Results

By type

          2022-12-09 03:01:51,234 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-12-09 03:01:53,112 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-12-09 03:01:54.050  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Dec 09, 2022 3:01:56 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Dec 09, 2022 3:01:56 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Dec 09, 2022 3:01:56 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Dec 09, 2022 3:01:56 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-12-09 03:01:57.598 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-12-09 03:01:57.992  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-12-09 03:01:58.234  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-12-09 03:01:59.123 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-12-09 03:01:59.126 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
2022-12-09 03:01:59.127 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-12-09 03:01:59.131 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-12-09 03:01:59.177 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2022-12-09 03:01:59.181 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
	{GET [/docs]}: redirectToUi(HttpServletRequest)
2022-12-09 03:01:59.328 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-12-09 03:02:00.171 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Dec 09, 2022 3:02:01 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-12-09 03:02:01.304  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 11.187 seconds (JVM running for 13.438)
Dec 09, 2022 3:02:22 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-12-09 03:04:28.398  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-09 03:04:28.412 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-09 03:04:28.469 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-12-09 03:04:28.474 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-09 03:04:28.501  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-12-09 03:04:28.505  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-09 03:04:28.506  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-09 03:04:28.508 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-09 03:04:28.509 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-09 03:04:28.516 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-09 03:04:28.526 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-09 03:04:28.530 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-09 03:04:28.584 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-09 03:04:28.592 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-09 03:04:28.593 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-09 03:04:28.598 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-09 03:04:29.319  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-09 03:04:29.322  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-09 03:04:29.323 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-09 03:04:29.324 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-09 03:04:29.335  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-09 03:04:29.336  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-09 03:04:29.337 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-09 03:04:29.337 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-09 03:04:29.338 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-09 03:04:29.360 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-09 03:04:29.361 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-09 03:04:29.366 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-09 03:04:29.381 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-09 03:04:29.382 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-09 03:04:29.382 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-09 03:04:29.384 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-09 03:04:29.441 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 382664610872834309034305163330799600775123206332
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Dec 09 02:59:02 UTC 2022
           Final Date: Wed Dec 08 02:59:01 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [17:9c:d8:c3:ab:a3:eb:a2:c7:8b:b6:31:90:d9:03:37:b6:3b:2c:a0],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3e45515f55d8accded56309bbb04e8443e7262c1
                       826972ef93b2ea8956bfd73edccc5f0787537504
                       25007c62b479c7911275162bdc018180656a2d9e
                       44eae563fd5fefd5baea5429b241f165e63571d8
                       15525dbfb1bb2c2f4bc6e27fa660a25a8d45e32a
                       ba1ba462758102281802994a586f93dfde9ad6b6
                       998cae0b93d4424780a84c0e1fd33e822e34685e
                       6bf86d7987f2b0918657a60e7384c825d3de610c
                       bee3d617cdc4baef66b7d5103260b19fce7d8d86
                       5f60da16b7348085c5585005ea723c926eab1f22
                       f8d8df64f8823282bca782fc8e134849769b5856
                       5953c11a042fa682d5d1e00328ebce8b715ad899
                       7e081dc7a1bc504f2009bbcf3294d070e27ca85a
                       e91379772af63a0f2c26751b0f39171f1131215f
                       9585f251bfe71561238fb907843affffd177300a
                       6efad546ca2183ef13284c90cf234569ec76e9b0
                       fa973953b770adee62647ba533de2e3c1ed1b70f
                       3e8705666d7ab7e3986b5245bb3be6d1667ff8bf
                       cbe3abc3bd1c488420e46e5827c591564ca97786
                       fcf95929
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [cc:19:07:c6:5e:83:0d:f6:3b:8d:29:c1:47:23:5a:70:2f:69:fc:a4],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-12-09 04:45:37.822  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-09 04:45:37.827 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-09 04:45:37.830 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-12-09 04:45:37.832 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-09 04:45:37.833  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-12-09 04:45:37.833  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-09 04:45:37.834  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-09 04:45:37.835 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-09 04:45:37.835 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-09 04:45:37.836 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-09 04:45:37.842 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-09 04:45:37.843 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-09 04:45:37.844 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-09 04:45:37.844 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-09 04:45:38.096  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-09 04:45:38.099  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-09 04:45:38.099 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-09 04:45:38.099 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-09 04:45:38.103  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-09 04:45:38.104  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-09 04:45:38.105 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-09 04:45:38.105 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-09 04:45:38.106 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-09 04:45:38.108 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-09 04:45:38.108 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-09 04:45:38.109 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-09 04:45:38.110 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-09 04:45:38.111 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-09 04:45:38.111 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-09 04:45:38.113 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-09 04:45:38.117 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 382664610872834309034305163330799600775123206332
