Results

By type

          2023-01-12 03:30:04,279 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2023-01-12 03:30:05,373 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2023-01-12 03:30:06.069  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Jan 12, 2023 3:30:07 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Jan 12, 2023 3:30:07 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Jan 12, 2023 3:30:07 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Jan 12, 2023 3:30:07 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2023-01-12 03:30:08.330 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2023-01-12 03:30:08.609  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2023-01-12 03:30:08.768  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2023-01-12 03:30:09.414 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2023-01-12 03:30:09.416 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
2023-01-12 03:30:09.418 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2023-01-12 03:30:09.421 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2023-01-12 03:30:09.456 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2023-01-12 03:30:09.459 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/docs]}: redirectToUi(HttpServletRequest)
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
2023-01-12 03:30:09.569 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2023-01-12 03:30:10.165 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Jan 12, 2023 3:30:10 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2023-01-12 03:30:11.057  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 7.659 seconds (JVM running for 9.332)
Jan 12, 2023 3:30:39 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2023-01-12 03:31:07.970  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-12 03:31:07.979 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-12 03:31:08.024 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2023-01-12 03:31:08.028 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-12 03:31:08.048  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2023-01-12 03:31:08.050  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-12 03:31:08.051  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-12 03:31:08.052 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-12 03:31:08.053 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-12 03:31:08.057 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-12 03:31:08.066 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-12 03:31:08.070 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-12 03:31:08.127 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-12 03:31:08.137 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-12 03:31:08.137 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-12 03:31:08.141 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-12 03:31:08.788  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-12 03:31:08.791  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-12 03:31:08.791 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-12 03:31:08.793 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-12 03:31:08.802  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-12 03:31:08.803  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-12 03:31:08.804 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-12 03:31:08.804 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-12 03:31:08.805 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-12 03:31:08.827 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-12 03:31:08.828 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-12 03:31:08.828 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-12 03:31:08.836 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-12 03:31:08.836 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-12 03:31:08.837 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-12 03:31:08.838 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-12 03:31:08.881 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 126172013863890901979413708265899355209992631185
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Jan 12 03:28:00 UTC 2023
           Final Date: Tue Jan 11 03:27:59 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [5f:9e:8d:34:ef:db:cd:05:d5:fc:60:34:45:24:2d:0f:83:ae:f9:fc],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3d8ccbd4e8b5f0460dded1cfcef7c12d04ae9eb2
                       dbdc4dfa51a36660e0676ab851becb9297534af8
                       00b9a32dd748a81e0cadbb94fbf99e9df1fb9f21
                       e696e655e71d3e1b5e66f38e44f9950390aab3c7
                       5845a9768382be7e9c52271e34139b4657ce5567
                       fd57856d2f1b2ec421fdae2adb1a881e24e726cb
                       44b9006d12d34e1ebdfb8c4266cf2ef4a8ff5078
                       178fe0edd3eeca3b3a486b15310ae1912f8aaa1f
                       53c2db14226240a59ca8ac803c357213cd6044d9
                       1caa7553639c1c7a5f6eeb1d6d0e5c55dd72ccf8
                       d7c6872bfed9b485b21b684b7ae8f25d4e75718e
                       0026af6ba2894c4abefa27496d547acb57e51aae
                       5f9f61d090592ce5e211dadb52fd7206598bbc12
                       0a6655d32bf30cb20c9d1c5f2cc4c0092e18c01c
                       2566d424b08c07b6b3fc3ec5e73d2c2dc7e1896b
                       856b419478cec0a170c98a5bdcd78de4468b3233
