Results

By type

          2023-01-03 03:28:07,702 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2023-01-03 03:28:08,744 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2023-01-03 03:28:09.530  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Jan 03, 2023 3:28:11 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Jan 03, 2023 3:28:11 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Jan 03, 2023 3:28:11 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Jan 03, 2023 3:28:11 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2023-01-03 03:28:12.235 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2023-01-03 03:28:12.555  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2023-01-03 03:28:12.773  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2023-01-03 03:28:13.585 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2023-01-03 03:28:13.589 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
2023-01-03 03:28:13.591 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2023-01-03 03:28:13.595 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2023-01-03 03:28:13.637 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2023-01-03 03:28:13.641 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
	{GET [/docs]}: redirectToUi(HttpServletRequest)
2023-01-03 03:28:13.767 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2023-01-03 03:28:14.467 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Jan 03, 2023 3:28:15 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2023-01-03 03:28:15.491  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 8.559 seconds (JVM running for 10.29)
Jan 03, 2023 3:28:37 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2023-01-03 03:29:07.330  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-03 03:29:07.337 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-03 03:29:07.373 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2023-01-03 03:29:07.376 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-03 03:29:07.396  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2023-01-03 03:29:07.399  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-03 03:29:07.401  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-03 03:29:07.402 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-03 03:29:07.403 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-03 03:29:07.406 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-03 03:29:07.416 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-03 03:29:07.419 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-03 03:29:07.470 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-03 03:29:07.481 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-03 03:29:07.482 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-03 03:29:07.486 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-03 03:29:08.843  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-03 03:29:08.845  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-03 03:29:08.846 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-03 03:29:08.847 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-03 03:29:08.856  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-03 03:29:08.857  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-03 03:29:08.857 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-03 03:29:08.858 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-03 03:29:08.858 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-03 03:29:08.876 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-03 03:29:08.877 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-03 03:29:08.877 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-03 03:29:08.883 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-03 03:29:08.883 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-03 03:29:08.883 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-03 03:29:08.885 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-03 03:29:08.919 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 87500886665290319116920714104531256657803214836
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jan 03 03:20:23 UTC 2023
           Final Date: Sun Jan 02 03:20:22 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [bb:e6:48:ba:a7:c3:1f:f4:e2:e8:8c:3e:f6:a6:d3:58:3d:c4:38:59],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 43117a4fddeb1fea70289f86be4d1c3108eb6503
                       bf73854f7d153bba786b4f7fdbcba7f9c5d8b3a8
                       77c2ff82ab7c5b8c3a89e326c83a5cf9b1f9bebc
                       b3de60b294c3bf1895361e69c772035fb7640761
                       c16dc2c673a2c0f54e00d134b9f1940c1842f2d0
                       4786010dd18c82055d8cc68533cffbfb2069ed31
                       c2b92fbb30c7fb9ae8b337653624036cf5da4202
                       3ffddbce59d645157b28605709737c7820a45bc6
                       33ef28ee84ddfc274d62c90a92b9ca6e1408e634
                       390b1a18027d03cb14b046cbbe52a2d54b41f469
                       ed5dcaa11236e1f9f3ced2b0869e05e28dd3b183
                       ff2ae67b55d917799297480f538a07be34fa6bbf
                       b7794d5ec6089d73902be38cdfad34a343952a8a
                       14842815a9830f00c6575ee05376599fb5b0ecfe
                       2884534e83f6a44532c3542e0bf9f657387fb1df
                       f225186c383411c657fce4724c7f8fdecaed87e5
                       f8309c5cb6b52b5b73b29f4dfcad80cd7d1a3012
                       070c3a909f6cd9556e3b516b8a204f5ed4c3b8dc
                       9202a540a4aeb4418d2dfd2ba2e9a9e3cc71b418
                       8dedc773
