Results

By type

          2022-12-29 03:20:15,115 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-12-29 03:20:16,674 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-12-29 03:20:17.360  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Dec 29, 2022 3:20:19 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Dec 29, 2022 3:20:19 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Dec 29, 2022 3:20:19 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Dec 29, 2022 3:20:19 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-12-29 03:20:19.829 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-12-29 03:20:20.119  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-12-29 03:20:20.328  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-12-29 03:20:21.128 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-12-29 03:20:21.131 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
2022-12-29 03:20:21.132 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-12-29 03:20:21.136 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-12-29 03:20:21.186 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2022-12-29 03:20:21.189 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
	{GET [/docs]}: redirectToUi(HttpServletRequest)
2022-12-29 03:20:21.315 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-12-29 03:20:22.003 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Dec 29, 2022 3:20:22 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-12-29 03:20:23.024  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 9.03 seconds (JVM running for 10.933)
Dec 29, 2022 3:20:44 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-12-29 03:21:42.351  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-29 03:21:42.369 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-29 03:21:42.452 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-12-29 03:21:42.456 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-29 03:21:42.477  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-12-29 03:21:42.479  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-29 03:21:42.481  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-29 03:21:42.482 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-29 03:21:42.482 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-29 03:21:42.487 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-29 03:21:42.497 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-29 03:21:42.501 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-29 03:21:42.575 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-29 03:21:42.586 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-29 03:21:42.587 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-29 03:21:42.593 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-29 03:21:45.414  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-29 03:21:45.417  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-29 03:21:45.418 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-29 03:21:45.420 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-29 03:21:45.435  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-29 03:21:45.437  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-29 03:21:45.437 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-29 03:21:45.438 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-29 03:21:45.438 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-29 03:21:45.455 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-29 03:21:45.456 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-29 03:21:45.456 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-29 03:21:45.463 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-29 03:21:45.463 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-29 03:21:45.464 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-29 03:21:45.465 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-29 03:21:45.502 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 617457434319370152944918253335611381195539679963
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Dec 29 03:16:22 UTC 2022
           Final Date: Tue Dec 28 03:16:21 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [9f:cb:1c:af:15:2c:f8:55:72:22:7c:02:85:24:77:7a:64:c4:75:4b],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: e2070244f317b58a5f06fc46ed159e1f5dd432b3
                       10ef347a5a787903ce64ca52c84f2a5973a5ce96
                       645e69d44956d218c4a6e115923abd83259c3e51
                       2323c97caf334e9ced8d4c7de10d13965669c99f
                       0ce1798f6789c49b53252859da6b6a2930452bb4
                       902ebf8f05778a42c1ce5f1e6f9f8eea77c287c7
                       3930b8f3880cb82babcaf087540aa9712909150f
                       dea0c003308f49403aaec12e91f24d1d5d53caa8
                       6bf1e37e7c332d3ca96b9a857d8442ecdb60ca09
                       a35f800c63ba859b5a76b4230470e1f3e6e9d0f9
                       53acbc30ba38dbab2ae411ee91d508de64830398
                       b7306c7e20827d1987751674864d22a5dfc3cbe1
