Results

By type

          2023-01-10 03:31:12,747 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2023-01-10 03:31:15,056 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2023-01-10 03:31:16.725  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Jan 10, 2023 3:31:20 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Jan 10, 2023 3:31:20 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Jan 10, 2023 3:31:20 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Jan 10, 2023 3:31:21 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2023-01-10 03:31:22.084 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2023-01-10 03:31:22.574  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2023-01-10 03:31:22.905  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2023-01-10 03:31:24.142 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2023-01-10 03:31:24.145 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
2023-01-10 03:31:24.146 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2023-01-10 03:31:24.153 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2023-01-10 03:31:24.207 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2023-01-10 03:31:24.212 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
	{GET [/docs]}: redirectToUi(HttpServletRequest)
2023-01-10 03:31:24.380 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2023-01-10 03:31:25.371 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Jan 10, 2023 3:31:26 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2023-01-10 03:31:26.723  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 15.735 seconds (JVM running for 19.651)
Jan 10, 2023 3:31:38 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2023-01-10 04:55:53.131  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-10 04:55:53.171 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-10 04:55:53.257 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-10 04:55:53.264 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-10 04:55:53.299  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-10 04:55:53.303  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-10 04:55:53.305  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-10 04:55:53.308 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-10 04:55:53.309 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-10 04:55:53.317 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-10 04:55:53.345 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-10 04:55:53.353 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-10 04:55:53.956 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-10 04:55:53.984 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-10 04:55:53.986 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-10 04:55:54.001 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-10 04:55:55.233  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-10 04:55:55.237  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-10 04:55:55.238 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-10 04:55:55.240 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-10 04:55:55.255  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-10 04:55:55.257  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-10 04:55:55.258 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-10 04:55:55.259 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-10 04:55:55.260 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-10 04:55:55.297 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-10 04:55:55.297 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-10 04:55:55.298 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-10 04:55:55.306 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-10 04:55:55.307 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-10 04:55:55.307 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-10 04:55:55.310 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-10 04:55:55.363 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 92551955864557222341923700481685480651316379942
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jan 10 03:11:30 UTC 2023
           Final Date: Sun Jan 09 03:11:29 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [41:3a:f8:fd:4b:34:ad:b0:3b:a7:6f:01:55:85:b6:b0:b9:00:b3:34],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 9570edcd42b0751f637c70ab8520388091daccfd
                       1775851dd2b514999c672133e70e42826b754577
                       51ba26c49d7cdc3922d81acc640b9790a8a1cc67
                       16624bb536f8ce94ed668183cfff4602444e2be1
                       300137d6caa0dd0b6e48a3e03cfc83f064f307df
                       988f0295ed35691342d3560f119679822f5073f1
                       e8f19c702556bb9872f29bca159190177cfb559d
                       9eb4516a7101faa13d00163787643cb05bf4454d
                       fbcb1dce03ae6ef0dcb7eb1d16b5df4a1bfc0350
                       62de7fabad4d7c1ab737f8af4b5981197464e271
                       0e59694ae1e8cc64cb388e410c2ef915b7e6c44a
                       9f76e7603135bf48394e3fa105a0e530d6c2a1e8
                       f94664aad97ef9187d0a8f874476b7a34cb45174
                       2d84468c0ab44ca3d618bc27365ad1754d3a0b42
                       101685507183da0d0b923e6fccc6069bd9a308cb
                       061b0ab87c2fc23ee46a8b02198d6c1ce62e0ff7
                       1bf538bf7fd5a1637669d542e6dd081c868f9f75
                       82aa063ea05001514999762286ef72b33b0fdcf9
                       3e0a611fe6bfeeb2a5741a411aa051f836dbc3ec
                       e89539dd