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [a5:7f:03:3f:fb:74:2e:46:b9:69:04:80:d2:ef:36:9e:47:f0:7d:a2],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-03 05:19:04.772  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-03 05:19:04.777 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-03 05:19:04.782 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-03 05:19:04.783 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-03 05:19:04.784  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-03 05:19:04.786  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-03 05:19:04.787  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-03 05:19:04.788 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-03 05:19:04.788 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-03 05:19:04.789 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-03 05:19:04.795 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-03 05:19:04.796 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-03 05:19:04.796 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-03 05:19:04.797 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-03 05:19:05.312  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-03 05:19:05.313  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-03 05:19:05.314 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-03 05:19:05.314 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-03 05:19:05.317  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-03 05:19:05.318  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-03 05:19:05.319 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-03 05:19:05.319 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-03 05:19:05.320 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-03 05:19:05.321 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-03 05:19:05.321 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-03 05:19:05.322 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-03 05:19:05.323 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-03 05:19:05.323 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-03 05:19:05.324 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-03 05:19:05.325 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-03 05:19:05.329 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 87500886665290319116920714104531256657803214836
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jan 03 03:20:23 UTC 2023
           Final Date: Sun Jan 02 03:20:22 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [bb:e6:48:ba:a7:c3:1f:f4:e2:e8:8c:3e:f6:a6:d3:58:3d:c4:38:59],[56:66:d1:a4]
        modulus: d01a51c616b673866a0e194f783ca5d39bceb06ec8560834ff49749d00a682f0e82b8bdd3a64654e500d37313d991738c067f0f60f9d8989d5254feafc7851c66afd1102e1375223bcd6b4e739a154df7429c5119f7f703f9686ef30ac3c8491a663117b3b0d544f33d60a89503c52ed6802f1b3c27a6098bbb5ac984da9793fe05b4341343808af9aedbff33598fb6834ecbcb73517c3225e2264b066efbd38e435d82c89e618c5c6415f913c265cce3e8c67eff139027275eeeb8c0e47d70f5dff8a4317aef316cf296104ecc496aaa9f87ec920fc5ad9f07b6bf123f3001fb396e9688d480c641ecefb32773a21fe4c3558e36d95d3fa6597af9efe80aa722fbce40b3c0ad6094ee3a1f70dcb388683d0d67181f4019f3b41022976f4b2effa5000e631ecfafc5ab3e92e44ed1750cb95690dbb928e78e64a526708bf2953e436355840fe0d1600e4935e94aac953d906791cd9987d034c5eefaa60043a17b07ce3510b44970ebef3e96f901919b0ef8dfdb8a6c0def5275d88ceeb5b98e3
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 43117a4fddeb1fea70289f86be4d1c3108eb6503
                       bf73854f7d153bba786b4f7fdbcba7f9c5d8b3a8
                       77c2ff82ab7c5b8c3a89e326c83a5cf9b1f9bebc
                       b3de60b294c3bf1895361e69c772035fb7640761
                       c16dc2c673a2c0f54e00d134b9f1940c1842f2d0
                       4786010dd18c82055d8cc68533cffbfb2069ed31
                       c2b92fbb30c7fb9ae8b337653624036cf5da4202
                       3ffddbce59d645157b28605709737c7820a45bc6
                       33ef28ee84ddfc274d62c90a92b9ca6e1408e634
                       390b1a18027d03cb14b046cbbe52a2d54b41f469
                       ed5dcaa11236e1f9f3ced2b0869e05e28dd3b183
                       ff2ae67b55d917799297480f538a07be34fa6bbf
                       b7794d5ec6089d73902be38cdfad34a343952a8a
                       14842815a9830f00c6575ee05376599fb5b0ecfe
                       2884534e83f6a44532c3542e0bf9f657387fb1df
                       f225186c383411c657fce4724c7f8fdecaed87e5
                       f8309c5cb6b52b5b73b29f4dfcad80cd7d1a3012
                       070c3a909f6cd9556e3b516b8a204f5ed4c3b8dc
                       9202a540a4aeb4418d2dfd2ba2e9a9e3cc71b418
                       8dedc773
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [e1:48:15:3c:2f:88:70:e7:99:78:8c:49:9a:9e:e0:ea:08:58:b5:c5],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-03 05:20:53.112  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-03 05:20:53.115 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-03 05:20:53.117 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2023-01-03 05:20:53.123 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-03 05:20:53.123  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2023-01-03 05:20:53.124  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-03 05:20:53.125  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-03 05:20:53.126 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-03 05:20:53.126 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-03 05:20:53.127 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-03 05:20:53.132 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-03 05:20:53.132 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-03 05:20:53.133 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-03 05:20:53.134 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-03 05:20:53.597  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-03 05:20:53.598  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-03 05:20:53.599 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-03 05:20:53.600 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-03 05:20:53.604  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-03 05:20:53.605  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-03 05:20:53.606 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-03 05:20:53.607 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-03 05:20:53.607 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-03 05:20:53.608 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-03 05:20:53.609 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-03 05:20:53.609 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-03 05:20:53.610 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-03 05:20:53.611 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-03 05:20:53.611 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-03 05:20:53.612 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-03 05:20:53.618 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 87500886665290319116920714104531256657803214836
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jan 03 03:20:23 UTC 2023
           Final Date: Sun Jan 02 03:20:22 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [bb:e6:48:ba:a7:c3:1f:f4:e2:e8:8c:3e:f6:a6:d3:58:3d:c4:38:59],[56:66:d1:a4]