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Dec 09 02:59:02 UTC 2022
           Final Date: Wed Dec 08 02:59:01 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [17:9c:d8:c3:ab:a3:eb:a2:c7:8b:b6:31:90:d9:03:37:b6:3b:2c:a0],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3e45515f55d8accded56309bbb04e8443e7262c1
                       826972ef93b2ea8956bfd73edccc5f0787537504
                       25007c62b479c7911275162bdc018180656a2d9e
                       44eae563fd5fefd5baea5429b241f165e63571d8
                       15525dbfb1bb2c2f4bc6e27fa660a25a8d45e32a
                       ba1ba462758102281802994a586f93dfde9ad6b6
                       998cae0b93d4424780a84c0e1fd33e822e34685e
                       6bf86d7987f2b0918657a60e7384c825d3de610c
                       bee3d617cdc4baef66b7d5103260b19fce7d8d86
                       5f60da16b7348085c5585005ea723c926eab1f22
                       f8d8df64f8823282bca782fc8e134849769b5856
                       5953c11a042fa682d5d1e00328ebce8b715ad899
                       7e081dc7a1bc504f2009bbcf3294d070e27ca85a
                       e91379772af63a0f2c26751b0f39171f1131215f
                       9585f251bfe71561238fb907843affffd177300a
                       6efad546ca2183ef13284c90cf234569ec76e9b0
                       fa973953b770adee62647ba533de2e3c1ed1b70f
                       3e8705666d7ab7e3986b5245bb3be6d1667ff8bf
                       cbe3abc3bd1c488420e46e5827c591564ca97786
                       fcf95929
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [90:e0:0d:00:95:47:e2:a3:07:1a:60:aa:00:83:bf:b3:4c:23:d7:92],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-12-09 04:47:18.047  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-09 04:47:18.049 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-09 04:47:18.052 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-12-09 04:47:18.053 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-09 04:47:18.054  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-12-09 04:47:18.055  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-09 04:47:18.056  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-09 04:47:18.057 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-09 04:47:18.057 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-09 04:47:18.061 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-09 04:47:18.072 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-09 04:47:18.073 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-09 04:47:18.073 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-09 04:47:18.074 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-09 04:47:18.244  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-09 04:47:18.245  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-09 04:47:18.246 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-09 04:47:18.247 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-09 04:47:18.251  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-09 04:47:18.252  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-09 04:47:18.252 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-09 04:47:18.253 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-09 04:47:18.253 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-09 04:47:18.255 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-09 04:47:18.255 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-09 04:47:18.256 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-09 04:47:18.257 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-09 04:47:18.258 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-09 04:47:18.258 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-09 04:47:18.260 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-09 04:47:18.265 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 382664610872834309034305163330799600775123206332
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Dec 09 02:59:02 UTC 2022
           Final Date: Wed Dec 08 02:59:01 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [17:9c:d8:c3:ab:a3:eb:a2:c7:8b:b6:31:90:d9:03:37:b6:3b:2c:a0],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3e45515f55d8accded56309bbb04e8443e7262c1
                       826972ef93b2ea8956bfd73edccc5f0787537504
                       25007c62b479c7911275162bdc018180656a2d9e
                       44eae563fd5fefd5baea5429b241f165e63571d8
                       15525dbfb1bb2c2f4bc6e27fa660a25a8d45e32a
                       ba1ba462758102281802994a586f93dfde9ad6b6
                       998cae0b93d4424780a84c0e1fd33e822e34685e
                       6bf86d7987f2b0918657a60e7384c825d3de610c
                       bee3d617cdc4baef66b7d5103260b19fce7d8d86
                       5f60da16b7348085c5585005ea723c926eab1f22
                       f8d8df64f8823282bca782fc8e134849769b5856
                       5953c11a042fa682d5d1e00328ebce8b715ad899
                       7e081dc7a1bc504f2009bbcf3294d070e27ca85a
                       e91379772af63a0f2c26751b0f39171f1131215f
                       9585f251bfe71561238fb907843affffd177300a
                       6efad546ca2183ef13284c90cf234569ec76e9b0
                       fa973953b770adee62647ba533de2e3c1ed1b70f
                       3e8705666d7ab7e3986b5245bb3be6d1667ff8bf
                       cbe3abc3bd1c488420e46e5827c591564ca97786
                       fcf95929
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [b5:bb:5c:0f:d9:09:8d:44:1e:91:c3:1b:36:6f:cb:7b:59:bd:aa:5d],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-12-09 04:49:34.333  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-09 04:49:34.335 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-09 04:49:34.337 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-12-09 04:49:34.337 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-09 04:49:34.338  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-12-09 04:49:34.339  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-09 04:49:34.340  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-09 04:49:34.340 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-09 04:49:34.350 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-09 04:49:34.352 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-09 04:49:34.358 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-09 04:49:34.360 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-09 04:49:34.361 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-09 04:49:34.361 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-09 04:49:34.591  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-09 04:49:34.593  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-09 04:49:34.594 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-09 04:49:34.594 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-09 04:49:34.598  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-09 04:49:34.600  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-09 04:49:34.601 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-09 04:49:34.602 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-09 04:49:34.602 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-09 04:49:34.604 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-09 04:49:34.604 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-09 04:49:34.605 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-09 04:49:34.606 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-09 04:49:34.606 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-09 04:49:34.607 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-09 04:49:34.608 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-09 04:49:34.614 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 382664610872834309034305163330799600775123206332