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [34:51:93:45:e9:54:7f:93:fd:5e:47:e4:5b:cb:77:41:7d:2b:1d:ae],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-10 04:57:39.016  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-10 04:57:39.020 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-10 04:57:39.025 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2023-01-10 04:57:39.026 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-10 04:57:39.027  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2023-01-10 04:57:39.028  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-10 04:57:39.029  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-10 04:57:39.030 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-10 04:57:39.031 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-10 04:57:39.031 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-10 04:57:39.041 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-10 04:57:39.042 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-10 04:57:39.042 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-10 04:57:39.043 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-10 04:57:39.372  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-10 04:57:39.373  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-10 04:57:39.374 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-10 04:57:39.374 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-10 04:57:39.379  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-10 04:57:39.380  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-10 04:57:39.381 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-10 04:57:39.382 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-10 04:57:39.383 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-10 04:57:39.385 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-10 04:57:39.386 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-10 04:57:39.387 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-10 04:57:39.393 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-10 04:57:39.394 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-10 04:57:39.394 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-10 04:57:39.396 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-10 04:57:39.403 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 92551955864557222341923700481685480651316379942
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jan 10 03:11:30 UTC 2023
           Final Date: Sun Jan 09 03:11:29 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [41:3a:f8:fd:4b:34:ad:b0:3b:a7:6f:01:55:85:b6:b0:b9:00:b3:34],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 9570edcd42b0751f637c70ab8520388091daccfd
                       1775851dd2b514999c672133e70e42826b754577
                       51ba26c49d7cdc3922d81acc640b9790a8a1cc67
                       16624bb536f8ce94ed668183cfff4602444e2be1
                       300137d6caa0dd0b6e48a3e03cfc83f064f307df
                       988f0295ed35691342d3560f119679822f5073f1
                       e8f19c702556bb9872f29bca159190177cfb559d
                       9eb4516a7101faa13d00163787643cb05bf4454d
                       fbcb1dce03ae6ef0dcb7eb1d16b5df4a1bfc0350
                       62de7fabad4d7c1ab737f8af4b5981197464e271
                       0e59694ae1e8cc64cb388e410c2ef915b7e6c44a
                       9f76e7603135bf48394e3fa105a0e530d6c2a1e8
                       f94664aad97ef9187d0a8f874476b7a34cb45174
                       2d84468c0ab44ca3d618bc27365ad1754d3a0b42
                       101685507183da0d0b923e6fccc6069bd9a308cb
                       061b0ab87c2fc23ee46a8b02198d6c1ce62e0ff7
                       1bf538bf7fd5a1637669d542e6dd081c868f9f75
                       82aa063ea05001514999762286ef72b33b0fdcf9
                       3e0a611fe6bfeeb2a5741a411aa051f836dbc3ec
                       e89539dd
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [1f:aa:74:e1:2a:bf:3b:36:55:17:10:60:1f:f2:f9:ca:f3:a1:9a:3a],[56:66:d1:a4]
        modulus: dcba6b46b38c562293b60a2fb8971c42764cb62b83cabaa3caa5f572078c788370e852f273bd3f176a9bdfa689e0067348f980c263f43c8feff7222092be39d788ca2db91fc8fb09202307598c18c1e038d3f12eea38b51c0194109fa32492b735a1bd8d4dd9471a309e0c41584286d67168e823c89087249c322bb11a487daae270b5cc3cd8d20f239cc0808cc6c81a0f58a81dd3f04a5a166e1e401b7b8d72f835a81dcfc8623a8245d4ddf49bfa34ee572b3007eccd762f6dbbdf1b6054dec677d9b15c5c4cf70361eb40a4ecdfd12768ba21926da3be710973f8d7a0acf463cb8503ec47d699bd68f0524bcd05406a174cfc49c0293df7d97eb3ab9534c5
public exponent: 10001

] 
2023-01-10 04:59:19.224  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-10 04:59:19.226 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-10 04:59:19.229 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2023-01-10 04:59:19.230 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-10 04:59:19.231  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2023-01-10 04:59:19.232  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-10 04:59:19.233  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-10 04:59:19.233 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-10 04:59:19.234 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-10 04:59:19.242 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-10 04:59:19.249 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-10 04:59:19.252 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-10 04:59:19.262 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-10 04:59:19.263 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-10 