        modulus: d01a51c616b673866a0e194f783ca5d39bceb06ec8560834ff49749d00a682f0e82b8bdd3a64654e500d37313d991738c067f0f60f9d8989d5254feafc7851c66afd1102e1375223bcd6b4e739a154df7429c5119f7f703f9686ef30ac3c8491a663117b3b0d544f33d60a89503c52ed6802f1b3c27a6098bbb5ac984da9793fe05b4341343808af9aedbff33598fb6834ecbcb73517c3225e2264b066efbd38e435d82c89e618c5c6415f913c265cce3e8c67eff139027275eeeb8c0e47d70f5dff8a4317aef316cf296104ecc496aaa9f87ec920fc5ad9f07b6bf123f3001fb396e9688d480c641ecefb32773a21fe4c3558e36d95d3fa6597af9efe80aa722fbce40b3c0ad6094ee3a1f70dcb388683d0d67181f4019f3b41022976f4b2effa5000e631ecfafc5ab3e92e44ed1750cb95690dbb928e78e64a526708bf2953e436355840fe0d1600e4935e94aac953d906791cd9987d034c5eefaa60043a17b07ce3510b44970ebef3e96f901919b0ef8dfdb8a6c0def5275d88ceeb5b98e3
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 43117a4fddeb1fea70289f86be4d1c3108eb6503
                       bf73854f7d153bba786b4f7fdbcba7f9c5d8b3a8
                       77c2ff82ab7c5b8c3a89e326c83a5cf9b1f9bebc
                       b3de60b294c3bf1895361e69c772035fb7640761
                       c16dc2c673a2c0f54e00d134b9f1940c1842f2d0
                       4786010dd18c82055d8cc68533cffbfb2069ed31
                       c2b92fbb30c7fb9ae8b337653624036cf5da4202
                       3ffddbce59d645157b28605709737c7820a45bc6
                       33ef28ee84ddfc274d62c90a92b9ca6e1408e634
                       390b1a18027d03cb14b046cbbe52a2d54b41f469
                       ed5dcaa11236e1f9f3ced2b0869e05e28dd3b183
                       ff2ae67b55d917799297480f538a07be34fa6bbf
                       b7794d5ec6089d73902be38cdfad34a343952a8a
                       14842815a9830f00c6575ee05376599fb5b0ecfe
                       2884534e83f6a44532c3542e0bf9f657387fb1df
                       f225186c383411c657fce4724c7f8fdecaed87e5
                       f8309c5cb6b52b5b73b29f4dfcad80cd7d1a3012
                       070c3a909f6cd9556e3b516b8a204f5ed4c3b8dc
                       9202a540a4aeb4418d2dfd2ba2e9a9e3cc71b418
                       8dedc773
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [0a:92:89:bf:87:38:9b:d6:f5:9f:93:32:16:45:19:1a:b3:cf:2a:00],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-03 05:22:42.812  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-03 05:22:42.814 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-03 05:22:42.816 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2023-01-03 05:22:42.817 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-03 05:22:42.817  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2023-01-03 05:22:42.819  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-03 05:22:42.819  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-03 05:22:42.820 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-03 05:22:42.820 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-03 05:22:42.821 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-03 05:22:42.826 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-03 05:22:42.827 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-03 05:22:42.827 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-03 05:22:42.827 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-03 05:22:43.291  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-03 05:22:43.292  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-03 05:22:43.293 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-03 05:22:43.296 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-03 05:22:43.304  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-03 05:22:43.304  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-03 05:22:43.305 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-03 05:22:43.306 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-03 05:22:43.306 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-03 05:22:43.307 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-03 05:22:43.307 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-03 05:22:43.308 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-03 05:22:43.309 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-03 05:22:43.310 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-03 05:22:43.321 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-03 05:22:43.322 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-03 05:22:43.327 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 87500886665290319116920714104531256657803214836
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jan 03 03:20:23 UTC 2023
           Final Date: Sun Jan 02 03:20:22 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [bb:e6:48:ba:a7:c3:1f:f4:e2:e8:8c:3e:f6:a6:d3:58:3d:c4:38:59],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 43117a4fddeb1fea70289f86be4d1c3108eb6503
                       bf73854f7d153bba786b4f7fdbcba7f9c5d8b3a8
                       77c2ff82ab7c5b8c3a89e326c83a5cf9b1f9bebc
                       b3de60b294c3bf1895361e69c772035fb7640761
                       c16dc2c673a2c0f54e00d134b9f1940c1842f2d0
                       4786010dd18c82055d8cc68533cffbfb2069ed31
                       c2b92fbb30c7fb9ae8b337653624036cf5da4202
                       3ffddbce59d645157b28605709737c7820a45bc6
                       33ef28ee84ddfc274d62c90a92b9ca6e1408e634
                       390b1a18027d03cb14b046cbbe52a2d54b41f469
                       ed5dcaa11236e1f9f3ced2b0869e05e28dd3b183
                       ff2ae67b55d917799297480f538a07be34fa6bbf
                       b7794d5ec6089d73902be38cdfad34a343952a8a
                       14842815a9830f00c6575ee05376599fb5b0ecfe
                       2884534e83f6a44532c3542e0bf9f657387fb1df
                       f225186c383411c657fce4724c7f8fdecaed87e5
                       f8309c5cb6b52b5b73b29f4dfcad80cd7d1a3012
                       070c3a909f6cd9556e3b516b8a204f5ed4c3b8dc
                       9202a540a4aeb4418d2dfd2ba2e9a9e3cc71b418
                       8dedc773