                       b2c3287a618a6d7f79dc511056489d624dfccc21
                       5747a2faab1707db122cdfab16b58e7b5d3646dd
                       de54d88309b3da8fafd6a968c1d988b01b560768
                       da6b878d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [de:e0:2b:ef:d2:77:24:03:2d:1f:60:c5:ca:8e:57:c1:1b:6e:14:da],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-12 05:30:21.109  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-12 05:30:21.115 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-12 05:30:21.120 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-12 05:30:21.121 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-12 05:30:21.122  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-12 05:30:21.123  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-12 05:30:21.123  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-12 05:30:21.124 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-12 05:30:21.125 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-12 05:30:21.126 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-12 05:30:21.134 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-12 05:30:21.136 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-12 05:30:21.137 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-12 05:30:21.137 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-12 05:30:21.374  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-12 05:30:21.375  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-12 05:30:21.375 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-12 05:30:21.376 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-12 05:30:21.379  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-12 05:30:21.379  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-12 05:30:21.380 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-12 05:30:21.380 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-12 05:30:21.381 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-12 05:30:21.383 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-12 05:30:21.383 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-12 05:30:21.384 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-12 05:30:21.385 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-12 05:30:21.386 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-12 05:30:21.386 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-12 05:30:21.388 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-12 05:30:21.392 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 126172013863890901979413708265899355209992631185
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Jan 12 03:28:00 UTC 2023
           Final Date: Tue Jan 11 03:27:59 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [5f:9e:8d:34:ef:db:cd:05:d5:fc:60:34:45:24:2d:0f:83:ae:f9:fc],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3d8ccbd4e8b5f0460dded1cfcef7c12d04ae9eb2
                       dbdc4dfa51a36660e0676ab851becb9297534af8
                       00b9a32dd748a81e0cadbb94fbf99e9df1fb9f21
                       e696e655e71d3e1b5e66f38e44f9950390aab3c7
                       5845a9768382be7e9c52271e34139b4657ce5567
                       fd57856d2f1b2ec421fdae2adb1a881e24e726cb
                       44b9006d12d34e1ebdfb8c4266cf2ef4a8ff5078
                       178fe0edd3eeca3b3a486b15310ae1912f8aaa1f
                       53c2db14226240a59ca8ac803c357213cd6044d9
                       1caa7553639c1c7a5f6eeb1d6d0e5c55dd72ccf8
                       d7c6872bfed9b485b21b684b7ae8f25d4e75718e
                       0026af6ba2894c4abefa27496d547acb57e51aae
                       5f9f61d090592ce5e211dadb52fd7206598bbc12
                       0a6655d32bf30cb20c9d1c5f2cc4c0092e18c01c
                       2566d424b08c07b6b3fc3ec5e73d2c2dc7e1896b
                       856b419478cec0a170c98a5bdcd78de4468b3233
                       b2c3287a618a6d7f79dc511056489d624dfccc21
                       5747a2faab1707db122cdfab16b58e7b5d3646dd
                       de54d88309b3da8fafd6a968c1d988b01b560768
                       da6b878d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [1e:ef:cd:f0:87:bc:cf:98:97:1e:bd:84:ac:c8:7f:77:ce:fb:d0:09],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-12 05:32:09.734  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-12 05:32:09.739 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-12 05:32:09.743 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2023-01-12 05:32:09.746 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-12 05:32:09.748  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2023-01-12 05:32:09.749  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-12 05:32:09.750  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-12 05:32:09.752 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-12 05:32:09.755 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-12 05:32:09.756 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-12 05:32:09.765 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-12 05:32:09.766 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-12 05:32:09.766 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-12 05:32:09.767 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-12 05:32:09.947  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-12 05:32:09.948  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-12 