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Dec 09 02:59:02 UTC 2022
           Final Date: Wed Dec 08 02:59:01 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [17:9c:d8:c3:ab:a3:eb:a2:c7:8b:b6:31:90:d9:03:37:b6:3b:2c:a0],[56:66:d1:a4]
        modulus: b01d16ad16ac7fbada39a8fc9cc3faf893bdce0650521cf61795912fb32ad33a54c6e5364d5b8b58cbcd7d13e5abcf27992a32e71e206e9e2dec7cc028fdbdb9e6c00785caba26667ef7fb53b81dc76445d3900696fcc162ced198f6497a0c4cfebc0ec73a35ac259e856ae8335549c61fe3d6a2094bcca04c168267fa242e0980dd4fdda2a47cb2a0229ee2050433a0e8aa582636e45e8c51401ac64c7b64701f5bd32537d719bbac7d3b37545d00b4807eb394b8be8ef2c128ab027b4ca87bb3d928d84c87f36e89939058c1e186cd5d106dcf0d2306e051239587215019c7fa2eb033d17dc5f992ac36963537fa08d5312aa56b81575d5176fe916b5cf58ea4fd2505cef7afb3f0dc98f1be721eebed39b36b6919c81f7fa33523e8e35e57015c07a698067ec1371c44c86cfd4aa6f508e4f005a1e4351ee6314edbb8a2064ccc13d56e24ef0ad04a564d7ac285247f59d9458ea76414eabe4bfda3b21c6d0a23206ea8abd843858d52a837a8885e3f261ccf2e364c4eada1d47b3d10b3a3
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3e45515f55d8accded56309bbb04e8443e7262c1
                       826972ef93b2ea8956bfd73edccc5f0787537504
                       25007c62b479c7911275162bdc018180656a2d9e
                       44eae563fd5fefd5baea5429b241f165e63571d8
                       15525dbfb1bb2c2f4bc6e27fa660a25a8d45e32a
                       ba1ba462758102281802994a586f93dfde9ad6b6
                       998cae0b93d4424780a84c0e1fd33e822e34685e
                       6bf86d7987f2b0918657a60e7384c825d3de610c
                       bee3d617cdc4baef66b7d5103260b19fce7d8d86
                       5f60da16b7348085c5585005ea723c926eab1f22
                       f8d8df64f8823282bca782fc8e134849769b5856
                       5953c11a042fa682d5d1e00328ebce8b715ad899
                       7e081dc7a1bc504f2009bbcf3294d070e27ca85a
                       e91379772af63a0f2c26751b0f39171f1131215f
                       9585f251bfe71561238fb907843affffd177300a
                       6efad546ca2183ef13284c90cf234569ec76e9b0
                       fa973953b770adee62647ba533de2e3c1ed1b70f
                       3e8705666d7ab7e3986b5245bb3be6d1667ff8bf
                       cbe3abc3bd1c488420e46e5827c591564ca97786
                       fcf95929
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [65:4b:f7:d2:78:3f:21:c7:aa:bf:f6:3e:ad:66:e7:ba:3d:6c:ed:e4],[56:66:d1:a4]
        modulus: b2a95a7d2aa50d11607956fe2e2d5257166550f7dc5cc4c87245f2200158e4a985d643a0cc0580a2a391619954dfae23b41d9525734a24dddd9b92a072d27230758027eddbf0990a6b67dd5c6037e98753bf58494656e0884b53a450e1210e20a28b2745cc0933355ae1f290f144e317156e05128bb804026aa00591b912dd8184945fcd56c3d4ce411b065eeebd125844572f030509d553ca718bae4c1dbcd275adf12318364ffb5ac98493d95c70fdb25777cd0f18cf16e3c8342043a8927120b207914cede310bb4e85227650c2a3508a69fb082dfbd124a2cbe331a30f34787820bb786de6598b975dfa259f3e4c427aa8aa8e2496d4442d3cfbb106c377
public exponent: 10001

] 
2022-12-09 04:52:12.422  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-09 04:52:12.426 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-09 04:52:12.429 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-12-09 04:52:12.431 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-09 04:52:12.432  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-12-09 04:52:12.433  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-09 04:52:12.433  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-09 04:52:12.434 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-09 04:52:12.435 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-09 04:52:12.435 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-09 04:52:12.440 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-09 04:52:12.441 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-09 04:52:12.441 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-09 04:52:12.442 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-09 04:52:12.591  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-09 04:52:12.592  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-09 04:52:12.592 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-09 04:52:12.593 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-09 04:52:12.594  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-09 04:52:12.594  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-09 04:52:12.595 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-09 04:52:12.595 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-09 04:52:12.596 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-09 04:52:12.596 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-09 04:52:12.597 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-09 04:52:12.597 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-09 04:52:12.598 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-09 04:52:12.598 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-09 04:52:12.598 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-09 04:52:12.599 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-09 04:52:12.602 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 382664610872834309034305163330799600775123206332
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Dec 09 02:59:02 UTC 2022
           Final Date: Wed Dec 08 02:59:01 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [17:9c:d8:c3:ab:a3:eb:a2:c7:8b:b6:31:90:d9:03:37:b6:3b:2c:a0],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3e45515f55d8accded56309bbb04e8443e7262c1
                       826972ef93b2ea8956bfd73edccc5f0787537504
                       25007c62b479c7911275162bdc018180656a2d9e
                       44eae563fd5fefd5baea5429b241f165e63571d8
                       15525dbfb1bb2c2f4bc6e27fa660a25a8d45e32a
                       ba1ba462758102281802994a586f93dfde9ad6b6
                       998cae0b93d4424780a84c0e1fd33e822e34685e
                       6bf86d7987f2b0918657a60e7384c825d3de610c
                       bee3d617cdc4baef66b7d5103260b19fce7d8d86
                       5f60da16b7348085c5585005ea723c926eab1f22
                       f8d8df64f8823282bca782fc8e134849769b5856
                       5953c11a042fa682d5d1e00328ebce8b715ad899
                       7e081dc7a1bc504f2009bbcf3294d070e27ca85a
                       e91379772af63a0f2c26751b0f39171f1131215f
                       9585f251bfe71561238fb907843affffd177300a
                       6efad546ca2183ef13284c90cf234569ec76e9b0
                       fa973953b770adee62647ba533de2e3c1ed1b70f
                       3e8705666d7ab7e3986b5245bb3be6d1667ff8bf
                       cbe3abc3bd1c488420e46e5827c591564ca97786
                       fcf95929
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [86:e7:3b:9d:c8:ea:d6:a3:bf:98:40:be:c4:b6:de:b8:70:82:84:0b],[56:66:d1:a4]