04:59:19.686  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-10 04:59:19.686  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-10 04:59:19.687 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-10 04:59:19.687 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-10 04:59:19.689  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-10 04:59:19.690  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-10 04:59:19.690 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-10 04:59:19.691 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-10 04:59:19.691 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-10 04:59:19.693 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-10 04:59:19.694 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-10 04:59:19.694 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-10 04:59:19.695 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-10 04:59:19.695 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-10 04:59:19.696 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-10 04:59:19.697 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-10 04:59:19.701 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 92551955864557222341923700481685480651316379942
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jan 10 03:11:30 UTC 2023
           Final Date: Sun Jan 09 03:11:29 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [41:3a:f8:fd:4b:34:ad:b0:3b:a7:6f:01:55:85:b6:b0:b9:00:b3:34],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 9570edcd42b0751f637c70ab8520388091daccfd
                       1775851dd2b514999c672133e70e42826b754577
                       51ba26c49d7cdc3922d81acc640b9790a8a1cc67
                       16624bb536f8ce94ed668183cfff4602444e2be1
                       300137d6caa0dd0b6e48a3e03cfc83f064f307df
                       988f0295ed35691342d3560f119679822f5073f1
                       e8f19c702556bb9872f29bca159190177cfb559d
                       9eb4516a7101faa13d00163787643cb05bf4454d
                       fbcb1dce03ae6ef0dcb7eb1d16b5df4a1bfc0350
                       62de7fabad4d7c1ab737f8af4b5981197464e271
                       0e59694ae1e8cc64cb388e410c2ef915b7e6c44a
                       9f76e7603135bf48394e3fa105a0e530d6c2a1e8
                       f94664aad97ef9187d0a8f874476b7a34cb45174
                       2d84468c0ab44ca3d618bc27365ad1754d3a0b42
                       101685507183da0d0b923e6fccc6069bd9a308cb
                       061b0ab87c2fc23ee46a8b02198d6c1ce62e0ff7
                       1bf538bf7fd5a1637669d542e6dd081c868f9f75
                       82aa063ea05001514999762286ef72b33b0fdcf9
                       3e0a611fe6bfeeb2a5741a411aa051f836dbc3ec
                       e89539dd
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [4e:ab:33:b9:21:1e:c9:05:d6:53:5e:c6:c6:65:18:d5:0a:ed:ef:95],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-10 05:03:07.614  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-10 05:03:07.617 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-10 05:03:07.619 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-10 05:03:07.621 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-10 05:03:07.621  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-10 05:03:07.622  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-10 05:03:07.623  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-10 05:03:07.623 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-10 05:03:07.624 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-10 05:03:07.625 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-10 05:03:07.634 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-10 05:03:07.636 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-10 05:03:07.637 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-10 05:03:07.638 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-10 05:03:08.028  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-10 05:03:08.033  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-10 05:03:08.034 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-10 05:03:08.035 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-10 05:03:08.038  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-10 05:03:08.039  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-10 05:03:08.040 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-10 05:03:08.041 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-10 05:03:08.042 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-10 05:03:08.044 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-10 05:03:08.044 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-10 05:03:08.045 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-10 05:03:08.046 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-10 05:03:08.047 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-10 05:03:08.047 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-10 05:03:08.048 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-10 05:03:08.056 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 92551955864557222341923700481685480651316379942
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jan 10 03:11:30 UTC 2023
           Final Date: Sun Jan 09 03:11:29 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [41:3a:f8:fd:4b:34:ad:b0:3b:a7:6f:01:55:85:b6:b0:b9:00:b3:34],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 9570edcd42b0751f637c70ab8520388091daccfd
                       1775851dd2b514999c672133e70e42826b754577
                       51ba26c49d7cdc3922d81acc640b9790a8a1cc67