05:32:09.949 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-12 05:32:09.949 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-12 05:32:09.953  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-12 05:32:09.953  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-12 05:32:09.954 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-12 05:32:09.955 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-12 05:32:09.956 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-12 05:32:09.958 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-12 05:32:09.958 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-12 05:32:09.959 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-12 05:32:09.960 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-12 05:32:09.960 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-12 05:32:09.961 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-12 05:32:09.962 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-12 05:32:09.966 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 126172013863890901979413708265899355209992631185
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Jan 12 03:28:00 UTC 2023
           Final Date: Tue Jan 11 03:27:59 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [5f:9e:8d:34:ef:db:cd:05:d5:fc:60:34:45:24:2d:0f:83:ae:f9:fc],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3d8ccbd4e8b5f0460dded1cfcef7c12d04ae9eb2
                       dbdc4dfa51a36660e0676ab851becb9297534af8
                       00b9a32dd748a81e0cadbb94fbf99e9df1fb9f21
                       e696e655e71d3e1b5e66f38e44f9950390aab3c7
                       5845a9768382be7e9c52271e34139b4657ce5567
                       fd57856d2f1b2ec421fdae2adb1a881e24e726cb
                       44b9006d12d34e1ebdfb8c4266cf2ef4a8ff5078
                       178fe0edd3eeca3b3a486b15310ae1912f8aaa1f
                       53c2db14226240a59ca8ac803c357213cd6044d9
                       1caa7553639c1c7a5f6eeb1d6d0e5c55dd72ccf8
                       d7c6872bfed9b485b21b684b7ae8f25d4e75718e
                       0026af6ba2894c4abefa27496d547acb57e51aae
                       5f9f61d090592ce5e211dadb52fd7206598bbc12
                       0a6655d32bf30cb20c9d1c5f2cc4c0092e18c01c
                       2566d424b08c07b6b3fc3ec5e73d2c2dc7e1896b
                       856b419478cec0a170c98a5bdcd78de4468b3233
                       b2c3287a618a6d7f79dc511056489d624dfccc21
                       5747a2faab1707db122cdfab16b58e7b5d3646dd
                       de54d88309b3da8fafd6a968c1d988b01b560768
                       da6b878d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [5c:c4:1e:81:3f:15:9b:6d:56:da:02:7e:92:d8:fb:53:8a:03:4c:8b],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-12 05:35:34.602  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-12 05:35:34.604 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-12 05:35:34.607 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2023-01-12 05:35:34.608 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-12 05:35:34.609  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2023-01-12 05:35:34.610  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-12 05:35:34.610  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-12 05:35:34.611 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-12 05:35:34.612 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-12 05:35:34.613 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-12 05:35:34.619 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-12 05:35:34.620 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-12 05:35:34.621 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-12 05:35:34.621 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-12 05:35:34.858  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-12 05:35:34.859  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-12 05:35:34.859 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-12 05:35:34.860 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-12 05:35:34.862  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-12 05:35:34.862  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-12 05:35:34.863 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-12 05:35:34.863 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-12 05:35:34.863 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-12 05:35:34.864 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-12 05:35:34.864 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-12 05:35:34.865 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-12 05:35:34.865 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-12 05:35:34.866 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-12 05:35:34.866 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-12 05:35:34.867 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-12 05:35:34.871 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 126172013863890901979413708265899355209992631185
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Jan 12 03:28:00 UTC 2023
           Final Date: Tue Jan 11 03:27:59 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [5f:9e:8d:34:ef:db:cd:05:d5:fc:60:34:45:24:2d:0f:83:ae:f9:fc],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3d8ccbd4e8b5f0460dded1cfcef7c12d04ae9eb2
                       dbdc4dfa51a36660e0676ab851becb9297534af8