        modulus: e6f6dc1649997fdf62a42a310e9decda61b90bb0057609e65d42f07317f3d1c8ce9ec6958ed9aee55854fc31ab5d5a327965c5d2e935ed445548a2cd50480bee33a2c3a43d7436a961bc6cdc8782c9b7874858d5dc42b95a2c06d662478501a17737a1a03aee87dccd1eb540a4b21b5d650d56a2c063f29503d075fe6d23d6f642e47a7d6b232069e98d8ca31851681803eb777df055c33ec8271a679d525e27c1b18470df75a6ef3e657990cd126d4b8331880ef8690d178cea81b9e779ec7d5e306ddd5aa961d4c09f99832c4165b6e93b607d75dd4bfeeda4155d805d2677f0d2f3ce92cc7f8ddd237c5602c23863020ba14feefebf540bc72a96523b74e7
public exponent: 10001

] 
2022-12-09 04:59:05.352  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-09 04:59:05.355 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-09 04:59:05.358 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-12-09 04:59:05.360 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-09 04:59:05.361  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-12-09 04:59:05.362  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-09 04:59:05.363  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-09 04:59:05.363 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-09 04:59:05.364 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-09 04:59:05.364 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-09 04:59:05.371 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-09 04:59:05.374 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-09 04:59:05.374 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-09 04:59:05.374 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-09 04:59:05.602  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-09 04:59:05.607  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-09 04:59:05.608 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-09 04:59:05.608 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-09 04:59:05.612  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-09 04:59:05.618  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-09 04:59:05.619 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-09 04:59:05.622 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-09 04:59:05.626 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-09 04:59:05.629 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-09 04:59:05.629 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-09 04:59:05.630 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-09 04:59:05.631 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-09 04:59:05.631 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-09 04:59:05.632 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-09 04:59:05.633 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-09 04:59:05.639 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 382664610872834309034305163330799600775123206332
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Dec 09 02:59:02 UTC 2022
           Final Date: Wed Dec 08 02:59:01 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [17:9c:d8:c3:ab:a3:eb:a2:c7:8b:b6:31:90:d9:03:37:b6:3b:2c:a0],[56:66:d1:a4]
        modulus: b01d16ad16ac7fbada39a8fc9cc3faf893bdce0650521cf61795912fb32ad33a54c6e5364d5b8b58cbcd7d13e5abcf27992a32e71e206e9e2dec7cc028fdbdb9e6c00785caba26667ef7fb53b81dc76445d3900696fcc162ced198f6497a0c4cfebc0ec73a35ac259e856ae8335549c61fe3d6a2094bcca04c168267fa242e0980dd4fdda2a47cb2a0229ee2050433a0e8aa582636e45e8c51401ac64c7b64701f5bd32537d719bbac7d3b37545d00b4807eb394b8be8ef2c128ab027b4ca87bb3d928d84c87f36e89939058c1e186cd5d106dcf0d2306e051239587215019c7fa2eb033d17dc5f992ac36963537fa08d5312aa56b81575d5176fe916b5cf58ea4fd2505cef7afb3f0dc98f1be721eebed39b36b6919c81f7fa33523e8e35e57015c07a698067ec1371c44c86cfd4aa6f508e4f005a1e4351ee6314edbb8a2064ccc13d56e24ef0ad04a564d7ac285247f59d9458ea76414eabe4bfda3b21c6d0a23206ea8abd843858d52a837a8885e3f261ccf2e364c4eada1d47b3d10b3a3
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3e45515f55d8accded56309bbb04e8443e7262c1
                       826972ef93b2ea8956bfd73edccc5f0787537504
                       25007c62b479c7911275162bdc018180656a2d9e
                       44eae563fd5fefd5baea5429b241f165e63571d8
                       15525dbfb1bb2c2f4bc6e27fa660a25a8d45e32a
                       ba1ba462758102281802994a586f93dfde9ad6b6
                       998cae0b93d4424780a84c0e1fd33e822e34685e
                       6bf86d7987f2b0918657a60e7384c825d3de610c
                       bee3d617cdc4baef66b7d5103260b19fce7d8d86
                       5f60da16b7348085c5585005ea723c926eab1f22
                       f8d8df64f8823282bca782fc8e134849769b5856
                       5953c11a042fa682d5d1e00328ebce8b715ad899
                       7e081dc7a1bc504f2009bbcf3294d070e27ca85a
                       e91379772af63a0f2c26751b0f39171f1131215f
                       9585f251bfe71561238fb907843affffd177300a
                       6efad546ca2183ef13284c90cf234569ec76e9b0
                       fa973953b770adee62647ba533de2e3c1ed1b70f
                       3e8705666d7ab7e3986b5245bb3be6d1667ff8bf
                       cbe3abc3bd1c488420e46e5827c591564ca97786
                       fcf95929
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [cc:34:42:6b:b9:99:2b:90:d8:01:77:b8:5c:ec:7f:de:80:eb:e2:c5],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-12-09 05:04:30.990  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-09 05:04:30.993 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-09 05:04:30.997 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-12-09 05:04:30.998 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-09 05:04:30.999  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-12-09 05:04:30.999  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-09 05:04:31.000  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-09 05:04:31.001 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-09 05:04:31.001 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-09 05:04:31.002 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-09 05:04:31.007 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-09 05:04:31.008 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-09 05:04:31.009 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-09 05:04:31.009 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-09 05:04:31.204  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-09 05:04:31.205  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-09 05:04:31.205 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-09 05:04:31.206 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-09 05:04:31.208  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-09 05:04:31.209  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-09 05:04:31.209 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-09 05:04:31.210 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-09 05:04:31.210 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-09 05:04:31.211 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-09 05:04:31.212 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-09 05:04:31.212 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-09 05:04:31.213 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-09 05:04:31.214 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-09 05:04:31.214 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-09 05:04:31.215 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-09 05:04:31.218 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 382664610872834309034305163330799600775123206332
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Dec 09 02:59:02 UTC 2022
           Final Date: Wed Dec 08 02:59:01 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [17:9c:d8:c3:ab:a3:eb:a2:c7:8b:b6:31:90:d9:03:37:b6:3b:2c:a0],[56:66:d1:a4]