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [67:ad:92:eb:ff:72:ca:46:05:79:64:d1:65:a1:12:41:4b:7b:4e:0f],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-03 05:25:48.983  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-03 05:25:48.985 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-03 05:25:48.986 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-03 05:25:48.987 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-03 05:25:48.987  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-03 05:25:48.988  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-03 05:25:48.988  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-03 05:25:48.989 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-03 05:25:48.989 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-03 05:25:48.990 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-03 05:25:48.994 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-03 05:25:48.995 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-03 05:25:48.995 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-03 05:25:48.995 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-03 05:25:49.409  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-03 05:25:49.410  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-03 05:25:49.410 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-03 05:25:49.411 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-03 05:25:49.412  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-03 05:25:49.413  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-03 05:25:49.413 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-03 05:25:49.413 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-03 05:25:49.414 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-03 05:25:49.415 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-03 05:25:49.415 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-03 05:25:49.415 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-03 05:25:49.416 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-03 05:25:49.416 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-03 05:25:49.417 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-03 05:25:49.418 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-03 05:25:49.421 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 87500886665290319116920714104531256657803214836
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jan 03 03:20:23 UTC 2023
           Final Date: Sun Jan 02 03:20:22 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [bb:e6:48:ba:a7:c3:1f:f4:e2:e8:8c:3e:f6:a6:d3:58:3d:c4:38:59],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 43117a4fddeb1fea70289f86be4d1c3108eb6503
                       bf73854f7d153bba786b4f7fdbcba7f9c5d8b3a8
                       77c2ff82ab7c5b8c3a89e326c83a5cf9b1f9bebc
                       b3de60b294c3bf1895361e69c772035fb7640761
                       c16dc2c673a2c0f54e00d134b9f1940c1842f2d0
                       4786010dd18c82055d8cc68533cffbfb2069ed31
                       c2b92fbb30c7fb9ae8b337653624036cf5da4202
                       3ffddbce59d645157b28605709737c7820a45bc6
                       33ef28ee84ddfc274d62c90a92b9ca6e1408e634
                       390b1a18027d03cb14b046cbbe52a2d54b41f469
                       ed5dcaa11236e1f9f3ced2b0869e05e28dd3b183
                       ff2ae67b55d917799297480f538a07be34fa6bbf
                       b7794d5ec6089d73902be38cdfad34a343952a8a
                       14842815a9830f00c6575ee05376599fb5b0ecfe
                       2884534e83f6a44532c3542e0bf9f657387fb1df
                       f225186c383411c657fce4724c7f8fdecaed87e5
                       f8309c5cb6b52b5b73b29f4dfcad80cd7d1a3012
                       070c3a909f6cd9556e3b516b8a204f5ed4c3b8dc
                       9202a540a4aeb4418d2dfd2ba2e9a9e3cc71b418
                       8dedc773
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [a2:fd:eb:cd:1f:64:54:66:2c:e6:22:80:11:05:72:d6:03:14:a5:19],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-03 05:33:01.648  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-03 05:33:01.652 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-03 05:33:01.655 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-03 05:33:01.657 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-03 05:33:01.658  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-03 05:33:01.659  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-03 05:33:01.659  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-03 05:33:01.660 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-03 05:33:01.661 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-03 05:33:01.661 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-03 05:33:01.668 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-03 05:33:01.670 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-03 05:33:01.670 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-03 05:33:01.671 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-03 05:33:02.029  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-03 05:33:02.030  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-03 05:33:02.031 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-03 05:33:02.031 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-03 05:33:02.032  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-03 05:33:02.033  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-03 05:33:02.034 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-03 05:33:02.034 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-03 05:33:02.034 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-03 05:33:02.035 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-03 05:33:02.036 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-03 05:33:02.036 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-03 05:33:02.037 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-03 05:33:02.037 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-03 05:33:02.038 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-03 05:33:02.039 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-03 05:33:02.043 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 87500886665290319116920714104531256657803214836
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jan 03 03:20:23 UTC 2023
           Final Date: Sun Jan 02 03:20:22 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [bb:e6:48:ba:a7:c3:1f:f4:e2:e8:8c:3e:f6:a6:d3:58:3d:c4:38:59],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 43117a4fddeb1fea70289f86be4d1c3108eb6503
                       bf73854f7d153bba786b4f7fdbcba7f9c5d8b3a8
                       77c2ff82ab7c5b8c3a89e326c83a5cf9b1f9bebc
                       b3de60b294c3bf1895361e69c772035fb7640761
                       c16dc2c673a2c0f54e00d134b9f1940c1842f2d0
                       4786010dd18c82055d8cc68533cffbfb2069ed31
                       c2b92fbb30c7fb9ae8b337653624036cf5da4202
                       3ffddbce59d645157b28605709737c7820a45bc6
                       33ef28ee84ddfc274d62c90a92b9ca6e1408e634
                       390b1a18027d03cb14b046cbbe52a2d54b41f469
                       ed5dcaa11236e1f9f3ced2b0869e05e28dd3b183
                       ff2ae67b55d917799297480f538a07be34fa6bbf
