04:42:09.784 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-22 04:42:09.785 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-22 04:42:09.790 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-22 04:42:09.791 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-22 04:42:09.792 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-22 04:42:09.792 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-22 04:42:09.936  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-22 04:42:09.936  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-22 04:42:09.937 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-22 04:42:09.937 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-22 04:42:09.939  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-22 04:42:09.939  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-22 04:42:09.940 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-22 04:42:09.940 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-22 04:42:09.940 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-22 04:42:09.941 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-22 04:42:09.942 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-22 04:42:09.942 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-22 04:42:09.943 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-22 04:42:09.943 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-22 04:42:09.944 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-22 04:42:09.945 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-22 04:42:09.948 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 138252980814687483962228627869935475982343265872
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Nov 22 02:55:56 UTC 2022
           Final Date: Sun Nov 21 02:55:55 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [54:32:35:36:66:f5:54:c2:86:98:eb:2a:b0:ae:1c:19:bf:9e:46:87],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: b2b98c507351b5ae59faff4d6dac8ba720b38af7
                       8922c94e4f1bac10625d3127bc0984b702f88581
                       c0cbe454d3606253a46b84289e5452b1bfd9e7be
                       ec8a83a230d78acdba653e56a76e4dc59dcfffc5
                       1eafce3d23b3151bff9513d63e73d3998b445001
                       a4d48746d5c3454bfb8dbcb5700623aab419f036
                       403e9d3cdcfd7c981504a8116f7821500a344764
                       bbc163b99d691d08f37936d263416d581ce6e681
                       78651843247831e225456f7a5cac38d5024c50ee
                       bdd49b6a885d6e78d87f74bf17f5ae01e68beaaa
                       475d1c30b838326761b5dc5f3c354f0fb25d0f1a
                       223518915cf25642034d305beed45e6e399bdd9e
                       97b6e1f54f83f05d40692a131f568afc9573ec8e
                       853ab8fae8b39957355bf92cbe94409ec122823d
                       f5640c8a28bf9764ee31a982fcdf5ac0264a8aaa
                       2aa371d5697688d8ebee6512df1d1425f974faba
                       dbd1ecff70ae32680ecc6f0fe1dbc960b48cefe2
                       83fe98ddd1d83addd9629703925dc026ad88f9d7
                       65656a5abb8951d3e5c113319c28ffb377230dc4
                       b9393487
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [27:6a:be:33:65:55:1f:f5:7b:03:66:ab:3f:cd:80:90:ee:36:67:a0],[56:66:d1:a4]
        modulus: e6af7009bbcb1172e472cb6831f6fa7e23d5828fa24b2dd9e4cf53ba7a695d704c1235058c2df4750f216cf53d442d23579353a53b0c256c9cdc5058c6cb673b02db7ecffe1f6eeff3e122ea8da3abf5b9cb3835b513c1858f9d874c73711fce2e51888f5a091f21e22edc6048a0eb32a5e3f1c6b2726fb12b5bcbb8ed1b3ba262ec4534adc28b9504a0cc7521d6d8d9126d84c5158e4f5fe8537b99ace2e51e213bbd33c959a12732ca2377c1bcc3b2282dd37b93ab5271a3c015fd1cf28a6c2352051446be31c61ea18611e2bfada1a35338cf80af0530f5de4e3ceb86f09dfe2121a4cbb1dc70c0b1631f4d4a1ff9f29639e0b48d2852d97505cf2b63ad55
public exponent: 10001

] 
2022-11-22 04:43:49.868  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-22 04:43:49.871 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-22 04:43:49.873 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-11-22 04:43:49.874 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-22 04:43:49.875  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-11-22 04:43:49.876  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-22 04:43:49.876  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-22 04:43:49.877 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-22 04:43:49.878 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-22 04:43:49.878 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-22 04:43:49.883 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-22 04:43:49.884 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-22 04:43:49.884 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-22 04:43:49.885 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-22 04:43:50.029  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-22 04:43:50.030  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-22 04:43:50.031 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-22 04:43:50.031 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-22 04:43:50.033  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-22 