        modulus: b01d16ad16ac7fbada39a8fc9cc3faf893bdce0650521cf61795912fb32ad33a54c6e5364d5b8b58cbcd7d13e5abcf27992a32e71e206e9e2dec7cc028fdbdb9e6c00785caba26667ef7fb53b81dc76445d3900696fcc162ced198f6497a0c4cfebc0ec73a35ac259e856ae8335549c61fe3d6a2094bcca04c168267fa242e0980dd4fdda2a47cb2a0229ee2050433a0e8aa582636e45e8c51401ac64c7b64701f5bd32537d719bbac7d3b37545d00b4807eb394b8be8ef2c128ab027b4ca87bb3d928d84c87f36e89939058c1e186cd5d106dcf0d2306e051239587215019c7fa2eb033d17dc5f992ac36963537fa08d5312aa56b81575d5176fe916b5cf58ea4fd2505cef7afb3f0dc98f1be721eebed39b36b6919c81f7fa33523e8e35e57015c07a698067ec1371c44c86cfd4aa6f508e4f005a1e4351ee6314edbb8a2064ccc13d56e24ef0ad04a564d7ac285247f59d9458ea76414eabe4bfda3b21c6d0a23206ea8abd843858d52a837a8885e3f261ccf2e364c4eada1d47b3d10b3a3
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3e45515f55d8accded56309bbb04e8443e7262c1
                       826972ef93b2ea8956bfd73edccc5f0787537504
                       25007c62b479c7911275162bdc018180656a2d9e
                       44eae563fd5fefd5baea5429b241f165e63571d8
                       15525dbfb1bb2c2f4bc6e27fa660a25a8d45e32a
                       ba1ba462758102281802994a586f93dfde9ad6b6
                       998cae0b93d4424780a84c0e1fd33e822e34685e
                       6bf86d7987f2b0918657a60e7384c825d3de610c
                       bee3d617cdc4baef66b7d5103260b19fce7d8d86
                       5f60da16b7348085c5585005ea723c926eab1f22
                       f8d8df64f8823282bca782fc8e134849769b5856
                       5953c11a042fa682d5d1e00328ebce8b715ad899
                       7e081dc7a1bc504f2009bbcf3294d070e27ca85a
                       e91379772af63a0f2c26751b0f39171f1131215f
                       9585f251bfe71561238fb907843affffd177300a
                       6efad546ca2183ef13284c90cf234569ec76e9b0
                       fa973953b770adee62647ba533de2e3c1ed1b70f
                       3e8705666d7ab7e3986b5245bb3be6d1667ff8bf
                       cbe3abc3bd1c488420e46e5827c591564ca97786
                       fcf95929
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [98:71:d5:50:1b:8c:b7:17:98:2b:e1:47:ed:69:b3:51:50:7f:07:9b],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-12-09 05:10:45.831  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-09 05:10:45.834 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-09 05:10:45.838 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-12-09 05:10:45.839 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-09 05:10:45.839  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-12-09 05:10:45.840  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-09 05:10:45.840  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-09 05:10:45.841 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-09 05:10:45.841 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-09 05:10:45.841 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-09 05:10:45.846 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-09 05:10:45.847 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-09 05:10:45.847 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-09 05:10:45.847 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-09 05:10:46.001  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-09 05:10:46.002  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-09 05:10:46.003 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-09 05:10:46.003 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-09 05:10:46.013  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-09 05:10:46.014  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-09 05:10:46.015 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-09 05:10:46.015 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-09 05:10:46.016 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-09 05:10:46.018 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-09 05:10:46.019 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-09 05:10:46.019 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-09 05:10:46.020 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-09 05:10:46.020 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-09 05:10:46.020 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-09 05:10:46.021 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-09 05:10:46.027 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 382664610872834309034305163330799600775123206332
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Dec 09 02:59:02 UTC 2022
           Final Date: Wed Dec 08 02:59:01 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [17:9c:d8:c3:ab:a3:eb:a2:c7:8b:b6:31:90:d9:03:37:b6:3b:2c:a0],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3e45515f55d8accded56309bbb04e8443e7262c1
                       826972ef93b2ea8956bfd73edccc5f0787537504
                       25007c62b479c7911275162bdc018180656a2d9e
                       44eae563fd5fefd5baea5429b241f165e63571d8
                       15525dbfb1bb2c2f4bc6e27fa660a25a8d45e32a
                       ba1ba462758102281802994a586f93dfde9ad6b6
                       998cae0b93d4424780a84c0e1fd33e822e34685e
                       6bf86d7987f2b0918657a60e7384c825d3de610c
                       bee3d617cdc4baef66b7d5103260b19fce7d8d86
                       5f60da16b7348085c5585005ea723c926eab1f22
                       f8d8df64f8823282bca782fc8e134849769b5856
                       5953c11a042fa682d5d1e00328ebce8b715ad899
                       7e081dc7a1bc504f2009bbcf3294d070e27ca85a
                       e91379772af63a0f2c26751b0f39171f1131215f
                       9585f251bfe71561238fb907843affffd177300a
                       6efad546ca2183ef13284c90cf234569ec76e9b0
                       fa973953b770adee62647ba533de2e3c1ed1b70f
                       3e8705666d7ab7e3986b5245bb3be6d1667ff8bf
                       cbe3abc3bd1c488420e46e5827c591564ca97786
                       fcf95929
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [10:0f:e8:79:d3:c3:d6:a6:58:d6:19:d0:e0:a0:0b:22:e2:92:13:58],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-12-09 05:16:15.257  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-09 05:16:15.261 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-09 05:16:15.265 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-12-09 05:16:15.266 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-09 05:16:15.267  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-12-09 05:16:15.268  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-09 05:16:15.269  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-09 05:16:15.269 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-09 05:16:15.270 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-09 05:16:15.271 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-09 05:16:15.275 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-09 05:16:15.276 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-09 05:16:15.276 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-09 05:16:15.277 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-09 05:16:15.420  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-09 05:16:15.421  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-09 05:16:15.421 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-09 05:16:15.421 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-09 05:16:15.423  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-09 05:16:15.423  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-09 05:16:15.424 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-09 05:16:15.424 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-09 05:16:15.424 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-09 05:16:15.425 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-09 05:16:15.425 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-09 05:16:15.426 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-09 05:16:15.426 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-09 05:16:15.427 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-09 05:16:15.427 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-09 05:16:15.428 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-09 05:16:15.431 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 382664610872834309034305163330799600775123206332