                       b7794d5ec6089d73902be38cdfad34a343952a8a
                       14842815a9830f00c6575ee05376599fb5b0ecfe
                       2884534e83f6a44532c3542e0bf9f657387fb1df
                       f225186c383411c657fce4724c7f8fdecaed87e5
                       f8309c5cb6b52b5b73b29f4dfcad80cd7d1a3012
                       070c3a909f6cd9556e3b516b8a204f5ed4c3b8dc
                       9202a540a4aeb4418d2dfd2ba2e9a9e3cc71b418
                       8dedc773
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [5f:4c:cd:0f:51:b7:9d:3c:8e:c8:7f:cf:2e:a3:88:81:1d:f9:fd:ba],[56:66:d1:a4]
        modulus: cf83aec3bb596c7cf211a2b10f8acd1194aedaf7306188453697b374834606c394e1b8d0339e266d2c0e7aa1704bb54f3dad1a973f13867b5ab348ecec0e4ea85e6393c4c00d257e2b8149ac5e44f17f5cdc4876026bc02bcada5e7af6aaabc026730fe133eea927995db6124de95666ca931937a4687e77fbc4d42e0458d223d3196075ea74fcbbf4ab33456f840b2c232d8b6172120f81d8317098b32514470ce4c949f81248f515b7151a80370de61b7af3a797ee20ef9473202b48541af8fc0698d74b4aebf8b4e387d95ae144f1fdbd238f9e9bfa69c72a44113d8bf2bebc435041061011ccef743fb2bff0aa0e0b6eed952a8894dad022dca8ef7624d5
public exponent: 10001

] 
2023-01-03 05:38:46.664  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-03 05:38:46.665 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-03 05:38:46.668 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-03 05:38:46.672 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-03 05:38:46.673  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-03 05:38:46.674  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-03 05:38:46.674  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-03 05:38:46.675 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-03 05:38:46.675 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-03 05:38:46.675 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-03 05:38:46.679 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-03 05:38:46.680 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-03 05:38:46.680 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-03 05:38:46.680 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-03 05:38:47.106  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-03 05:38:47.107  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-03 05:38:47.107 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-03 05:38:47.108 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-03 05:38:47.109  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-03 05:38:47.109  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-03 05:38:47.110 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-03 05:38:47.111 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-03 05:38:47.111 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-03 05:38:47.112 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-03 05:38:47.112 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-03 05:38:47.113 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-03 05:38:47.113 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-03 05:38:47.114 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-03 05:38:47.114 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-03 05:38:47.115 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-03 05:38:47.118 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 87500886665290319116920714104531256657803214836
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jan 03 03:20:23 UTC 2023
           Final Date: Sun Jan 02 03:20:22 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [bb:e6:48:ba:a7:c3:1f:f4:e2:e8:8c:3e:f6:a6:d3:58:3d:c4:38:59],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 43117a4fddeb1fea70289f86be4d1c3108eb6503
                       bf73854f7d153bba786b4f7fdbcba7f9c5d8b3a8
                       77c2ff82ab7c5b8c3a89e326c83a5cf9b1f9bebc
                       b3de60b294c3bf1895361e69c772035fb7640761
                       c16dc2c673a2c0f54e00d134b9f1940c1842f2d0
                       4786010dd18c82055d8cc68533cffbfb2069ed31
                       c2b92fbb30c7fb9ae8b337653624036cf5da4202
                       3ffddbce59d645157b28605709737c7820a45bc6
                       33ef28ee84ddfc274d62c90a92b9ca6e1408e634
                       390b1a18027d03cb14b046cbbe52a2d54b41f469
                       ed5dcaa11236e1f9f3ced2b0869e05e28dd3b183
                       ff2ae67b55d917799297480f538a07be34fa6bbf
                       b7794d5ec6089d73902be38cdfad34a343952a8a
                       14842815a9830f00c6575ee05376599fb5b0ecfe
                       2884534e83f6a44532c3542e0bf9f657387fb1df
                       f225186c383411c657fce4724c7f8fdecaed87e5
                       f8309c5cb6b52b5b73b29f4dfcad80cd7d1a3012
                       070c3a909f6cd9556e3b516b8a204f5ed4c3b8dc
                       9202a540a4aeb4418d2dfd2ba2e9a9e3cc71b418
                       8dedc773
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [b0:42:1a:d3:15:8e:68:06:9d:52:f8:02:93:a4:7c:b5:e3:ae:fb:60],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-03 05:45:59.055  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-03 05:45:59.060 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-03 05:45:59.063 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2023-01-03 05:45:59.065 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-03 05:45:59.066  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2023-01-03 05:45:59.067  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-03 05:45:59.068  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-03 05:45:59.068 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-03 05:45:59.069 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-03 05:45:59.070 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-03 05:45:59.078 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-03 05:45:59.081 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-03 05:45:59.082 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-03 05:45:59.084 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-03 05:45:59.675  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-03 05:45:59.676  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-03 05:45:59.677 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-03 05:45:59.677 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-03 05:45:59.678  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-03 05:45:59.679  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-03 05:45:59.679 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-03 05:45:59.680 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-03 05:45:59.680 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-03 05:45:59.681 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-03 05:45:59.681 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-03 05:45:59.681 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-03 05:45:59.682 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-03 05:45:59.682 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-03 05:45:59.683 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-03 05:45:59.683 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-03 05:45:59.688 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 87500886665290319116920714104531256657803214836