                       7d2e88ecf5298e1c0eafce4c7fd385322f72cf1a
                       2d279af291f2dea32fb50777eb64c822511b018a
                       9eba77a74625ed847714245dd04d4a8a3cb4f89c
                       edfaf922da2088ca3d23de8826dec4b2ab869750
                       827c739d08484f12a6e7289148f3ac0dcf2926a6
                       57c2b968a46a45e14e7db67cfd9f1e53a6e299d9
                       7bb6700bc721985a0fdf3709953a225eacb5c659
                       8449eb49
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [a9:db:f6:54:6f:06:34:fc:8c:74:c8:a1:9c:83:16:53:6d:f8:80:6b],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-12-29 05:36:07.105  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-29 05:36:07.108 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-29 05:36:07.112 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-12-29 05:36:07.113 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-29 05:36:07.114  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-12-29 05:36:07.115  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-29 05:36:07.116  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-29 05:36:07.116 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-29 05:36:07.117 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-29 05:36:07.118 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-29 05:36:07.123 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-29 05:36:07.125 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-29 05:36:07.125 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-29 05:36:07.126 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-29 05:36:07.438  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-29 05:36:07.439  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-29 05:36:07.439 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-29 05:36:07.440 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-29 05:36:07.443  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-29 05:36:07.443  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-29 05:36:07.444 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-29 05:36:07.444 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-29 05:36:07.444 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-29 05:36:07.445 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-29 05:36:07.446 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-29 05:36:07.446 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-29 05:36:07.448 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-29 05:36:07.448 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-29 05:36:07.448 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-29 05:36:07.450 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-29 05:36:07.454 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 617457434319370152944918253335611381195539679963
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Dec 29 03:16:22 UTC 2022
           Final Date: Tue Dec 28 03:16:21 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [9f:cb:1c:af:15:2c:f8:55:72:22:7c:02:85:24:77:7a:64:c4:75:4b],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: e2070244f317b58a5f06fc46ed159e1f5dd432b3
                       10ef347a5a787903ce64ca52c84f2a5973a5ce96
                       645e69d44956d218c4a6e115923abd83259c3e51
                       2323c97caf334e9ced8d4c7de10d13965669c99f
                       0ce1798f6789c49b53252859da6b6a2930452bb4
                       902ebf8f05778a42c1ce5f1e6f9f8eea77c287c7
                       3930b8f3880cb82babcaf087540aa9712909150f
                       dea0c003308f49403aaec12e91f24d1d5d53caa8
                       6bf1e37e7c332d3ca96b9a857d8442ecdb60ca09
                       a35f800c63ba859b5a76b4230470e1f3e6e9d0f9
                       53acbc30ba38dbab2ae411ee91d508de64830398
                       b7306c7e20827d1987751674864d22a5dfc3cbe1
                       7d2e88ecf5298e1c0eafce4c7fd385322f72cf1a
                       2d279af291f2dea32fb50777eb64c822511b018a
                       9eba77a74625ed847714245dd04d4a8a3cb4f89c
                       edfaf922da2088ca3d23de8826dec4b2ab869750
                       827c739d08484f12a6e7289148f3ac0dcf2926a6
                       57c2b968a46a45e14e7db67cfd9f1e53a6e299d9
                       7bb6700bc721985a0fdf3709953a225eacb5c659
                       8449eb49
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [35:ed:21:90:ed:54:fd:fd:81:3e:bb:6e:85:6b:13:4e:57:61:4d:ee],[56:66:d1:a4]
        modulus: c3f9aff2524fd756eb632802601bea287bce319ee3fa34f7747c6cf1a0cd73aff2b2c1f38b81dcd1c66a8ee46b021eb549f5a4caf5f4cd3b9a17465264915f8aa45c48c538243d9d92672b8688a5dc180397ea43e629eca8075f4942192fef7cdc523d93d9d4654741b2ec95e0e1df3dd746058acf6836338ece302a7c91ea98faa3ede71d7c75c20d21a76986cfccd4e4a9880a209a98b9d5a0564e8fae26369eb8e9ab0f6685d88ead47d57e6ebfd4ab3ca0163e03180e69a2aa3ce57af66d5ff9c8aefdf8172fe6d1e0701435983d106b6199edd7e640154fcb472947ed08c58fb09a8234bdd59462fdfa9748e30ecfbecf38d798d3009cdea6301c002dfd