04:43:50.034  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-22 04:43:50.034 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-22 04:43:50.035 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-22 04:43:50.035 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-22 04:43:50.036 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-22 04:43:50.036 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-22 04:43:50.037 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-22 04:43:50.038 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-22 04:43:50.038 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-22 04:43:50.039 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-22 04:43:50.039 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-22 04:43:50.045 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 138252980814687483962228627869935475982343265872
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Nov 22 02:55:56 UTC 2022
           Final Date: Sun Nov 21 02:55:55 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [54:32:35:36:66:f5:54:c2:86:98:eb:2a:b0:ae:1c:19:bf:9e:46:87],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: b2b98c507351b5ae59faff4d6dac8ba720b38af7
                       8922c94e4f1bac10625d3127bc0984b702f88581
                       c0cbe454d3606253a46b84289e5452b1bfd9e7be
                       ec8a83a230d78acdba653e56a76e4dc59dcfffc5
                       1eafce3d23b3151bff9513d63e73d3998b445001
                       a4d48746d5c3454bfb8dbcb5700623aab419f036
                       403e9d3cdcfd7c981504a8116f7821500a344764
                       bbc163b99d691d08f37936d263416d581ce6e681
                       78651843247831e225456f7a5cac38d5024c50ee
                       bdd49b6a885d6e78d87f74bf17f5ae01e68beaaa
                       475d1c30b838326761b5dc5f3c354f0fb25d0f1a
                       223518915cf25642034d305beed45e6e399bdd9e
                       97b6e1f54f83f05d40692a131f568afc9573ec8e
                       853ab8fae8b39957355bf92cbe94409ec122823d
                       f5640c8a28bf9764ee31a982fcdf5ac0264a8aaa
                       2aa371d5697688d8ebee6512df1d1425f974faba
                       dbd1ecff70ae32680ecc6f0fe1dbc960b48cefe2
                       83fe98ddd1d83addd9629703925dc026ad88f9d7
                       65656a5abb8951d3e5c113319c28ffb377230dc4
                       b9393487
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [f9:43:61:9c:7c:9c:d2:45:dd:33:85:53:ae:6b:7a:29:7a:64:9c:5b],[56:66:d1:a4]
        modulus: bf6922f5068a2f605afa39b80914392346e3154326df207cf368851b9f6e504a3134651ce1a7128bf326e6d68a284fbfe53f74e664f764551b03c99a18402e37247aa77647bc40e311817be8056d947959d9a7d84eb53d452ca27c33f21c97e1084c890850fd86aaf6cd6523683631dec765230e35a66287a3e9de5615eba6f1803ee2e2d40066484f02ab98d97fb68c2ed2239b3c244914640974a0a8eb525c97ba8873f9fac2592cebe069d508f16312d142bbab029dbe48c2c19cbec305ec68720630f6cf282f851a54aa872b609f624ebc39cf10c82d322c12c336c2d6ae8cefc9d5089773dc053dfc4f9c6166e7060d095365787552db3c09ddddff0da1
public exponent: 10001

] 
2022-11-22 04:46:30.923  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-22 04:46:30.924 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-22 04:46:30.926 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-22 04:46:30.926 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-22 04:46:30.927  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-22 04:46:30.927  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-22 04:46:30.928  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-22 04:46:30.928 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-22 04:46:30.928 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-22 04:46:30.929 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-22 04:46:30.935 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-22 04:46:30.935 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-22 04:46:30.936 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-22 04:46:30.936 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-22 04:46:31.080  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-22 04:46:31.081  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-22 04:46:31.081 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-22 04:46:31.082 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-22 04:46:31.083  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-22 04:46:31.084  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-22 04:46:31.084 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-22 04:46:31.085 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-22 04:46:31.085 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-22 04:46:31.086 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-22 04:46:31.086 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-22 04:46:31.087 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-22 04:46:31.087 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-22 04:46:31.088 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-22 04:46:31.088 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-22 04:46:31.089 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-22 04:46:31.094 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 138252980814687483962228627869935475982343265872