                       00b9a32dd748a81e0cadbb94fbf99e9df1fb9f21
                       e696e655e71d3e1b5e66f38e44f9950390aab3c7
                       5845a9768382be7e9c52271e34139b4657ce5567
                       fd57856d2f1b2ec421fdae2adb1a881e24e726cb
                       44b9006d12d34e1ebdfb8c4266cf2ef4a8ff5078
                       178fe0edd3eeca3b3a486b15310ae1912f8aaa1f
                       53c2db14226240a59ca8ac803c357213cd6044d9
                       1caa7553639c1c7a5f6eeb1d6d0e5c55dd72ccf8
                       d7c6872bfed9b485b21b684b7ae8f25d4e75718e
                       0026af6ba2894c4abefa27496d547acb57e51aae
                       5f9f61d090592ce5e211dadb52fd7206598bbc12
                       0a6655d32bf30cb20c9d1c5f2cc4c0092e18c01c
                       2566d424b08c07b6b3fc3ec5e73d2c2dc7e1896b
                       856b419478cec0a170c98a5bdcd78de4468b3233
                       b2c3287a618a6d7f79dc511056489d624dfccc21
                       5747a2faab1707db122cdfab16b58e7b5d3646dd
                       de54d88309b3da8fafd6a968c1d988b01b560768
                       da6b878d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [87:27:be:3d:3f:02:25:c7:49:c5:26:5a:0b:da:de:dd:9d:99:07:b3],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-12 05:38:32.520  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-12 05:38:32.521 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-12 05:38:32.523 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-12 05:38:32.523 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-12 05:38:32.524  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-12 05:38:32.525  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-12 05:38:32.526  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-12 05:38:32.526 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-12 05:38:32.527 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-12 05:38:32.527 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-12 05:38:32.531 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-12 05:38:32.532 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-12 05:38:32.532 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-12 05:38:32.532 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-12 05:38:33.700  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-12 05:38:33.700  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-12 05:38:33.701 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-12 05:38:33.701 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-12 05:38:33.703  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-12 05:38:33.704  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-12 05:38:33.704 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-12 05:38:33.705 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-12 05:38:33.705 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-12 05:38:33.706 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-12 05:38:33.706 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-12 05:38:33.707 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-12 05:38:33.707 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-12 05:38:33.708 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-12 05:38:33.708 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-12 05:38:33.710 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-12 05:38:33.714 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 126172013863890901979413708265899355209992631185
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Jan 12 03:28:00 UTC 2023
           Final Date: Tue Jan 11 03:27:59 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [5f:9e:8d:34:ef:db:cd:05:d5:fc:60:34:45:24:2d:0f:83:ae:f9:fc],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3d8ccbd4e8b5f0460dded1cfcef7c12d04ae9eb2
                       dbdc4dfa51a36660e0676ab851becb9297534af8
                       00b9a32dd748a81e0cadbb94fbf99e9df1fb9f21
                       e696e655e71d3e1b5e66f38e44f9950390aab3c7
                       5845a9768382be7e9c52271e34139b4657ce5567
                       fd57856d2f1b2ec421fdae2adb1a881e24e726cb
                       44b9006d12d34e1ebdfb8c4266cf2ef4a8ff5078
                       178fe0edd3eeca3b3a486b15310ae1912f8aaa1f
                       53c2db14226240a59ca8ac803c357213cd6044d9
                       1caa7553639c1c7a5f6eeb1d6d0e5c55dd72ccf8
                       d7c6872bfed9b485b21b684b7ae8f25d4e75718e
                       0026af6ba2894c4abefa27496d547acb57e51aae
                       5f9f61d090592ce5e211dadb52fd7206598bbc12
                       0a6655d32bf30cb20c9d1c5f2cc4c0092e18c01c
                       2566d424b08c07b6b3fc3ec5e73d2c2dc7e1896b
                       856b419478cec0a170c98a5bdcd78de4468b3233
                       b2c3287a618a6d7f79dc511056489d624dfccc21
                       5747a2faab1707db122cdfab16b58e7b5d3646dd
                       de54d88309b3da8fafd6a968c1d988b01b560768
                       da6b878d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ce:2b:ab:39:43:a6:f3:78:f8:2c:a0:1c:6a:48:c3:d2:54:17:15:a3],[56:66:d1:a4]
        modulus: ded8ad6375c32dfed2a269464271e1d5e41ebe33902d23dec0647291408a3ff6f80e6b09f2110d9211eed1fd412b9c52ec610d63cc5ae182d4fecc9d1bad7ebd0c438f92f056cccca18197b238e71c95bd85fe728be6dfc1cf0f92d991616ef88f1eecb0458c27c1124a413ce29b07bfe5d0b670c37fa435ccda58ab2f3a288561840b02758b9c390faa5defb4f38968ae91c51e95d847939f9ef48209daeeb035adb91853ebf5f851dd4b9e9e900c8220291114f445e09c88954ca90c2161336bfa0d79fca075f036e2ec8b3b1fa9f1af940c2e39ae90fea498a4e67319ad1dcb7241d5294451dc83fc338300cad5d30ce2b4b6d21ae2d6ae3461db3fbef0f7