public exponent: 10001

] 
2022-12-29 05:38:12.582  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-29 05:38:12.583 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-29 05:38:12.594 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-12-29 05:38:12.595 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-29 05:38:12.596  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-12-29 05:38:12.602  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-29 05:38:12.606  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-29 05:38:12.607 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-29 05:38:12.607 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-29 05:38:12.608 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-29 05:38:12.615 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-29 05:38:12.616 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-29 05:38:12.616 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-29 05:38:12.617 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-29 05:38:12.843  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-29 05:38:12.844  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-29 05:38:12.845 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-29 05:38:12.846 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-29 05:38:12.850  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-29 05:38:12.851  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-29 05:38:12.851 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-29 05:38:12.852 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-29 05:38:12.852 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-29 05:38:12.853 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-29 05:38:12.853 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-29 05:38:12.854 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-29 05:38:12.855 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-29 05:38:12.855 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-29 05:38:12.856 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-29 05:38:12.857 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-29 05:38:12.860 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 617457434319370152944918253335611381195539679963
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Dec 29 03:16:22 UTC 2022
           Final Date: Tue Dec 28 03:16:21 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [9f:cb:1c:af:15:2c:f8:55:72:22:7c:02:85:24:77:7a:64:c4:75:4b],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: e2070244f317b58a5f06fc46ed159e1f5dd432b3
                       10ef347a5a787903ce64ca52c84f2a5973a5ce96
                       645e69d44956d218c4a6e115923abd83259c3e51
                       2323c97caf334e9ced8d4c7de10d13965669c99f
                       0ce1798f6789c49b53252859da6b6a2930452bb4
                       902ebf8f05778a42c1ce5f1e6f9f8eea77c287c7
                       3930b8f3880cb82babcaf087540aa9712909150f
                       dea0c003308f49403aaec12e91f24d1d5d53caa8
                       6bf1e37e7c332d3ca96b9a857d8442ecdb60ca09
                       a35f800c63ba859b5a76b4230470e1f3e6e9d0f9
                       53acbc30ba38dbab2ae411ee91d508de64830398
                       b7306c7e20827d1987751674864d22a5dfc3cbe1
                       7d2e88ecf5298e1c0eafce4c7fd385322f72cf1a
                       2d279af291f2dea32fb50777eb64c822511b018a
                       9eba77a74625ed847714245dd04d4a8a3cb4f89c
                       edfaf922da2088ca3d23de8826dec4b2ab869750
                       827c739d08484f12a6e7289148f3ac0dcf2926a6
                       57c2b968a46a45e14e7db67cfd9f1e53a6e299d9
                       7bb6700bc721985a0fdf3709953a225eacb5c659
                       8449eb49
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [52:82:97:91:f5:89:9e:f0:42:ce:29:99:46:81:66:88:3f:b3:1f:34],[56:66:d1:a4]
        modulus: ac0f525ea9be3795f917c6ffa9773969e139050a7275737e2c38d25191dcc83b2415f957af649c5f21ca47021b02a6592edd7a9a06735bef15c82f978897626beb750c71ef667687925cd78d4efff218719be72804451707cb1c07b0040d360cbae5ae4f7e61175a6d4b6f3eab3c1986079fa56fa2855f8327b34f62536d37d02d0989cfd05723fb4d7fbb76401df348f565418c5280ad37872abd0019dad6984ae990f44515c4302df6ab1862208a07dcae4a1d3c546777df77aa6f48ebc04f16dcaf2de23fa8dc0853bffd95581897cb917b94794f59f31b05c1c4b5e55fdb32361fb6c9158d18d1776593c00df007bb8ef01a8e7b74b4795dea0c1fcda295
public exponent: 10001

] 