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Nov 22 02:55:56 UTC 2022
           Final Date: Sun Nov 21 02:55:55 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [54:32:35:36:66:f5:54:c2:86:98:eb:2a:b0:ae:1c:19:bf:9e:46:87],[56:66:d1:a4]
        modulus: b2dfcb8e927b4e65f059f49febd53f02236b940294d48d3e29eaf75f56e845d6b6d940b838efdcad74bcb0bfb8535e83ed3cc3790d4bb7ccb6bb7e84c340c050c9e0b882c135f94e0980cbe00e34edcd355082ca8ec6b0e4557163b2d48a68e4a0e2f8646b905146d9edac1297c0e69cfab675bb2ed1087b610f1c59f7b8c6bcf5a605dcef8b75a8d086b049a5957dc0cd86c57f9d380f736cc2bdf0595dd007015ad2c66f36f2e1ac0f3cc8a7c14158beb3a7c0910e3b317ad9ca7934dc58521f460992f226f3e8907eb3a66ec5d09088f23607f6b9354d0574b86ff480fbff1427132b2fc8f2a784d414c75b6fc68e731fbc5ab595e6b69a40d7386cab11a495eabe43a085ea43cc33021cd3b91f703d346fd3ecc6ad4cda6f5da42567aae135bf4ed0bdd122c0c4ef0b6f985cdd99ee34a8c02e8c49110233ea2743f475c3a6f03747b8e74ec2515a42ae40cdb4a4d8d976b315e60fcfda7d87d3e78276c337159291216fb01c6f393f21355cd3825936823cbba854da433ce2768a9d8329
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: b2b98c507351b5ae59faff4d6dac8ba720b38af7
                       8922c94e4f1bac10625d3127bc0984b702f88581
                       c0cbe454d3606253a46b84289e5452b1bfd9e7be
                       ec8a83a230d78acdba653e56a76e4dc59dcfffc5
                       1eafce3d23b3151bff9513d63e73d3998b445001
                       a4d48746d5c3454bfb8dbcb5700623aab419f036
                       403e9d3cdcfd7c981504a8116f7821500a344764
                       bbc163b99d691d08f37936d263416d581ce6e681
                       78651843247831e225456f7a5cac38d5024c50ee
                       bdd49b6a885d6e78d87f74bf17f5ae01e68beaaa
                       475d1c30b838326761b5dc5f3c354f0fb25d0f1a
                       223518915cf25642034d305beed45e6e399bdd9e
                       97b6e1f54f83f05d40692a131f568afc9573ec8e
                       853ab8fae8b39957355bf92cbe94409ec122823d
                       f5640c8a28bf9764ee31a982fcdf5ac0264a8aaa
                       2aa371d5697688d8ebee6512df1d1425f974faba
                       dbd1ecff70ae32680ecc6f0fe1dbc960b48cefe2
                       83fe98ddd1d83addd9629703925dc026ad88f9d7
                       65656a5abb8951d3e5c113319c28ffb377230dc4
                       b9393487
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [50:f9:9f:d5:aa:22:18:25:07:1c:6d:8f:7e:c4:21:96:62:1e:7b:61],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-11-22 04:53:32.772  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-22 04:53:32.775 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-22 04:53:32.778 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-22 04:53:32.779 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-22 04:53:32.780  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-22 04:53:32.781  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-22 04:53:32.782  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-22 04:53:32.782 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-22 04:53:32.783 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-22 04:53:32.784 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-22 04:53:32.790 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-22 04:53:32.791 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-22 04:53:32.792 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-22 04:53:32.792 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-22 04:53:32.931  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-22 04:53:32.932  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-22 04:53:32.932 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-22 04:53:32.932 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-22 04:53:32.934  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-22 04:53:32.934  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-22 04:53:32.935 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-22 04:53:32.935 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-22 04:53:32.935 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-22 04:53:32.936 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-22 04:53:32.937 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-22 04:53:32.937 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-22 04:53:32.937 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-22 04:53:32.938 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-22 04:53:32.938 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-22 04:53:32.939 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-22 04:53:32.942 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 138252980814687483962228627869935475982343265872
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Nov 22 02:55:56 UTC 2022
           Final Date: Sun Nov 21 02:55:55 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [54:32:35:36:66:f5:54:c2:86:98:eb:2a:b0:ae:1c:19:bf:9e:46:87],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: b2b98c507351b5ae59faff4d6dac8ba720b38af7