                       16624bb536f8ce94ed668183cfff4602444e2be1
                       300137d6caa0dd0b6e48a3e03cfc83f064f307df
                       988f0295ed35691342d3560f119679822f5073f1
                       e8f19c702556bb9872f29bca159190177cfb559d
                       9eb4516a7101faa13d00163787643cb05bf4454d
                       fbcb1dce03ae6ef0dcb7eb1d16b5df4a1bfc0350
                       62de7fabad4d7c1ab737f8af4b5981197464e271
                       0e59694ae1e8cc64cb388e410c2ef915b7e6c44a
                       9f76e7603135bf48394e3fa105a0e530d6c2a1e8
                       f94664aad97ef9187d0a8f874476b7a34cb45174
                       2d84468c0ab44ca3d618bc27365ad1754d3a0b42
                       101685507183da0d0b923e6fccc6069bd9a308cb
                       061b0ab87c2fc23ee46a8b02198d6c1ce62e0ff7
                       1bf538bf7fd5a1637669d542e6dd081c868f9f75
                       82aa063ea05001514999762286ef72b33b0fdcf9
                       3e0a611fe6bfeeb2a5741a411aa051f836dbc3ec
                       e89539dd
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [c0:54:94:03:07:80:5e:ee:9f:c7:02:a0:b4:f6:ef:00:6e:42:9b:49],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-10 05:19:40.596  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-10 05:19:40.604 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-10 05:19:40.607 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2023-01-10 05:19:40.609 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-10 05:19:40.610  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2023-01-10 05:19:40.611  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-10 05:19:40.611  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-10 05:19:40.612 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-10 05:19:40.613 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-10 05:19:40.613 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-10 05:19:40.619 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-10 05:19:40.621 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-10 05:19:40.622 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-10 05:19:40.622 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-10 05:19:41.027  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-10 05:19:41.029  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-10 05:19:41.029 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-10 05:19:41.030 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-10 05:19:41.033  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-10 05:19:41.034  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-10 05:19:41.035 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-10 05:19:41.035 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-10 05:19:41.036 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-10 05:19:41.040 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-10 05:19:41.042 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-10 05:19:41.043 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-10 05:19:41.050 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-10 05:19:41.052 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-10 05:19:41.053 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-10 05:19:41.055 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-10 05:19:41.059 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 92551955864557222341923700481685480651316379942
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jan 10 03:11:30 UTC 2023
           Final Date: Sun Jan 09 03:11:29 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [41:3a:f8:fd:4b:34:ad:b0:3b:a7:6f:01:55:85:b6:b0:b9:00:b3:34],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 9570edcd42b0751f637c70ab8520388091daccfd
                       1775851dd2b514999c672133e70e42826b754577
                       51ba26c49d7cdc3922d81acc640b9790a8a1cc67
                       16624bb536f8ce94ed668183cfff4602444e2be1
                       300137d6caa0dd0b6e48a3e03cfc83f064f307df
                       988f0295ed35691342d3560f119679822f5073f1
                       e8f19c702556bb9872f29bca159190177cfb559d
                       9eb4516a7101faa13d00163787643cb05bf4454d
                       fbcb1dce03ae6ef0dcb7eb1d16b5df4a1bfc0350
                       62de7fabad4d7c1ab737f8af4b5981197464e271
                       0e59694ae1e8cc64cb388e410c2ef915b7e6c44a
                       9f76e7603135bf48394e3fa105a0e530d6c2a1e8
                       f94664aad97ef9187d0a8f874476b7a34cb45174
                       2d84468c0ab44ca3d618bc27365ad1754d3a0b42
                       101685507183da0d0b923e6fccc6069bd9a308cb
                       061b0ab87c2fc23ee46a8b02198d6c1ce62e0ff7
                       1bf538bf7fd5a1637669d542e6dd081c868f9f75
                       82aa063ea05001514999762286ef72b33b0fdcf9
                       3e0a611fe6bfeeb2a5741a411aa051f836dbc3ec
                       e89539dd