2022-12-29 05:51:44.284  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-29 05:51:44.287 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-29 05:51:44.291 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-12-29 05:51:44.292 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-29 05:51:44.293  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-12-29 05:51:44.295  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-29 05:51:44.297  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-29 05:51:44.298 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-29 05:51:44.298 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-29 05:51:44.299 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-29 05:51:44.303 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-29 05:51:44.304 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-29 05:51:44.304 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-29 05:51:44.305 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-29 05:51:44.535  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-29 05:51:44.536  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-29 05:51:44.537 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-29 05:51:44.537 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-29 05:51:44.539  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-29 05:51:44.540  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-29 05:51:44.540 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-29 05:51:44.541 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-29 05:51:44.541 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-29 05:51:44.542 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-29 05:51:44.542 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-29 05:51:44.542 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-29 05:51:44.543 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-29 05:51:44.544 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-29 05:51:44.544 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-29 05:51:44.545 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-29 05:51:44.549 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 617457434319370152944918253335611381195539679963
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Dec 29 03:16:22 UTC 2022
           Final Date: Tue Dec 28 03:16:21 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [9f:cb:1c:af:15:2c:f8:55:72:22:7c:02:85:24:77:7a:64:c4:75:4b],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: e2070244f317b58a5f06fc46ed159e1f5dd432b3
                       10ef347a5a787903ce64ca52c84f2a5973a5ce96
                       645e69d44956d218c4a6e115923abd83259c3e51
                       2323c97caf334e9ced8d4c7de10d13965669c99f
                       0ce1798f6789c49b53252859da6b6a2930452bb4
                       902ebf8f05778a42c1ce5f1e6f9f8eea77c287c7
                       3930b8f3880cb82babcaf087540aa9712909150f
                       dea0c003308f49403aaec12e91f24d1d5d53caa8
                       6bf1e37e7c332d3ca96b9a857d8442ecdb60ca09
                       a35f800c63ba859b5a76b4230470e1f3e6e9d0f9
                       53acbc30ba38dbab2ae411ee91d508de64830398
                       b7306c7e20827d1987751674864d22a5dfc3cbe1
                       7d2e88ecf5298e1c0eafce4c7fd385322f72cf1a
                       2d279af291f2dea32fb50777eb64c822511b018a
                       9eba77a74625ed847714245dd04d4a8a3cb4f89c
                       edfaf922da2088ca3d23de8826dec4b2ab869750
                       827c739d08484f12a6e7289148f3ac0dcf2926a6
                       57c2b968a46a45e14e7db67cfd9f1e53a6e299d9
                       7bb6700bc721985a0fdf3709953a225eacb5c659
                       8449eb49
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [9a:d4:7d:94:07:a6:3b:8c:a8:e8:bd:57:3b:13:64:d2:1c:81:36:c3],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-12-29 05:59:18.536  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-29 05:59:18.538 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-29 05:59:18.541 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-12-29 05:59:18.542 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-29 05:59:18.542  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-12-29 05:59:18.543  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-29 05:59:18.543  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-29 05:59:18.544 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-29 05:59:18.544 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-29 05:59:18.545 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-29 05:59:18.549 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-29 05:59:18.550 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-29 05:59:18.551 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-29 05:59:18.552 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-29 05:59:18.784  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-29 05:59:18.786  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-29 05:59:18.786 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-29 05:59:18.786 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-29 05:59:18.789  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-29 05:59:18.789  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-29 05:59:18.790 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-29 05:59:18.790 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-29 05:59:18.791 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-29 05:59:18.792 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-29 05:59:18.794 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-29 05:59:18.795 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-29 05:59:18.797 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-29 05:59:18.797 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-29 05:59:18.797 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-29 05:59:18.798 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-29 05:59:18.804 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 617457434319370152944918253335611381195539679963