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Dec 09 02:59:02 UTC 2022
           Final Date: Wed Dec 08 02:59:01 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [17:9c:d8:c3:ab:a3:eb:a2:c7:8b:b6:31:90:d9:03:37:b6:3b:2c:a0],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3e45515f55d8accded56309bbb04e8443e7262c1
                       826972ef93b2ea8956bfd73edccc5f0787537504
                       25007c62b479c7911275162bdc018180656a2d9e
                       44eae563fd5fefd5baea5429b241f165e63571d8
                       15525dbfb1bb2c2f4bc6e27fa660a25a8d45e32a
                       ba1ba462758102281802994a586f93dfde9ad6b6
                       998cae0b93d4424780a84c0e1fd33e822e34685e
                       6bf86d7987f2b0918657a60e7384c825d3de610c
                       bee3d617cdc4baef66b7d5103260b19fce7d8d86
                       5f60da16b7348085c5585005ea723c926eab1f22
                       f8d8df64f8823282bca782fc8e134849769b5856
                       5953c11a042fa682d5d1e00328ebce8b715ad899
                       7e081dc7a1bc504f2009bbcf3294d070e27ca85a
                       e91379772af63a0f2c26751b0f39171f1131215f
                       9585f251bfe71561238fb907843affffd177300a
                       6efad546ca2183ef13284c90cf234569ec76e9b0
                       fa973953b770adee62647ba533de2e3c1ed1b70f
                       3e8705666d7ab7e3986b5245bb3be6d1667ff8bf
                       cbe3abc3bd1c488420e46e5827c591564ca97786
                       fcf95929
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [7d:53:c1:32:96:0d:f3:f8:ab:71:2e:45:78:ce:d2:80:c5:2c:17:19],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-12-09 05:22:47.605  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-09 05:22:47.606 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-09 05:22:47.608 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-12-09 05:22:47.610 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-09 05:22:47.611  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-12-09 05:22:47.611  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-09 05:22:47.612  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-09 05:22:47.613 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-09 05:22:47.613 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-09 05:22:47.614 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-09 05:22:47.618 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-09 05:22:47.619 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-09 05:22:47.619 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-09 05:22:47.619 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-09 05:22:47.745  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-09 05:22:47.745  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-09 05:22:47.746 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-09 05:22:47.746 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-09 05:22:47.747  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-09 05:22:47.748  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-09 05:22:47.749 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-09 05:22:47.749 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-09 05:22:47.749 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-09 05:22:47.750 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-09 05:22:47.751 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-09 05:22:47.751 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-09 05:22:47.752 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-09 05:22:47.752 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-09 05:22:47.752 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-09 05:22:47.753 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-09 05:22:47.756 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 382664610872834309034305163330799600775123206332
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Dec 09 02:59:02 UTC 2022
           Final Date: Wed Dec 08 02:59:01 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [17:9c:d8:c3:ab:a3:eb:a2:c7:8b:b6:31:90:d9:03:37:b6:3b:2c:a0],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3e45515f55d8accded56309bbb04e8443e7262c1
                       826972ef93b2ea8956bfd73edccc5f0787537504
                       25007c62b479c7911275162bdc018180656a2d9e
                       44eae563fd5fefd5baea5429b241f165e63571d8
                       15525dbfb1bb2c2f4bc6e27fa660a25a8d45e32a
                       ba1ba462758102281802994a586f93dfde9ad6b6
                       998cae0b93d4424780a84c0e1fd33e822e34685e
                       6bf86d7987f2b0918657a60e7384c825d3de610c
                       bee3d617cdc4baef66b7d5103260b19fce7d8d86
                       5f60da16b7348085c5585005ea723c926eab1f22
                       f8d8df64f8823282bca782fc8e134849769b5856
                       5953c11a042fa682d5d1e00328ebce8b715ad899
                       7e081dc7a1bc504f2009bbcf3294d070e27ca85a
                       e91379772af63a0f2c26751b0f39171f1131215f
                       9585f251bfe71561238fb907843affffd177300a
                       6efad546ca2183ef13284c90cf234569ec76e9b0
                       fa973953b770adee62647ba533de2e3c1ed1b70f
                       3e8705666d7ab7e3986b5245bb3be6d1667ff8bf
                       cbe3abc3bd1c488420e46e5827c591564ca97786
                       fcf95929
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [01:8b:62:4d:43:4e:aa:53:cf:88:d5:6f:de:f9:5f:40:81:43:f6:4d],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-12-09 05:29:03.652  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-09 05:29:03.655 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-09 05:29:03.658 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-12-09 05:29:03.659 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-09 05:29:03.660  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-12-09 05:29:03.660  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-09 05:29:03.661  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-09 05:29:03.661 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-09 05:29:03.662 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-09 05:29:03.663 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-09 05:29:03.667 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-09 05:29:03.668 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-09 05:29:03.669 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-09 05:29:03.669 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-09 05:29:03.819  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-09 05:29:03.820  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-09 05:29:03.821 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-09 05:29:03.821 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-09 05:29:03.823  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-09 05:29:03.823  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-09 05:29:03.823 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-09 05:29:03.824 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-09 05:29:03.825 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-09 05:29:03.825 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-09 05:29:03.826 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-09 05:29:03.826 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-09 05:29:03.826 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-09 05:29:03.827 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-09 05:29:03.827 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-09 05:29:03.828 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-09 05:29:03.831 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 382664610872834309034305163330799600775123206332