                       8922c94e4f1bac10625d3127bc0984b702f88581
                       c0cbe454d3606253a46b84289e5452b1bfd9e7be
                       ec8a83a230d78acdba653e56a76e4dc59dcfffc5
                       1eafce3d23b3151bff9513d63e73d3998b445001
                       a4d48746d5c3454bfb8dbcb5700623aab419f036
                       403e9d3cdcfd7c981504a8116f7821500a344764
                       bbc163b99d691d08f37936d263416d581ce6e681
                       78651843247831e225456f7a5cac38d5024c50ee
                       bdd49b6a885d6e78d87f74bf17f5ae01e68beaaa
                       475d1c30b838326761b5dc5f3c354f0fb25d0f1a
                       223518915cf25642034d305beed45e6e399bdd9e
                       97b6e1f54f83f05d40692a131f568afc9573ec8e
                       853ab8fae8b39957355bf92cbe94409ec122823d
                       f5640c8a28bf9764ee31a982fcdf5ac0264a8aaa
                       2aa371d5697688d8ebee6512df1d1425f974faba
                       dbd1ecff70ae32680ecc6f0fe1dbc960b48cefe2
                       83fe98ddd1d83addd9629703925dc026ad88f9d7
                       65656a5abb8951d3e5c113319c28ffb377230dc4
                       b9393487
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [c2:06:44:a7:9f:e2:1d:1d:7d:8e:1e:c7:e9:13:dd:67:ae:3a:8a:0f],[56:66:d1:a4]
        modulus: c293c0dafc70374535b74cde2d322fd78d79c04336dc46dda896a16daa822ab793587353c821e6ca38265c1d16c7d7d91013ece499a5d6c03bf699de5af9b189dd87e47e84855a8d02e1187a2a537f56f4580d6319b09b3a05414aedb8212359edba49179fec56266782ece96de0742c93e841f7acb7d8083b79212bd5b362e7836114dab73e4f999050fe9a5ee1378ba662db6d5deb3c72fd99b711829ec52b09e857935e1d3a410736f5425de33b575a1705c2e1c584516220c498a31764edb41f6976f3afc4b996271f395692c846e05d2b199160db6708558641f137ded363886743fdc06c34f8a93724e66b640296d2b5a04a05116ae959e2f622307fa7
public exponent: 10001

] 
2022-11-22 04:58:38.919  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-22 04:58:38.923 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-22 04:58:38.926 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-22 04:58:38.926 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-22 04:58:38.927  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-22 04:58:38.928  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-22 04:58:38.928  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-22 04:58:38.929 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-22 04:58:38.929 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-22 04:58:38.930 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-22 04:58:38.938 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-22 04:58:38.939 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-22 04:58:38.940 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-22 04:58:38.940 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-22 04:58:39.084  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-22 04:58:39.086  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-22 04:58:39.086 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-22 04:58:39.087 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-22 04:58:39.089  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-22 04:58:39.089  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-22 04:58:39.090 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-22 04:58:39.090 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-22 04:58:39.091 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-22 04:58:39.092 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-22 04:58:39.092 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-22 04:58:39.093 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-22 04:58:39.094 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-22 04:58:39.095 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-22 04:58:39.095 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-22 04:58:39.096 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-22 04:58:39.101 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 138252980814687483962228627869935475982343265872
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Nov 22 02:55:56 UTC 2022
           Final Date: Sun Nov 21 02:55:55 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [54:32:35:36:66:f5:54:c2:86:98:eb:2a:b0:ae:1c:19:bf:9e:46:87],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: b2b98c507351b5ae59faff4d6dac8ba720b38af7
                       8922c94e4f1bac10625d3127bc0984b702f88581
                       c0cbe454d3606253a46b84289e5452b1bfd9e7be
                       ec8a83a230d78acdba653e56a76e4dc59dcfffc5
                       1eafce3d23b3151bff9513d63e73d3998b445001
                       a4d48746d5c3454bfb8dbcb5700623aab419f036
                       403e9d3cdcfd7c981504a8116f7821500a344764
                       bbc163b99d691d08f37936d263416d581ce6e681
                       78651843247831e225456f7a5cac38d5024c50ee
                       bdd49b6a885d6e78d87f74bf17f5ae01e68beaaa
                       475d1c30b838326761b5dc5f3c354f0fb25d0f1a
                       223518915cf25642034d305beed45e6e399bdd9e