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [c7:b4:36:db:a0:ba:fb:12:c6:41:e7:1f:38:34:61:24:56:df:dc:fd],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-10 05:27:09.160  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-10 05:27:09.167 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-10 05:27:09.171 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2023-01-10 05:27:09.173 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-10 05:27:09.174  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2023-01-10 05:27:09.176  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-10 05:27:09.177  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-10 05:27:09.178 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-10 05:27:09.178 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-10 05:27:09.179 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-10 05:27:09.203 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-10 05:27:09.205 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-10 05:27:09.206 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-10 05:27:09.206 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-10 05:27:09.575  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-10 05:27:09.576  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-10 05:27:09.576 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-10 05:27:09.577 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-10 05:27:09.579  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-10 05:27:09.580  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-10 05:27:09.581 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-10 05:27:09.581 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-10 05:27:09.582 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-10 05:27:09.583 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-10 05:27:09.584 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-10 05:27:09.584 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-10 05:27:09.585 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-10 05:27:09.585 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-10 05:27:09.586 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-10 05:27:09.586 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-10 05:27:09.590 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 92551955864557222341923700481685480651316379942
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jan 10 03:11:30 UTC 2023
           Final Date: Sun Jan 09 03:11:29 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [41:3a:f8:fd:4b:34:ad:b0:3b:a7:6f:01:55:85:b6:b0:b9:00:b3:34],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 9570edcd42b0751f637c70ab8520388091daccfd
                       1775851dd2b514999c672133e70e42826b754577
                       51ba26c49d7cdc3922d81acc640b9790a8a1cc67
                       16624bb536f8ce94ed668183cfff4602444e2be1
                       300137d6caa0dd0b6e48a3e03cfc83f064f307df
                       988f0295ed35691342d3560f119679822f5073f1
                       e8f19c702556bb9872f29bca159190177cfb559d
                       9eb4516a7101faa13d00163787643cb05bf4454d
                       fbcb1dce03ae6ef0dcb7eb1d16b5df4a1bfc0350
                       62de7fabad4d7c1ab737f8af4b5981197464e271
                       0e59694ae1e8cc64cb388e410c2ef915b7e6c44a
                       9f76e7603135bf48394e3fa105a0e530d6c2a1e8
                       f94664aad97ef9187d0a8f874476b7a34cb45174
                       2d84468c0ab44ca3d618bc27365ad1754d3a0b42
                       101685507183da0d0b923e6fccc6069bd9a308cb
                       061b0ab87c2fc23ee46a8b02198d6c1ce62e0ff7
                       1bf538bf7fd5a1637669d542e6dd081c868f9f75
                       82aa063ea05001514999762286ef72b33b0fdcf9
                       3e0a611fe6bfeeb2a5741a411aa051f836dbc3ec
                       e89539dd
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [2b:a0:df:d0:d6:73:31:fe:3d:98:c1:07:73:1a:85:7d:a9:f9:1c:e5],[56:66:d1:a4]
        modulus: d3bdc535ca3881241564484553ba58039217c738d5a11a2c5a5dd5b81afd991d588db923b81b819448382a6502cc54aa31d4abed12c79c8cac29a73aadbc2aca43a51610c7927a4096f5696f7d5084958cb081d2c908698d9abb7488ce4befdcdcad890a896853dd501fd8eb90ca7088b4386315f41d52b2a02311d23ced7be852c8a02b81a4e402ed4c2a7c9e72675c1f907304638bd7ea4fe1541f6fa22aa230d6801c1c590431f35ba239accc222fbbeea6a524e7e366d5230f9c2ac758fe742ecd0c0448fa074ea1557761ba2cc19e3d49b74fb89a0aa62d105aa918459e86f76dcc22ad19a09d304194763b762b4717a5cb6f34d8ad3a4d5ca760ee44dd
public exponent: 10001

] 
2023-01-10 05:27:42.366  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-10 05:27:42.369 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-10 05:27:42.374 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2023-01-10 05:27:42.377 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-10 05:27:42.378  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2023-01-10 05:27:42.380  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-10 05:27:42.381  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-10 05:27:42.381 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-10 05:27:42.382 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-10 05:27:42.383 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-10 05:27:42.390 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-10 05:27:42.391 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-10 05:27:42.391 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-10 05:27:42.392 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-10 05:27:42.705  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-10 05:27:42.706  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-10 05:27:42.707 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-10 05:27:42.707 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-10 05:27:42.709  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-10 05:27:42.710  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-10 05:27:42.711 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-10 05:27:42.711 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-10 05:27:42.712 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-10 05:27:42.713 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-10 05:27:42.714 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-10 05:27:42.714 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-10 05:27:42.716 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-10 05:27:42.716 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-10 05:27:42.717 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-10 05:27:42.718 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-10 05:27:42.723 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 92551955864557222341923700481685480651316379942