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Dec 09 02:59:02 UTC 2022
           Final Date: Wed Dec 08 02:59:01 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [17:9c:d8:c3:ab:a3:eb:a2:c7:8b:b6:31:90:d9:03:37:b6:3b:2c:a0],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3e45515f55d8accded56309bbb04e8443e7262c1
                       826972ef93b2ea8956bfd73edccc5f0787537504
                       25007c62b479c7911275162bdc018180656a2d9e
                       44eae563fd5fefd5baea5429b241f165e63571d8
                       15525dbfb1bb2c2f4bc6e27fa660a25a8d45e32a
                       ba1ba462758102281802994a586f93dfde9ad6b6
                       998cae0b93d4424780a84c0e1fd33e822e34685e
                       6bf86d7987f2b0918657a60e7384c825d3de610c
                       bee3d617cdc4baef66b7d5103260b19fce7d8d86
                       5f60da16b7348085c5585005ea723c926eab1f22
                       f8d8df64f8823282bca782fc8e134849769b5856
                       5953c11a042fa682d5d1e00328ebce8b715ad899
                       7e081dc7a1bc504f2009bbcf3294d070e27ca85a
                       e91379772af63a0f2c26751b0f39171f1131215f
                       9585f251bfe71561238fb907843affffd177300a
                       6efad546ca2183ef13284c90cf234569ec76e9b0
                       fa973953b770adee62647ba533de2e3c1ed1b70f
                       3e8705666d7ab7e3986b5245bb3be6d1667ff8bf
                       cbe3abc3bd1c488420e46e5827c591564ca97786
                       fcf95929
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [42:cb:94:a1:2e:0d:cf:a1:86:47:cf:10:d9:35:e9:de:1b:fa:04:03],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-12-09 05:29:19.478  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-09 05:29:19.479 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-09 05:29:19.481 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-12-09 05:29:19.482 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-09 05:29:19.482  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-12-09 05:29:19.483  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-09 05:29:19.483  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-09 05:29:19.484 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-09 05:29:19.484 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-09 05:29:19.484 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-09 05:29:19.488 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-09 05:29:19.488 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-09 05:29:19.489 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-09 05:29:19.489 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-09 05:29:19.593  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-09 05:29:19.594  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-09 05:29:19.594 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-09 05:29:19.594 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-09 05:29:19.595  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-09 05:29:19.596  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-09 05:29:19.596 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-09 05:29:19.596 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-09 05:29:19.597 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-09 05:29:19.597 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-09 05:29:19.598 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-09 05:29:19.598 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-09 05:29:19.599 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-09 05:29:19.599 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-09 05:29:19.599 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-09 05:29:19.600 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-09 05:29:19.604 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 382664610872834309034305163330799600775123206332
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Dec 09 02:59:02 UTC 2022
           Final Date: Wed Dec 08 02:59:01 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [17:9c:d8:c3:ab:a3:eb:a2:c7:8b:b6:31:90:d9:03:37:b6:3b:2c:a0],[56:66:d1:a4]
        modulus: b01d16ad16ac7fbada39a8fc9cc3faf893bdce0650521cf61795912fb32ad33a54c6e5364d5b8b58cbcd7d13e5abcf27992a32e71e206e9e2dec7cc028fdbdb9e6c00785caba26667ef7fb53b81dc76445d3900696fcc162ced198f6497a0c4cfebc0ec73a35ac259e856ae8335549c61fe3d6a2094bcca04c168267fa242e0980dd4fdda2a47cb2a0229ee2050433a0e8aa582636e45e8c51401ac64c7b64701f5bd32537d719bbac7d3b37545d00b4807eb394b8be8ef2c128ab027b4ca87bb3d928d84c87f36e89939058c1e186cd5d106dcf0d2306e051239587215019c7fa2eb033d17dc5f992ac36963537fa08d5312aa56b81575d5176fe916b5cf58ea4fd2505cef7afb3f0dc98f1be721eebed39b36b6919c81f7fa33523e8e35e57015c07a698067ec1371c44c86cfd4aa6f508e4f005a1e4351ee6314edbb8a2064ccc13d56e24ef0ad04a564d7ac285247f59d9458ea76414eabe4bfda3b21c6d0a23206ea8abd843858d52a837a8885e3f261ccf2e364c4eada1d47b3d10b3a3
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3e45515f55d8accded56309bbb04e8443e7262c1
                       826972ef93b2ea8956bfd73edccc5f0787537504
                       25007c62b479c7911275162bdc018180656a2d9e
                       44eae563fd5fefd5baea5429b241f165e63571d8
                       15525dbfb1bb2c2f4bc6e27fa660a25a8d45e32a
                       ba1ba462758102281802994a586f93dfde9ad6b6
                       998cae0b93d4424780a84c0e1fd33e822e34685e
                       6bf86d7987f2b0918657a60e7384c825d3de610c
                       bee3d617cdc4baef66b7d5103260b19fce7d8d86
                       5f60da16b7348085c5585005ea723c926eab1f22
                       f8d8df64f8823282bca782fc8e134849769b5856
                       5953c11a042fa682d5d1e00328ebce8b715ad899
                       7e081dc7a1bc504f2009bbcf3294d070e27ca85a
                       e91379772af63a0f2c26751b0f39171f1131215f
                       9585f251bfe71561238fb907843affffd177300a
                       6efad546ca2183ef13284c90cf234569ec76e9b0
                       fa973953b770adee62647ba533de2e3c1ed1b70f
                       3e8705666d7ab7e3986b5245bb3be6d1667ff8bf
                       cbe3abc3bd1c488420e46e5827c591564ca97786
                       fcf95929