                       97b6e1f54f83f05d40692a131f568afc9573ec8e
                       853ab8fae8b39957355bf92cbe94409ec122823d
                       f5640c8a28bf9764ee31a982fcdf5ac0264a8aaa
                       2aa371d5697688d8ebee6512df1d1425f974faba
                       dbd1ecff70ae32680ecc6f0fe1dbc960b48cefe2
                       83fe98ddd1d83addd9629703925dc026ad88f9d7
                       65656a5abb8951d3e5c113319c28ffb377230dc4
                       b9393487
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [8e:e3:47:0d:f0:30:d5:15:56:61:39:e6:08:79:c6:93:fb:03:9e:da],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-11-22 05:05:37.409  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-22 05:05:37.411 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-22 05:05:37.414 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-11-22 05:05:37.416 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-22 05:05:37.416  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-11-22 05:05:37.417  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-22 05:05:37.418  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-22 05:05:37.419 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-22 05:05:37.420 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-22 05:05:37.420 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-22 05:05:37.425 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-22 05:05:37.426 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-22 05:05:37.427 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-22 05:05:37.427 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-22 05:05:37.640  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-22 05:05:37.640  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-22 05:05:37.641 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-22 05:05:37.641 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-22 05:05:37.643  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-22 05:05:37.643  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-22 05:05:37.644 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-22 05:05:37.644 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-22 05:05:37.645 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-22 05:05:37.645 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-22 05:05:37.646 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-22 05:05:37.646 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-22 05:05:37.647 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-22 05:05:37.647 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-22 05:05:37.648 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-22 05:05:37.649 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-22 05:05:37.652 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 138252980814687483962228627869935475982343265872
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Nov 22 02:55:56 UTC 2022
           Final Date: Sun Nov 21 02:55:55 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [54:32:35:36:66:f5:54:c2:86:98:eb:2a:b0:ae:1c:19:bf:9e:46:87],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: b2b98c507351b5ae59faff4d6dac8ba720b38af7
                       8922c94e4f1bac10625d3127bc0984b702f88581
                       c0cbe454d3606253a46b84289e5452b1bfd9e7be
                       ec8a83a230d78acdba653e56a76e4dc59dcfffc5
                       1eafce3d23b3151bff9513d63e73d3998b445001
                       a4d48746d5c3454bfb8dbcb5700623aab419f036
                       403e9d3cdcfd7c981504a8116f7821500a344764
                       bbc163b99d691d08f37936d263416d581ce6e681
                       78651843247831e225456f7a5cac38d5024c50ee
                       bdd49b6a885d6e78d87f74bf17f5ae01e68beaaa
                       475d1c30b838326761b5dc5f3c354f0fb25d0f1a
                       223518915cf25642034d305beed45e6e399bdd9e
                       97b6e1f54f83f05d40692a131f568afc9573ec8e
                       853ab8fae8b39957355bf92cbe94409ec122823d
                       f5640c8a28bf9764ee31a982fcdf5ac0264a8aaa
                       2aa371d5697688d8ebee6512df1d1425f974faba
                       dbd1ecff70ae32680ecc6f0fe1dbc960b48cefe2
                       83fe98ddd1d83addd9629703925dc026ad88f9d7
                       65656a5abb8951d3e5c113319c28ffb377230dc4
                       b9393487
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [e3:19:52:01:9b:4e:d1:b9:4e:ca:14:5b:eb:58:a6:67:32:cb:13:f7],[56:66:d1:a4]
        modulus: b08f87eb8854137c3525a55625fd0b6cb478d6b0fae7f01c1f2963f951d650db3d951581a3ce6937db4f72a0dc95b04661fadfda0cf63b1374a10883b7e61508368c4d173c269795a4530f978ca3876d71ab5cdb278c61517ea3cfb6aa6fb602d7671d92d93f01200f48fdbf008f9aeff98a44d2d166e811dfd1e3af56200573767cfe647fa130a8a89623fd666d9fbe04c48dd57e0398c1f8c7aef805afbec3bd47f1d0c4c976c0310d299922c9ee10590924c19bcbec1188cb61146b0b3fd5b94376fcc7d0646463d028980893d0f5b5996b78aafd05b96e0e0a7d8f71010b3c081d84eec360331f43d9a67b7afb9652daa5d7a598848223b30b73e4e69dcd
public exponent: 10001

] 