public exponent: 10001

] 
2023-01-12 05:46:26.416  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-12 05:46:26.419 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-12 05:46:26.421 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-12 05:46:26.421 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-12 05:46:26.422  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-12 05:46:26.423  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-12 05:46:26.423  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-12 05:46:26.424 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-12 05:46:26.424 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-12 05:46:26.425 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-12 05:46:26.430 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-12 05:46:26.431 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-12 05:46:26.431 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-12 05:46:26.432 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-12 05:46:26.555  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-12 05:46:26.556  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-12 05:46:26.556 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-12 05:46:26.557 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-12 05:46:26.558  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-12 05:46:26.559  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-12 05:46:26.559 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-12 05:46:26.560 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-12 05:46:26.560 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-12 05:46:26.561 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-12 05:46:26.561 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-12 05:46:26.562 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-12 05:46:26.562 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-12 05:46:26.563 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-12 05:46:26.563 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-12 05:46:26.564 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-12 05:46:26.567 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 126172013863890901979413708265899355209992631185
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Jan 12 03:28:00 UTC 2023
           Final Date: Tue Jan 11 03:27:59 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [5f:9e:8d:34:ef:db:cd:05:d5:fc:60:34:45:24:2d:0f:83:ae:f9:fc],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3d8ccbd4e8b5f0460dded1cfcef7c12d04ae9eb2
                       dbdc4dfa51a36660e0676ab851becb9297534af8
                       00b9a32dd748a81e0cadbb94fbf99e9df1fb9f21
                       e696e655e71d3e1b5e66f38e44f9950390aab3c7
                       5845a9768382be7e9c52271e34139b4657ce5567
                       fd57856d2f1b2ec421fdae2adb1a881e24e726cb
                       44b9006d12d34e1ebdfb8c4266cf2ef4a8ff5078
                       178fe0edd3eeca3b3a486b15310ae1912f8aaa1f
                       53c2db14226240a59ca8ac803c357213cd6044d9
                       1caa7553639c1c7a5f6eeb1d6d0e5c55dd72ccf8
                       d7c6872bfed9b485b21b684b7ae8f25d4e75718e
                       0026af6ba2894c4abefa27496d547acb57e51aae
                       5f9f61d090592ce5e211dadb52fd7206598bbc12
                       0a6655d32bf30cb20c9d1c5f2cc4c0092e18c01c
                       2566d424b08c07b6b3fc3ec5e73d2c2dc7e1896b
                       856b419478cec0a170c98a5bdcd78de4468b3233
                       b2c3287a618a6d7f79dc511056489d624dfccc21
                       5747a2faab1707db122cdfab16b58e7b5d3646dd
                       de54d88309b3da8fafd6a968c1d988b01b560768
                       da6b878d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [f0:4f:76:d6:a3:b7:7c:7a:2b:5a:ba:1f:f7:10:b9:6e:69:e4:1f:89],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-12 05:53:14.903  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-12 05:53:14.909 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-12 05:53:14.912 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-12 05:53:14.913 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-12 05:53:14.914  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-12 05:53:14.914  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-12 05:53:14.915  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-12 05:53:14.915 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-12 05:53:14.916 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-12 05:53:14.916 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-12 05:53:14.920 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-12 05:53:14.921 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-12 05:53:14.921 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-12 05:53:14.922 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-12 05:53:15.078  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-12 05:53:15.078  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-12 05:53:15.079 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-12 05:53:15.079 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-12 