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Dec 29 03:16:22 UTC 2022
           Final Date: Tue Dec 28 03:16:21 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [9f:cb:1c:af:15:2c:f8:55:72:22:7c:02:85:24:77:7a:64:c4:75:4b],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: e2070244f317b58a5f06fc46ed159e1f5dd432b3
                       10ef347a5a787903ce64ca52c84f2a5973a5ce96
                       645e69d44956d218c4a6e115923abd83259c3e51
                       2323c97caf334e9ced8d4c7de10d13965669c99f
                       0ce1798f6789c49b53252859da6b6a2930452bb4
                       902ebf8f05778a42c1ce5f1e6f9f8eea77c287c7
                       3930b8f3880cb82babcaf087540aa9712909150f
                       dea0c003308f49403aaec12e91f24d1d5d53caa8
                       6bf1e37e7c332d3ca96b9a857d8442ecdb60ca09
                       a35f800c63ba859b5a76b4230470e1f3e6e9d0f9
                       53acbc30ba38dbab2ae411ee91d508de64830398
                       b7306c7e20827d1987751674864d22a5dfc3cbe1
                       7d2e88ecf5298e1c0eafce4c7fd385322f72cf1a
                       2d279af291f2dea32fb50777eb64c822511b018a
                       9eba77a74625ed847714245dd04d4a8a3cb4f89c
                       edfaf922da2088ca3d23de8826dec4b2ab869750
                       827c739d08484f12a6e7289148f3ac0dcf2926a6
                       57c2b968a46a45e14e7db67cfd9f1e53a6e299d9
                       7bb6700bc721985a0fdf3709953a225eacb5c659
                       8449eb49
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [65:54:65:db:e6:09:a6:c8:88:c7:2e:22:a1:1f:9c:0f:06:b1:00:6d],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-12-29 06:02:47.605  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-29 06:02:47.607 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-29 06:02:47.609 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-12-29 06:02:47.609 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-29 06:02:47.610  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-12-29 06:02:47.610  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-29 06:02:47.611  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-29 06:02:47.611 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-29 06:02:47.612 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-29 06:02:47.612 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-29 06:02:47.617 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-29 06:02:47.618 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-29 06:02:47.618 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-29 06:02:47.618 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-29 06:02:47.777  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-29 06:02:47.778  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-29 06:02:47.779 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-29 06:02:47.779 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-29 06:02:47.780  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-29 06:02:47.781  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-29 06:02:47.781 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-29 06:02:47.782 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-29 06:02:47.782 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-29 06:02:47.783 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-29 06:02:47.783 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-29 06:02:47.784 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-29 06:02:47.784 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-29 06:02:47.785 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-29 06:02:47.785 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-29 06:02:47.786 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-29 06:02:47.789 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 617457434319370152944918253335611381195539679963
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Dec 29 03:16:22 UTC 2022
           Final Date: Tue Dec 28 03:16:21 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [9f:cb:1c:af:15:2c:f8:55:72:22:7c:02:85:24:77:7a:64:c4:75:4b],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: e2070244f317b58a5f06fc46ed159e1f5dd432b3
                       10ef347a5a787903ce64ca52c84f2a5973a5ce96
                       645e69d44956d218c4a6e115923abd83259c3e51
                       2323c97caf334e9ced8d4c7de10d13965669c99f
                       0ce1798f6789c49b53252859da6b6a2930452bb4
                       902ebf8f05778a42c1ce5f1e6f9f8eea77c287c7
                       3930b8f3880cb82babcaf087540aa9712909150f