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jan 03 03:20:23 UTC 2023
           Final Date: Sun Jan 02 03:20:22 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [bb:e6:48:ba:a7:c3:1f:f4:e2:e8:8c:3e:f6:a6:d3:58:3d:c4:38:59],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 43117a4fddeb1fea70289f86be4d1c3108eb6503
                       bf73854f7d153bba786b4f7fdbcba7f9c5d8b3a8
                       77c2ff82ab7c5b8c3a89e326c83a5cf9b1f9bebc
                       b3de60b294c3bf1895361e69c772035fb7640761
                       c16dc2c673a2c0f54e00d134b9f1940c1842f2d0
                       4786010dd18c82055d8cc68533cffbfb2069ed31
                       c2b92fbb30c7fb9ae8b337653624036cf5da4202
                       3ffddbce59d645157b28605709737c7820a45bc6
                       33ef28ee84ddfc274d62c90a92b9ca6e1408e634
                       390b1a18027d03cb14b046cbbe52a2d54b41f469
                       ed5dcaa11236e1f9f3ced2b0869e05e28dd3b183
                       ff2ae67b55d917799297480f538a07be34fa6bbf
                       b7794d5ec6089d73902be38cdfad34a343952a8a
                       14842815a9830f00c6575ee05376599fb5b0ecfe
                       2884534e83f6a44532c3542e0bf9f657387fb1df
                       f225186c383411c657fce4724c7f8fdecaed87e5
                       f8309c5cb6b52b5b73b29f4dfcad80cd7d1a3012
                       070c3a909f6cd9556e3b516b8a204f5ed4c3b8dc
                       9202a540a4aeb4418d2dfd2ba2e9a9e3cc71b418
                       8dedc773
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [99:c6:85:8c:fe:60:6f:6c:be:4d:b1:cb:53:0f:a3:ba:e0:b7:15:9d],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-03 05:52:58.386  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-03 05:52:58.388 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-03 05:52:58.390 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2023-01-03 05:52:58.390 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-03 05:52:58.391  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2023-01-03 05:52:58.391  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-03 05:52:58.392  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-03 05:52:58.393 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-03 05:52:58.393 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-03 05:52:58.393 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-03 05:52:58.397 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-03 05:52:58.398 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-03 05:52:58.398 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-03 05:52:58.399 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-03 05:52:58.932  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-03 05:52:58.933  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-03 05:52:58.933 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-03 05:52:58.934 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-03 05:52:58.938  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-03 05:52:58.939  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-03 05:52:58.939 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-03 05:52:58.940 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-03 05:52:58.940 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-03 05:52:58.941 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-03 05:52:58.941 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-03 05:52:58.942 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-03 05:52:58.942 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-03 05:52:58.943 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-03 05:52:58.943 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-03 05:52:58.943 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-03 05:52:58.946 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 87500886665290319116920714104531256657803214836
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jan 03 03:20:23 UTC 2023
           Final Date: Sun Jan 02 03:20:22 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [bb:e6:48:ba:a7:c3:1f:f4:e2:e8:8c:3e:f6:a6:d3:58:3d:c4:38:59],[56:66:d1:a4]
        modulus: d01a51c616b673866a0e194f783ca5d39bceb06ec8560834ff49749d00a682f0e82b8bdd3a64654e500d37313d991738c067f0f60f9d8989d5254feafc7851c66afd1102e1375223bcd6b4e739a154df7429c5119f7f703f9686ef30ac3c8491a663117b3b0d544f33d60a89503c52ed6802f1b3c27a6098bbb5ac984da9793fe05b4341343808af9aedbff33598fb6834ecbcb73517c3225e2264b066efbd38e435d82c89e618c5c6415f913c265cce3e8c67eff139027275eeeb8c0e47d70f5dff8a4317aef316cf296104ecc496aaa9f87ec920fc5ad9f07b6bf123f3001fb396e9688d480c641ecefb32773a21fe4c3558e36d95d3fa6597af9efe80aa722fbce40b3c0ad6094ee3a1f70dcb388683d0d67181f4019f3b41022976f4b2effa5000e631ecfafc5ab3e92e44ed1750cb95690dbb928e78e64a526708bf2953e436355840fe0d1600e4935e94aac953d906791cd9987d034c5eefaa60043a17b07ce3510b44970ebef3e96f901919b0ef8dfdb8a6c0def5275d88ceeb5b98e3
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 43117a4fddeb1fea70289f86be4d1c3108eb6503
                       bf73854f7d153bba786b4f7fdbcba7f9c5d8b3a8
                       77c2ff82ab7c5b8c3a89e326c83a5cf9b1f9bebc
                       b3de60b294c3bf1895361e69c772035fb7640761
                       c16dc2c673a2c0f54e00d134b9f1940c1842f2d0
                       4786010dd18c82055d8cc68533cffbfb2069ed31
                       c2b92fbb30c7fb9ae8b337653624036cf5da4202
                       3ffddbce59d645157b28605709737c7820a45bc6
                       33ef28ee84ddfc274d62c90a92b9ca6e1408e634
                       390b1a18027d03cb14b046cbbe52a2d54b41f469
                       ed5dcaa11236e1f9f3ced2b0869e05e28dd3b183
                       ff2ae67b55d917799297480f538a07be34fa6bbf
                       b7794d5ec6089d73902be38cdfad34a343952a8a