05:53:15.080  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-12 05:53:15.081  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-12 05:53:15.081 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-12 05:53:15.081 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-12 05:53:15.082 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-12 05:53:15.082 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-12 05:53:15.083 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-12 05:53:15.083 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-12 05:53:15.084 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-12 05:53:15.084 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-12 05:53:15.084 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-12 05:53:15.085 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-12 05:53:15.088 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 126172013863890901979413708265899355209992631185
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Jan 12 03:28:00 UTC 2023
           Final Date: Tue Jan 11 03:27:59 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [5f:9e:8d:34:ef:db:cd:05:d5:fc:60:34:45:24:2d:0f:83:ae:f9:fc],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3d8ccbd4e8b5f0460dded1cfcef7c12d04ae9eb2
                       dbdc4dfa51a36660e0676ab851becb9297534af8
                       00b9a32dd748a81e0cadbb94fbf99e9df1fb9f21
                       e696e655e71d3e1b5e66f38e44f9950390aab3c7
                       5845a9768382be7e9c52271e34139b4657ce5567
                       fd57856d2f1b2ec421fdae2adb1a881e24e726cb
                       44b9006d12d34e1ebdfb8c4266cf2ef4a8ff5078
                       178fe0edd3eeca3b3a486b15310ae1912f8aaa1f
                       53c2db14226240a59ca8ac803c357213cd6044d9
                       1caa7553639c1c7a5f6eeb1d6d0e5c55dd72ccf8
                       d7c6872bfed9b485b21b684b7ae8f25d4e75718e
                       0026af6ba2894c4abefa27496d547acb57e51aae
                       5f9f61d090592ce5e211dadb52fd7206598bbc12
                       0a6655d32bf30cb20c9d1c5f2cc4c0092e18c01c
                       2566d424b08c07b6b3fc3ec5e73d2c2dc7e1896b
                       856b419478cec0a170c98a5bdcd78de4468b3233
                       b2c3287a618a6d7f79dc511056489d624dfccc21
                       5747a2faab1707db122cdfab16b58e7b5d3646dd
                       de54d88309b3da8fafd6a968c1d988b01b560768
                       da6b878d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [20:2f:fd:1c:bb:13:a5:5c:15:f3:5d:ce:f6:5a:bd:62:32:5c:c6:8e],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-12 06:01:20.430  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-12 06:01:20.431 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-12 06:01:20.432 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2023-01-12 06:01:20.433 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-12 06:01:20.433  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2023-01-12 06:01:20.434  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-12 06:01:20.434  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-12 06:01:20.434 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-12 06:01:20.435 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-12 06:01:20.435 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-12 06:01:20.438 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-12 06:01:20.439 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-12 06:01:20.439 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-12 06:01:20.439 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-12 06:01:20.629  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-12 06:01:20.630  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-12 06:01:20.630 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-12 06:01:20.631 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-12 06:01:20.632  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-12 06:01:20.632  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-12 06:01:20.633 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-12 06:01:20.633 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-12 06:01:20.633 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-12 06:01:20.634 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-12 06:01:20.634 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-12 06:01:20.635 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-12 06:01:20.636 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-12 06:01:20.636 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-12 06:01:20.636 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-12 06:01:20.637 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-12 06:01:20.640 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 126172013863890901979413708265899355209992631185
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Jan 12 03:28:00 UTC 2023
           Final Date: Tue Jan 11 03:27:59 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [5f:9e:8d:34:ef:db:cd:05:d5:fc:60:34:45:24:2d:0f:83:ae:f9:fc],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3d8ccbd4e8b5f0460dded1cfcef7c12d04ae9eb2
                       dbdc4dfa51a36660e0676ab851becb9297534af8
                       00b9a32dd748a81e0cadbb94fbf99e9df1fb9f21
                       e696e655e71d3e1b5e66f38e44f9950390aab3c7
                       5845a9768382be7e9c52271e34139b4657ce5567