                       dea0c003308f49403aaec12e91f24d1d5d53caa8
                       6bf1e37e7c332d3ca96b9a857d8442ecdb60ca09
                       a35f800c63ba859b5a76b4230470e1f3e6e9d0f9
                       53acbc30ba38dbab2ae411ee91d508de64830398
                       b7306c7e20827d1987751674864d22a5dfc3cbe1
                       7d2e88ecf5298e1c0eafce4c7fd385322f72cf1a
                       2d279af291f2dea32fb50777eb64c822511b018a
                       9eba77a74625ed847714245dd04d4a8a3cb4f89c
                       edfaf922da2088ca3d23de8826dec4b2ab869750
                       827c739d08484f12a6e7289148f3ac0dcf2926a6
                       57c2b968a46a45e14e7db67cfd9f1e53a6e299d9
                       7bb6700bc721985a0fdf3709953a225eacb5c659
                       8449eb49
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [79:6c:54:e6:8b:52:4d:ad:89:c2:52:56:aa:cb:be:76:8c:be:03:66],[56:66:d1:a4]
        modulus: c12e27239d1fa689ddda21372723bf6d0335ce62fbb0d0e31d618adb2622c988654a626fda52a1ee76036cda3a60c2ee91fad7e3977576ee5e030929ac4bf352cf3916f2bcacb46142f199ea0118fb62d8223d21eb6c70a54221a427a53cf6baa7c65ce4835e7c7a70a85c887ceaa8cf912203fde6297800011ccbe46398dce772b495520496f1f225b9333a73e9a2fd7892f9b5629576ff9436e7288789e7f25c2e9867456facad94519059793e881fb5a72ac64a98f0a5dda8b5848af8471024947491073aa97fdfc76eb7adf7ac2d6c356edc0b5b6e56781908644cc3aeb5061858d0a2ab7b8114ae191e1f233a11bf31e688008bfd4c6224fb5124c87027
public exponent: 10001

] 
2022-12-29 06:10:51.380  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-29 06:10:51.383 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-29 06:10:51.386 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-12-29 06:10:51.386 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-29 06:10:51.387  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-12-29 06:10:51.388  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-29 06:10:51.388  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-29 06:10:51.388 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-29 06:10:51.389 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-29 06:10:51.389 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-29 06:10:51.394 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-29 06:10:51.395 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-29 06:10:51.395 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-29 06:10:51.395 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-29 06:10:51.653  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-29 06:10:51.653  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-29 06:10:51.654 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-29 06:10:51.655 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-29 06:10:51.658  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-29 06:10:51.659  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-29 06:10:51.660 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-29 06:10:51.660 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-29 06:10:51.661 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-29 06:10:51.663 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-29 06:10:51.663 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-29 06:10:51.664 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-29 06:10:51.665 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-29 06:10:51.666 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-29 06:10:51.666 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-29 06:10:51.667 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-29 06:10:51.670 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 617457434319370152944918253335611381195539679963
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Dec 29 03:16:22 UTC 2022
           Final Date: Tue Dec 28 03:16:21 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [9f:cb:1c:af:15:2c:f8:55:72:22:7c:02:85:24:77:7a:64:c4:75:4b],[56:66:d1:a4]
        modulus: eff3b5edc922758c4c70a02ca84befc65b897c64cf2e13ac67f351499e3aa0b74272e8dbf3cbb5fe6c7fe96702b3576befe98e5c43922815792a1cf6f8a93a3332919ddae9ab4a0bfc7fd282f83c21f51d5048a2d2e3d3fb303d965c93f9ad8caf0d50ded30cbcc744c0d74daa4385e988216416ab39b09e9629b37d8a88cfe7d149277634bf9b4454b24bf59d80fa2b6a3460177a6805bd6a89f2eadc6a9b40bb25f1474897d8530c5fa4820798cc6f4bc1820afeea7c4b167c6c21d3542d611a6c3eb957d15572b6254e04d4ea1fc03ac452db28569ed3f578f66b33f4eb427e1c7edef15f856f58440d8805a428bb02116007de3e2ebc1dd36e3fbcf7b7ba2c0ae8614cef67930408a5cde1263630b66bdf197eeaa7eda32186c1788c69a605cfa77793eda044085a2abfdc37650255d8f256a0ee1cee11cf63f8a92dab9dda640835c0b475a8f21d2c30f1deee6c437cb85e7941b59d4ce5c66b1138d306321c459c5acac7c8627a06aa722de13ea208824922ff82d7d1d051518e4f1823
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: e2070244f317b58a5f06fc46ed159e1f5dd432b3
                       10ef347a5a787903ce64ca52c84f2a5973a5ce96
                       645e69d44956d218c4a6e115923abd83259c3e51
                       2323c97caf334e9ced8d4c7de10d13965669c99f