2022-11-22 05:11:26.763  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-22 05:11:26.766 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-22 05:11:26.768 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-11-22 05:11:26.769 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-22 05:11:26.770  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-11-22 05:11:26.770  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-22 05:11:26.770  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-22 05:11:26.771 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-22 05:11:26.772 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-22 05:11:26.772 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-22 05:11:26.776 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-22 05:11:26.777 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-22 05:11:26.778 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-22 05:11:26.778 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-22 05:11:27.000  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-22 05:11:27.001  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-22 05:11:27.001 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-22 05:11:27.001 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-22 05:11:27.004  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-22 05:11:27.005  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-22 05:11:27.005 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-22 05:11:27.005 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-22 05:11:27.006 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-22 05:11:27.007 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-22 05:11:27.007 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-22 05:11:27.007 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-22 05:11:27.008 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-22 05:11:27.008 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-22 05:11:27.008 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-22 05:11:27.009 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-22 05:11:27.013 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 138252980814687483962228627869935475982343265872
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Nov 22 02:55:56 UTC 2022
           Final Date: Sun Nov 21 02:55:55 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [54:32:35:36:66:f5:54:c2:86:98:eb:2a:b0:ae:1c:19:bf:9e:46:87],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: b2b98c507351b5ae59faff4d6dac8ba720b38af7
                       8922c94e4f1bac10625d3127bc0984b702f88581
                       c0cbe454d3606253a46b84289e5452b1bfd9e7be
                       ec8a83a230d78acdba653e56a76e4dc59dcfffc5
                       1eafce3d23b3151bff9513d63e73d3998b445001
                       a4d48746d5c3454bfb8dbcb5700623aab419f036
                       403e9d3cdcfd7c981504a8116f7821500a344764
                       bbc163b99d691d08f37936d263416d581ce6e681
                       78651843247831e225456f7a5cac38d5024c50ee
                       bdd49b6a885d6e78d87f74bf17f5ae01e68beaaa
                       475d1c30b838326761b5dc5f3c354f0fb25d0f1a
                       223518915cf25642034d305beed45e6e399bdd9e
                       97b6e1f54f83f05d40692a131f568afc9573ec8e
                       853ab8fae8b39957355bf92cbe94409ec122823d
                       f5640c8a28bf9764ee31a982fcdf5ac0264a8aaa
                       2aa371d5697688d8ebee6512df1d1425f974faba
                       dbd1ecff70ae32680ecc6f0fe1dbc960b48cefe2
                       83fe98ddd1d83addd9629703925dc026ad88f9d7
                       65656a5abb8951d3e5c113319c28ffb377230dc4
                       b9393487
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [5e:b4:0f:92:ce:55:a6:a7:92:4e:23:e3:43:97:ed:55:ed:9a:31:b1],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-11-22 05:11:45.101  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-22 05:11:45.102 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-22 05:11:45.103 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-11-22 05:11:45.104 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-22 05:11:45.104  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-11-22 05:11:45.105  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-22 05:11:45.105  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-22 05:11:45.105 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-22 05:11:45.106 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-22 05:11:45.106 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-22 05:11:45.113 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-22 05:11:45.114 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-22 05:11:45.114 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-22 05:11:45.115 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-22 05:11:45.228  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-22 05:11:45.228  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-22 05:11:45.229 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-22 05:11:45.229 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-22 05:11:45.230  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-22 05:11:45.230  