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jan 10 03:11:30 UTC 2023
           Final Date: Sun Jan 09 03:11:29 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [41:3a:f8:fd:4b:34:ad:b0:3b:a7:6f:01:55:85:b6:b0:b9:00:b3:34],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 9570edcd42b0751f637c70ab8520388091daccfd
                       1775851dd2b514999c672133e70e42826b754577
                       51ba26c49d7cdc3922d81acc640b9790a8a1cc67
                       16624bb536f8ce94ed668183cfff4602444e2be1
                       300137d6caa0dd0b6e48a3e03cfc83f064f307df
                       988f0295ed35691342d3560f119679822f5073f1
                       e8f19c702556bb9872f29bca159190177cfb559d
                       9eb4516a7101faa13d00163787643cb05bf4454d
                       fbcb1dce03ae6ef0dcb7eb1d16b5df4a1bfc0350
                       62de7fabad4d7c1ab737f8af4b5981197464e271
                       0e59694ae1e8cc64cb388e410c2ef915b7e6c44a
                       9f76e7603135bf48394e3fa105a0e530d6c2a1e8
                       f94664aad97ef9187d0a8f874476b7a34cb45174
                       2d84468c0ab44ca3d618bc27365ad1754d3a0b42
                       101685507183da0d0b923e6fccc6069bd9a308cb
                       061b0ab87c2fc23ee46a8b02198d6c1ce62e0ff7
                       1bf538bf7fd5a1637669d542e6dd081c868f9f75
                       82aa063ea05001514999762286ef72b33b0fdcf9
                       3e0a611fe6bfeeb2a5741a411aa051f836dbc3ec
                       e89539dd
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [9b:55:a7:9b:01:7f:ad:e7:86:ca:5e:f5:f0:21:69:19:06:36:a8:38],[56:66:d1:a4]
        modulus: bf0c96109b22bbeb2d970b234bd31eb2a2d7d4f4de61ac4dc6a62d2d9e78e19945f85c223e836443cac86007880dfc953243bf4689a981185a4208ed8eed1eb7353475905cda0ac35ffb5b07b4531d72e58fef86eb1ee38b9f0bae751a01ab8edbdec0aeaf12e5b83cceeb416ac93ef324d3fadb915f07c9491ce3fc91b8a3b83befce089d632e7acc9e8791be1b777a298111f070c513d98ef23d768029fce7c36322daede0d4d502c7cb30eebf4d9786b34fa4dea496c2bd8eb7241a080fda25a7c2882997450d3c56f7cbff6555a5662b1df064ae03aa8f47ddcf901d064047f95d63d4b6fb82c235736932c29b2fa4d1d6b4eb5acdc3e02e6cdb0eecdb11
public exponent: 10001

] 
2023-01-10 05:52:27.308  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-10 05:52:27.316 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-10 05:52:27.325 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2023-01-10 05:52:27.327 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-10 05:52:27.328  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2023-01-10 05:52:27.329  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-10 05:52:27.329  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-10 05:52:27.331 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-10 05:52:27.332 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-10 05:52:27.333 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-10 05:52:27.339 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-10 05:52:27.341 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-10 05:52:27.341 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-10 05:52:27.341 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-10 05:52:27.656  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-10 05:52:27.657  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-10 05:52:27.657 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-10 05:52:27.657 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-10 05:52:27.659  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-10 05:52:27.659  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-10 05:52:27.660 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-10 05:52:27.660 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-10 05:52:27.661 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-10 05:52:27.663 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-10 05:52:27.664 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-10 05:52:27.664 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-10 05:52:27.665 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-10 05:52:27.665 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-10 05:52:27.669 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-10 05:52:27.674 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-10 05:52:27.679 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 92551955864557222341923700481685480651316379942
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jan 10 03:11:30 UTC 2023
           Final Date: Sun Jan 09 03:11:29 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [41:3a:f8:fd:4b:34:ad:b0:3b:a7:6f:01:55:85:b6:b0:b9:00:b3:34],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 9570edcd42b0751f637c70ab8520388091daccfd
                       1775851dd2b514999c672133e70e42826b754577
                       51ba26c49d7cdc3922d81acc640b9790a8a1cc67
                       16624bb536f8ce94ed668183cfff4602444e2be1