                       0ce1798f6789c49b53252859da6b6a2930452bb4
                       902ebf8f05778a42c1ce5f1e6f9f8eea77c287c7
                       3930b8f3880cb82babcaf087540aa9712909150f
                       dea0c003308f49403aaec12e91f24d1d5d53caa8
                       6bf1e37e7c332d3ca96b9a857d8442ecdb60ca09
                       a35f800c63ba859b5a76b4230470e1f3e6e9d0f9
                       53acbc30ba38dbab2ae411ee91d508de64830398
                       b7306c7e20827d1987751674864d22a5dfc3cbe1
                       7d2e88ecf5298e1c0eafce4c7fd385322f72cf1a
                       2d279af291f2dea32fb50777eb64c822511b018a
                       9eba77a74625ed847714245dd04d4a8a3cb4f89c
                       edfaf922da2088ca3d23de8826dec4b2ab869750
                       827c739d08484f12a6e7289148f3ac0dcf2926a6
                       57c2b968a46a45e14e7db67cfd9f1e53a6e299d9
                       7bb6700bc721985a0fdf3709953a225eacb5c659
                       8449eb49
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [88:3a:5e:0e:89:a0:77:0e:12:48:e5:fe:1d:ca:3a:3f:5f:bf:60:2e],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-12-29 06:17:24.133  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-29 06:17:24.136 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-29 06:17:24.139 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-12-29 06:17:24.139 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-29 06:17:24.140  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-12-29 06:17:24.140  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-29 06:17:24.141  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-29 06:17:24.141 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-29 06:17:24.141 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-29 06:17:24.142 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-29 06:17:24.146 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-29 06:17:24.147 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-29 06:17:24.147 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-29 06:17:24.147 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-29 06:17:24.360  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-29 06:17:24.361  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-29 06:17:24.361 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-29 06:17:24.361 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-29 06:17:24.365  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-29 06:17:24.365  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-29 06:17:24.366 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-29 06:17:24.366 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-29 06:17:24.366 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-29 06:17:24.367 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-29 06:17:24.368 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-29 06:17:24.368 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-29 06:17:24.368 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-29 06:17:24.369 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-29 06:17:24.369 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-29 06:17:24.370 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-29 06:17:24.373 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 617457434319370152944918253335611381195539679963
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Dec 29 03:16:22 UTC 2022
           Final Date: Tue Dec 28 03:16:21 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [9f:cb:1c:af:15:2c:f8:55:72:22:7c:02:85:24:77:7a:64:c4:75:4b],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: e2070244f317b58a5f06fc46ed159e1f5dd432b3
                       10ef347a5a787903ce64ca52c84f2a5973a5ce96
                       645e69d44956d218c4a6e115923abd83259c3e51
                       2323c97caf334e9ced8d4c7de10d13965669c99f
                       0ce1798f6789c49b53252859da6b6a2930452bb4
                       902ebf8f05778a42c1ce5f1e6f9f8eea77c287c7
                       3930b8f3880cb82babcaf087540aa9712909150f
                       dea0c003308f49403aaec12e91f24d1d5d53caa8
                       6bf1e37e7c332d3ca96b9a857d8442ecdb60ca09
                       a35f800c63ba859b5a76b4230470e1f3e6e9d0f9
                       53acbc30ba38dbab2ae411ee91d508de64830398
                       b7306c7e20827d1987751674864d22a5dfc3cbe1
                       7d2e88ecf5298e1c0eafce4c7fd385322f72cf1a
                       2d279af291f2dea32fb50777eb64c822511b018a
                       9eba77a74625ed847714245dd04d4a8a3cb4f89c
                       edfaf922da2088ca3d23de8826dec4b2ab869750
                       827c739d08484f12a6e7289148f3ac0dcf2926a6
                       57c2b968a46a45e14e7db67cfd9f1e53a6e299d9
                       7bb6700bc721985a0fdf3709953a225eacb5c659
                       8449eb49
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [46:b1:6d:bf:05:1d:0f:a8:3c:5a:c4:72:15:23:64:7c:1a:56:76:a3],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

]