                       14842815a9830f00c6575ee05376599fb5b0ecfe
                       2884534e83f6a44532c3542e0bf9f657387fb1df
                       f225186c383411c657fce4724c7f8fdecaed87e5
                       f8309c5cb6b52b5b73b29f4dfcad80cd7d1a3012
                       070c3a909f6cd9556e3b516b8a204f5ed4c3b8dc
                       9202a540a4aeb4418d2dfd2ba2e9a9e3cc71b418
                       8dedc773
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [32:24:7c:98:f8:ff:ca:f8:e8:1a:ed:db:16:fd:9f:64:2a:46:43:b8],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-03 05:53:21.034  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-03 05:53:21.035 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-03 05:53:21.037 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2023-01-03 05:53:21.038 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-03 05:53:21.038  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2023-01-03 05:53:21.039  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-03 05:53:21.039  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-03 05:53:21.039 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-03 05:53:21.040 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-03 05:53:21.040 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-03 05:53:21.043 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-03 05:53:21.044 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-03 05:53:21.044 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-03 05:53:21.044 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-03 05:53:21.505  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-03 05:53:21.506  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-03 05:53:21.507 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-03 05:53:21.507 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-03 05:53:21.509  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-03 05:53:21.509  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-03 05:53:21.509 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-03 05:53:21.510 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-03 05:53:21.510 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-03 05:53:21.511 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-03 05:53:21.511 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-03 05:53:21.511 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-03 05:53:21.512 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-03 05:53:21.513 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-03 05:53:21.513 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-03 05:53:21.514 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-03 05:53:21.517 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 87500886665290319116920714104531256657803214836
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jan 03 03:20:23 UTC 2023
           Final Date: Sun Jan 02 03:20:22 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [bb:e6:48:ba:a7:c3:1f:f4:e2:e8:8c:3e:f6:a6:d3:58:3d:c4:38:59],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 43117a4fddeb1fea70289f86be4d1c3108eb6503
                       bf73854f7d153bba786b4f7fdbcba7f9c5d8b3a8
                       77c2ff82ab7c5b8c3a89e326c83a5cf9b1f9bebc
                       b3de60b294c3bf1895361e69c772035fb7640761
                       c16dc2c673a2c0f54e00d134b9f1940c1842f2d0
                       4786010dd18c82055d8cc68533cffbfb2069ed31
                       c2b92fbb30c7fb9ae8b337653624036cf5da4202
                       3ffddbce59d645157b28605709737c7820a45bc6
                       33ef28ee84ddfc274d62c90a92b9ca6e1408e634
                       390b1a18027d03cb14b046cbbe52a2d54b41f469
                       ed5dcaa11236e1f9f3ced2b0869e05e28dd3b183
                       ff2ae67b55d917799297480f538a07be34fa6bbf
                       b7794d5ec6089d73902be38cdfad34a343952a8a
                       14842815a9830f00c6575ee05376599fb5b0ecfe
                       2884534e83f6a44532c3542e0bf9f657387fb1df
                       f225186c383411c657fce4724c7f8fdecaed87e5
                       f8309c5cb6b52b5b73b29f4dfcad80cd7d1a3012
                       070c3a909f6cd9556e3b516b8a204f5ed4c3b8dc
                       9202a540a4aeb4418d2dfd2ba2e9a9e3cc71b418
                       8dedc773
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [11:a5:f5:05:dc:83:4c:01:be:42:d7:0e:50:47:73:9d:c9:26:ca:94],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-03 06:16:45.768  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-03 06:16:45.772 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-03 06:16:45.776 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2023-01-03 06:16:45.777 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-03 06:16:45.778  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2023-01-03 06:16:45.779  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-03 06:16:45.779  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-03 06:16:45.780 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-03 06:16:45.780 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-03 06:16:45.781 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-03 06:16:45.785 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-03 06:16:45.787 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-03 06:16:45.787 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-03 06:16:45.788 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-03 06:16:46.511  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-03 06:16:46.511  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-03 06:16:46.512 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-03 06:16:46.512 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-03 06:16:46.513  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-03 06:16:46.514  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-03 06:16:46.514 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-03 06:16:46.514 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-03 06:16:46.515 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-03 06:16:46.516 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-03 06:16:46.516 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-03 06:16:46.516 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-03 06:16:46.517 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-03 06:16:46.517 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-03 06:16:46.517 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-03 06:16:46.518 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-03 06:16:46.522 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 87500886665290319116920714104531256657803214836