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [77:c1:13:85:7f:12:bb:c9:38:9f:2d:cb:e9:b6:32:c1:35:28:8f:93],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-12-09 05:53:01.407  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-09 05:53:01.409 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-09 05:53:01.411 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-12-09 05:53:01.412 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-09 05:53:01.413  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-12-09 05:53:01.414  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-09 05:53:01.414  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-09 05:53:01.415 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-09 05:53:01.415 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-09 05:53:01.419 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-09 05:53:01.423 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-09 05:53:01.424 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-09 05:53:01.425 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-09 05:53:01.425 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-09 05:53:01.605  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-09 05:53:01.606  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-09 05:53:01.606 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-09 05:53:01.606 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-09 05:53:01.609  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-09 05:53:01.609  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-09 05:53:01.610 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-09 05:53:01.610 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-09 05:53:01.610 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-09 05:53:01.611 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-09 05:53:01.611 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-09 05:53:01.612 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-09 05:53:01.612 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-09 05:53:01.613 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-09 05:53:01.613 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-09 05:53:01.613 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-09 05:53:01.617 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 382664610872834309034305163330799600775123206332
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Dec 09 02:59:02 UTC 2022
           Final Date: Wed Dec 08 02:59:01 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [17:9c:d8:c3:ab:a3:eb:a2:c7:8b:b6:31:90:d9:03:37:b6:3b:2c:a0],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3e45515f55d8accded56309bbb04e8443e7262c1
                       826972ef93b2ea8956bfd73edccc5f0787537504
                       25007c62b479c7911275162bdc018180656a2d9e
                       44eae563fd5fefd5baea5429b241f165e63571d8
                       15525dbfb1bb2c2f4bc6e27fa660a25a8d45e32a
                       ba1ba462758102281802994a586f93dfde9ad6b6
                       998cae0b93d4424780a84c0e1fd33e822e34685e
                       6bf86d7987f2b0918657a60e7384c825d3de610c
                       bee3d617cdc4baef66b7d5103260b19fce7d8d86
                       5f60da16b7348085c5585005ea723c926eab1f22
                       f8d8df64f8823282bca782fc8e134849769b5856
                       5953c11a042fa682d5d1e00328ebce8b715ad899
                       7e081dc7a1bc504f2009bbcf3294d070e27ca85a
                       e91379772af63a0f2c26751b0f39171f1131215f
                       9585f251bfe71561238fb907843affffd177300a
                       6efad546ca2183ef13284c90cf234569ec76e9b0
                       fa973953b770adee62647ba533de2e3c1ed1b70f
                       3e8705666d7ab7e3986b5245bb3be6d1667ff8bf
                       cbe3abc3bd1c488420e46e5827c591564ca97786
                       fcf95929
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [9a:10:6a:bc:69:2e:cc:d9:49:79:a3:80:a4:ca:81:51:26:b5:42:94],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-12-09 05:53:08.682  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-09 05:53:08.683 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-09 05:53:08.685 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-12-09 05:53:08.685 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-09 05:53:08.686  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-12-09 05:53:08.686  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-09 05:53:08.687  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-09 05:53:08.687 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-09 05:53:08.687 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-09 05:53:08.688 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-09 05:53:08.692 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-09 05:53:08.693 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-09 05:53:08.693 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-09 05:53:08.693 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-09 05:53:08.824  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-09 05:53:08.825  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-09 05:53:08.826 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-09 05:53:08.826 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-09 05:53:08.827  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-09 05:53:08.828  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-09 05:53:08.828 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-09 05:53:08.829 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-09 05:53:08.829 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-09 05:53:08.830 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-09 05:53:08.830 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-09 05:53:08.830 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-09 05:53:08.831 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-09 05:53:08.831 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-09 05:53:08.831 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-09 05:53:08.832 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-09 05:53:08.835 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 382664610872834309034305163330799600775123206332
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Dec 09 02:59:02 UTC 2022
           Final Date: Wed Dec 08 02:59:01 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [17:9c:d8:c3:ab:a3:eb:a2:c7:8b:b6:31:90:d9:03:37:b6:3b:2c:a0],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3e45515f55d8accded56309bbb04e8443e7262c1
                       826972ef93b2ea8956bfd73edccc5f0787537504
                       25007c62b479c7911275162bdc018180656a2d9e
                       44eae563fd5fefd5baea5429b241f165e63571d8
                       15525dbfb1bb2c2f4bc6e27fa660a25a8d45e32a
                       ba1ba462758102281802994a586f93dfde9ad6b6
                       998cae0b93d4424780a84c0e1fd33e822e34685e
                       6bf86d7987f2b0918657a60e7384c825d3de610c
                       bee3d617cdc4baef66b7d5103260b19fce7d8d86
                       5f60da16b7348085c5585005ea723c926eab1f22
                       f8d8df64f8823282bca782fc8e134849769b5856
                       5953c11a042fa682d5d1e00328ebce8b715ad899
                       7e081dc7a1bc504f2009bbcf3294d070e27ca85a
                       e91379772af63a0f2c26751b0f39171f1131215f
                       9585f251bfe71561238fb907843affffd177300a
                       6efad546ca2183ef13284c90cf234569ec76e9b0
                       fa973953b770adee62647ba533de2e3c1ed1b70f
                       3e8705666d7ab7e3986b5245bb3be6d1667ff8bf
                       cbe3abc3bd1c488420e46e5827c591564ca97786
                       fcf95929
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [15:a7:9e:af:8f:8c:61:2b:aa:f0:85:69:ec:b4:0d:b7:75:9f:bf:61],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

]