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-22 05:11:45.231 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-22 05:11:45.231 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-22 05:11:45.231 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-22 05:11:45.232 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-22 05:11:45.232 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-22 05:11:45.233 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-22 05:11:45.233 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-22 05:11:45.233 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-22 05:11:45.234 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-22 05:11:45.234 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-22 05:11:45.237 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 138252980814687483962228627869935475982343265872
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Nov 22 02:55:56 UTC 2022
           Final Date: Sun Nov 21 02:55:55 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [54:32:35:36:66:f5:54:c2:86:98:eb:2a:b0:ae:1c:19:bf:9e:46:87],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: b2b98c507351b5ae59faff4d6dac8ba720b38af7
                       8922c94e4f1bac10625d3127bc0984b702f88581
                       c0cbe454d3606253a46b84289e5452b1bfd9e7be
                       ec8a83a230d78acdba653e56a76e4dc59dcfffc5
                       1eafce3d23b3151bff9513d63e73d3998b445001
                       a4d48746d5c3454bfb8dbcb5700623aab419f036
                       403e9d3cdcfd7c981504a8116f7821500a344764
                       bbc163b99d691d08f37936d263416d581ce6e681
                       78651843247831e225456f7a5cac38d5024c50ee
                       bdd49b6a885d6e78d87f74bf17f5ae01e68beaaa
                       475d1c30b838326761b5dc5f3c354f0fb25d0f1a
                       223518915cf25642034d305beed45e6e399bdd9e
                       97b6e1f54f83f05d40692a131f568afc9573ec8e
                       853ab8fae8b39957355bf92cbe94409ec122823d
                       f5640c8a28bf9764ee31a982fcdf5ac0264a8aaa
                       2aa371d5697688d8ebee6512df1d1425f974faba
                       dbd1ecff70ae32680ecc6f0fe1dbc960b48cefe2
                       83fe98ddd1d83addd9629703925dc026ad88f9d7
                       65656a5abb8951d3e5c113319c28ffb377230dc4
                       b9393487
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [7e:c6:08:30:0b:3f:0a:4f:9d:2a:bd:61:3a:64:1a:7b:e5:b5:dd:47],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-11-22 05:35:50.316  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-22 05:35:50.319 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-22 05:35:50.323 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-11-22 05:35:50.324 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-22 05:35:50.325  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-11-22 05:35:50.326  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-22 05:35:50.326  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-22 05:35:50.327 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-22 05:35:50.328 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-22 05:35:50.328 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-22 05:35:50.334 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-22 05:35:50.335 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-22 05:35:50.335 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-22 05:35:50.336 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-22 05:35:50.582  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-22 05:35:50.582  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-22 05:35:50.583 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-22 05:35:50.583 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-22 05:35:50.585  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-22 05:35:50.585  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-22 05:35:50.585 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-22 05:35:50.585 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-22 05:35:50.586 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-22 05:35:50.586 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-22 05:35:50.587 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-22 05:35:50.587 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-22 05:35:50.587 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-22 05:35:50.588 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-22 05:35:50.588 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-22 05:35:50.588 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-22 05:35:50.592 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 138252980814687483962228627869935475982343265872
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Nov 22 02:55:56 UTC 2022
           Final Date: Sun Nov 21 02:55:55 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [54:32:35:36:66:f5:54:c2:86:98:eb:2a:b0:ae:1c:19:bf:9e:46:87],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: b2b98c507351b5ae59faff4d6dac8ba720b38af7
                       8922c94e4f1bac10625d3127bc0984b702f88581