                       300137d6caa0dd0b6e48a3e03cfc83f064f307df
                       988f0295ed35691342d3560f119679822f5073f1
                       e8f19c702556bb9872f29bca159190177cfb559d
                       9eb4516a7101faa13d00163787643cb05bf4454d
                       fbcb1dce03ae6ef0dcb7eb1d16b5df4a1bfc0350
                       62de7fabad4d7c1ab737f8af4b5981197464e271
                       0e59694ae1e8cc64cb388e410c2ef915b7e6c44a
                       9f76e7603135bf48394e3fa105a0e530d6c2a1e8
                       f94664aad97ef9187d0a8f874476b7a34cb45174
                       2d84468c0ab44ca3d618bc27365ad1754d3a0b42
                       101685507183da0d0b923e6fccc6069bd9a308cb
                       061b0ab87c2fc23ee46a8b02198d6c1ce62e0ff7
                       1bf538bf7fd5a1637669d542e6dd081c868f9f75
                       82aa063ea05001514999762286ef72b33b0fdcf9
                       3e0a611fe6bfeeb2a5741a411aa051f836dbc3ec
                       e89539dd
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [54:a8:db:63:ec:cd:c5:59:f6:32:3e:97:1b:aa:9e:48:c4:c7:63:fe],[56:66:d1:a4]
        modulus: ceb2f10bdc68df93d2123a0f2f73cd063c5a15a292a03046f4d582b9918e8272c3c8aa7e2c9cb4c56300c6b1c7baf1bb3a40dec977a47fcabbfd3149a7fffc93e1da306cbdfbdf3429dfbfd40a3930309ec97e387853da36a50da036edd0e57788a1060007acf2a0bbc3e59b34fb62998a8cfef73bd2f78efff5a2df98ceb12e798b75db56494c0dfba8afd9ab596d2a4e50fd9ee28e39a77dc30cde3a3968f9acf3365e9de6e0f521478df5b0ce90f1cfcc40579a6be076a86c4f6c2cbffc2f3e897861c380a2c1fd54c486faeb2f6d842669e21055694dcaa188d825a5a95bb7ddea6001e5c10f4e2a0884b0ed4b25aabfb94816b86e0bb8e3a0ba8a67f215
public exponent: 10001

] 
2023-01-10 05:52:36.371  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-10 05:52:36.372 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-10 05:52:36.374 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2023-01-10 05:52:36.375 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-10 05:52:36.375  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2023-01-10 05:52:36.376  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-10 05:52:36.376  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-10 05:52:36.376 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-10 05:52:36.377 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-10 05:52:36.377 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-10 05:52:36.383 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-10 05:52:36.384 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-10 05:52:36.384 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-10 05:52:36.385 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-10 05:52:36.647  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-10 05:52:36.648  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-10 05:52:36.649 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-10 05:52:36.649 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-10 05:52:36.651  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-10 05:52:36.652  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-10 05:52:36.653 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-10 05:52:36.653 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-10 05:52:36.653 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-10 05:52:36.656 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-10 05:52:36.656 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-10 05:52:36.657 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-10 05:52:36.658 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-10 05:52:36.658 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-10 05:52:36.659 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-10 05:52:36.660 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-10 05:52:36.664 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 92551955864557222341923700481685480651316379942
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jan 10 03:11:30 UTC 2023
           Final Date: Sun Jan 09 03:11:29 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [41:3a:f8:fd:4b:34:ad:b0:3b:a7:6f:01:55:85:b6:b0:b9:00:b3:34],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 9570edcd42b0751f637c70ab8520388091daccfd
                       1775851dd2b514999c672133e70e42826b754577
                       51ba26c49d7cdc3922d81acc640b9790a8a1cc67
                       16624bb536f8ce94ed668183cfff4602444e2be1
                       300137d6caa0dd0b6e48a3e03cfc83f064f307df
                       988f0295ed35691342d3560f119679822f5073f1
                       e8f19c702556bb9872f29bca159190177cfb559d
                       9eb4516a7101faa13d00163787643cb05bf4454d
                       fbcb1dce03ae6ef0dcb7eb1d16b5df4a1bfc0350
                       62de7fabad4d7c1ab737f8af4b5981197464e271
                       0e59694ae1e8cc64cb388e410c2ef915b7e6c44a
                       9f76e7603135bf48394e3fa105a0e530d6c2a1e8
                       f94664aad97ef9187d0a8f874476b7a34cb45174
                       2d84468c0ab44ca3d618bc27365ad1754d3a0b42
                       101685507183da0d0b923e6fccc6069bd9a308cb
                       061b0ab87c2fc23ee46a8b02198d6c1ce62e0ff7
                       1bf538bf7fd5a1637669d542e6dd081c868f9f75
                       82aa063ea05001514999762286ef72b33b0fdcf9
                       3e0a611fe6bfeeb2a5741a411aa051f836dbc3ec
                       e89539dd
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [e7:e8:f4:83:91:95:59:09:e3:ee:05:4e:de:64:d8:ef:29:4e:f1:86],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

]