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jan 03 03:20:23 UTC 2023
           Final Date: Sun Jan 02 03:20:22 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [bb:e6:48:ba:a7:c3:1f:f4:e2:e8:8c:3e:f6:a6:d3:58:3d:c4:38:59],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 43117a4fddeb1fea70289f86be4d1c3108eb6503
                       bf73854f7d153bba786b4f7fdbcba7f9c5d8b3a8
                       77c2ff82ab7c5b8c3a89e326c83a5cf9b1f9bebc
                       b3de60b294c3bf1895361e69c772035fb7640761
                       c16dc2c673a2c0f54e00d134b9f1940c1842f2d0
                       4786010dd18c82055d8cc68533cffbfb2069ed31
                       c2b92fbb30c7fb9ae8b337653624036cf5da4202
                       3ffddbce59d645157b28605709737c7820a45bc6
                       33ef28ee84ddfc274d62c90a92b9ca6e1408e634
                       390b1a18027d03cb14b046cbbe52a2d54b41f469
                       ed5dcaa11236e1f9f3ced2b0869e05e28dd3b183
                       ff2ae67b55d917799297480f538a07be34fa6bbf
                       b7794d5ec6089d73902be38cdfad34a343952a8a
                       14842815a9830f00c6575ee05376599fb5b0ecfe
                       2884534e83f6a44532c3542e0bf9f657387fb1df
                       f225186c383411c657fce4724c7f8fdecaed87e5
                       f8309c5cb6b52b5b73b29f4dfcad80cd7d1a3012
                       070c3a909f6cd9556e3b516b8a204f5ed4c3b8dc
                       9202a540a4aeb4418d2dfd2ba2e9a9e3cc71b418
                       8dedc773
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [95:8e:32:ac:71:04:17:38:7f:5a:db:51:44:6e:85:ad:7a:92:92:8b],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-03 06:16:56.750  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-03 06:16:56.752 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-03 06:16:56.754 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2023-01-03 06:16:56.756 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-03 06:16:56.757  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2023-01-03 06:16:56.758  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-03 06:16:56.758  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-03 06:16:56.759 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-03 06:16:56.759 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-03 06:16:56.760 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-03 06:16:56.767 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-03 06:16:56.768 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-03 06:16:56.769 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-03 06:16:56.769 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-03 06:16:57.193  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-03 06:16:57.193  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-03 06:16:57.194 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-03 06:16:57.194 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-03 06:16:57.195  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-03 06:16:57.195  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-03 06:16:57.196 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-03 06:16:57.196 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-03 06:16:57.196 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-03 06:16:57.197 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-03 06:16:57.197 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-03 06:16:57.198 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-03 06:16:57.199 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-03 06:16:57.199 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-03 06:16:57.199 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-03 06:16:57.200 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-03 06:16:57.203 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 87500886665290319116920714104531256657803214836
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jan 03 03:20:23 UTC 2023
           Final Date: Sun Jan 02 03:20:22 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [bb:e6:48:ba:a7:c3:1f:f4:e2:e8:8c:3e:f6:a6:d3:58:3d:c4:38:59],[56:66:d1:a4]
        modulus: d01a51c616b673866a0e194f783ca5d39bceb06ec8560834ff49749d00a682f0e82b8bdd3a64654e500d37313d991738c067f0f60f9d8989d5254feafc7851c66afd1102e1375223bcd6b4e739a154df7429c5119f7f703f9686ef30ac3c8491a663117b3b0d544f33d60a89503c52ed6802f1b3c27a6098bbb5ac984da9793fe05b4341343808af9aedbff33598fb6834ecbcb73517c3225e2264b066efbd38e435d82c89e618c5c6415f913c265cce3e8c67eff139027275eeeb8c0e47d70f5dff8a4317aef316cf296104ecc496aaa9f87ec920fc5ad9f07b6bf123f3001fb396e9688d480c641ecefb32773a21fe4c3558e36d95d3fa6597af9efe80aa722fbce40b3c0ad6094ee3a1f70dcb388683d0d67181f4019f3b41022976f4b2effa5000e631ecfafc5ab3e92e44ed1750cb95690dbb928e78e64a526708bf2953e436355840fe0d1600e4935e94aac953d906791cd9987d034c5eefaa60043a17b07ce3510b44970ebef3e96f901919b0ef8dfdb8a6c0def5275d88ceeb5b98e3
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 43117a4fddeb1fea70289f86be4d1c3108eb6503
                       bf73854f7d153bba786b4f7fdbcba7f9c5d8b3a8
                       77c2ff82ab7c5b8c3a89e326c83a5cf9b1f9bebc
                       b3de60b294c3bf1895361e69c772035fb7640761
                       c16dc2c673a2c0f54e00d134b9f1940c1842f2d0
                       4786010dd18c82055d8cc68533cffbfb2069ed31
                       c2b92fbb30c7fb9ae8b337653624036cf5da4202
                       3ffddbce59d645157b28605709737c7820a45bc6
                       33ef28ee84ddfc274d62c90a92b9ca6e1408e634
                       390b1a18027d03cb14b046cbbe52a2d54b41f469
                       ed5dcaa11236e1f9f3ced2b0869e05e28dd3b183
                       ff2ae67b55d917799297480f538a07be34fa6bbf
                       b7794d5ec6089d73902be38cdfad34a343952a8a
                       14842815a9830f00c6575ee05376599fb5b0ecfe
                       2884534e83f6a44532c3542e0bf9f657387fb1df
                       f225186c383411c657fce4724c7f8fdecaed87e5
                       f8309c5cb6b52b5b73b29f4dfcad80cd7d1a3012
                       070c3a909f6cd9556e3b516b8a204f5ed4c3b8dc
                       9202a540a4aeb4418d2dfd2ba2e9a9e3cc71b418
                       8dedc773
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [f2:1a:cc:21:c9:bc:6b:4d:2a:a8:30:bc:cd:46:d6:ae:23:67:8d:a8],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

]