                       c0cbe454d3606253a46b84289e5452b1bfd9e7be
                       ec8a83a230d78acdba653e56a76e4dc59dcfffc5
                       1eafce3d23b3151bff9513d63e73d3998b445001
                       a4d48746d5c3454bfb8dbcb5700623aab419f036
                       403e9d3cdcfd7c981504a8116f7821500a344764
                       bbc163b99d691d08f37936d263416d581ce6e681
                       78651843247831e225456f7a5cac38d5024c50ee
                       bdd49b6a885d6e78d87f74bf17f5ae01e68beaaa
                       475d1c30b838326761b5dc5f3c354f0fb25d0f1a
                       223518915cf25642034d305beed45e6e399bdd9e
                       97b6e1f54f83f05d40692a131f568afc9573ec8e
                       853ab8fae8b39957355bf92cbe94409ec122823d
                       f5640c8a28bf9764ee31a982fcdf5ac0264a8aaa
                       2aa371d5697688d8ebee6512df1d1425f974faba
                       dbd1ecff70ae32680ecc6f0fe1dbc960b48cefe2
                       83fe98ddd1d83addd9629703925dc026ad88f9d7
                       65656a5abb8951d3e5c113319c28ffb377230dc4
                       b9393487
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [fc:03:0d:7b:9f:90:5d:3a:95:dc:b7:17:35:e6:6f:df:bf:d6:d3:53],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-11-22 05:35:57.918  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-22 05:35:57.920 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-22 05:35:57.921 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-11-22 05:35:57.922 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-22 05:35:57.922  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-11-22 05:35:57.923  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-22 05:35:57.923  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-22 05:35:57.923 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-22 05:35:57.924 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-22 05:35:57.924 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-22 05:35:57.927 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-22 05:35:57.928 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-22 05:35:57.928 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-22 05:35:57.928 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-22 05:35:58.080  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-22 05:35:58.081  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-22 05:35:58.081 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-22 05:35:58.081 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-22 05:35:58.082  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-22 05:35:58.082  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-22 05:35:58.083 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-22 05:35:58.083 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-22 05:35:58.083 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-22 05:35:58.084 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-22 05:35:58.084 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-22 05:35:58.085 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-22 05:35:58.085 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-22 05:35:58.086 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-22 05:35:58.086 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-22 05:35:58.087 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-22 05:35:58.090 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 138252980814687483962228627869935475982343265872
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Nov 22 02:55:56 UTC 2022
           Final Date: Sun Nov 21 02:55:55 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [54:32:35:36:66:f5:54:c2:86:98:eb:2a:b0:ae:1c:19:bf:9e:46:87],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: b2b98c507351b5ae59faff4d6dac8ba720b38af7
                       8922c94e4f1bac10625d3127bc0984b702f88581
                       c0cbe454d3606253a46b84289e5452b1bfd9e7be
                       ec8a83a230d78acdba653e56a76e4dc59dcfffc5
                       1eafce3d23b3151bff9513d63e73d3998b445001
                       a4d48746d5c3454bfb8dbcb5700623aab419f036
                       403e9d3cdcfd7c981504a8116f7821500a344764
                       bbc163b99d691d08f37936d263416d581ce6e681
                       78651843247831e225456f7a5cac38d5024c50ee
                       bdd49b6a885d6e78d87f74bf17f5ae01e68beaaa
                       475d1c30b838326761b5dc5f3c354f0fb25d0f1a
                       223518915cf25642034d305beed45e6e399bdd9e
                       97b6e1f54f83f05d40692a131f568afc9573ec8e
                       853ab8fae8b39957355bf92cbe94409ec122823d
                       f5640c8a28bf9764ee31a982fcdf5ac0264a8aaa
                       2aa371d5697688d8ebee6512df1d1425f974faba
                       dbd1ecff70ae32680ecc6f0fe1dbc960b48cefe2
                       83fe98ddd1d83addd9629703925dc026ad88f9d7
                       65656a5abb8951d3e5c113319c28ffb377230dc4
                       b9393487
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [91:57:dc:43:a7:e4:58:e0:cf:a4:56:50:62:a2:0b:61:ab:9c:ca:b8],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

]