                       fd57856d2f1b2ec421fdae2adb1a881e24e726cb
                       44b9006d12d34e1ebdfb8c4266cf2ef4a8ff5078
                       178fe0edd3eeca3b3a486b15310ae1912f8aaa1f
                       53c2db14226240a59ca8ac803c357213cd6044d9
                       1caa7553639c1c7a5f6eeb1d6d0e5c55dd72ccf8
                       d7c6872bfed9b485b21b684b7ae8f25d4e75718e
                       0026af6ba2894c4abefa27496d547acb57e51aae
                       5f9f61d090592ce5e211dadb52fd7206598bbc12
                       0a6655d32bf30cb20c9d1c5f2cc4c0092e18c01c
                       2566d424b08c07b6b3fc3ec5e73d2c2dc7e1896b
                       856b419478cec0a170c98a5bdcd78de4468b3233
                       b2c3287a618a6d7f79dc511056489d624dfccc21
                       5747a2faab1707db122cdfab16b58e7b5d3646dd
                       de54d88309b3da8fafd6a968c1d988b01b560768
                       da6b878d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [3f:ce:73:03:fd:26:cb:0d:1e:a7:b2:ca:98:3e:36:e1:c0:cc:b2:42],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-12 06:09:12.336  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-12 06:09:12.340 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-12 06:09:12.343 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2023-01-12 06:09:12.344 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-12 06:09:12.345  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2023-01-12 06:09:12.346  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-12 06:09:12.346  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-12 06:09:12.346 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-12 06:09:12.347 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-12 06:09:12.347 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-12 06:09:12.352 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-12 06:09:12.352 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-12 06:09:12.353 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-12 06:09:12.353 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-12 06:09:12.523  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-12 06:09:12.524  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-12 06:09:12.524 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-12 06:09:12.525 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-12 06:09:12.527  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-12 06:09:12.527  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-12 06:09:12.528 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-12 06:09:12.528 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-12 06:09:12.528 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-12 06:09:12.529 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-12 06:09:12.529 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-12 06:09:12.530 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-12 06:09:12.530 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-12 06:09:12.530 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-12 06:09:12.531 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-12 06:09:12.531 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-12 06:09:12.535 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 126172013863890901979413708265899355209992631185
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Jan 12 03:28:00 UTC 2023
           Final Date: Tue Jan 11 03:27:59 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [5f:9e:8d:34:ef:db:cd:05:d5:fc:60:34:45:24:2d:0f:83:ae:f9:fc],[56:66:d1:a4]
        modulus: 8f1e949f0789211611e8f9d16339e18641f3779e3668b1c4c668adb58933fd750715bb7e3406d194dbc378e02c8940ed4557a896f6c2bc7fa3e3e9ed6c2f58721406b58265568acfa8a50ccb8b037f9d2e6588adbdd4903bb2ee24bf3dcea2fda54266d51a2d26f78843860c7ff90e7fdba99be7ba4014e17eb1afe6b671ce433e4978187dd1d4bae23fe8fb8f52039ddf3c413edf06aa2e1c283e359c135a9ce839868640c8f4bb90c250288a27cd28c9af7e7b3f9898e656eec1d20dd899957fdbf45adeb6963392967cbb412456b190bbd148f6f98887981105dd5acd57eabedf7bfc781e5ab14aed95bf8e4850e62941af7bd28ef82de1533ba84f10dae03c588fde9ec0246a427ed83f1b7cc5bd330b44523351cdba0642067218040228345b3aad985c1d0f02bd0fdb4d286f385430937bdc56d4dfffae76856b7517d56bdb15b53d55dd15dcc04a890030c8ced2587b57db0f2ae2add1e65aff193575e816566347bbc68b579dbea25aa7b7440028aa34da8127c9b786cc8105a0ab11
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3d8ccbd4e8b5f0460dded1cfcef7c12d04ae9eb2
                       dbdc4dfa51a36660e0676ab851becb9297534af8
                       00b9a32dd748a81e0cadbb94fbf99e9df1fb9f21
                       e696e655e71d3e1b5e66f38e44f9950390aab3c7
                       5845a9768382be7e9c52271e34139b4657ce5567
                       fd57856d2f1b2ec421fdae2adb1a881e24e726cb
                       44b9006d12d34e1ebdfb8c4266cf2ef4a8ff5078
                       178fe0edd3eeca3b3a486b15310ae1912f8aaa1f
                       53c2db14226240a59ca8ac803c357213cd6044d9
                       1caa7553639c1c7a5f6eeb1d6d0e5c55dd72ccf8
                       d7c6872bfed9b485b21b684b7ae8f25d4e75718e
                       0026af6ba2894c4abefa27496d547acb57e51aae
                       5f9f61d090592ce5e211dadb52fd7206598bbc12
                       0a6655d32bf30cb20c9d1c5f2cc4c0092e18c01c
                       2566d424b08c07b6b3fc3ec5e73d2c2dc7e1896b
                       856b419478cec0a170c98a5bdcd78de4468b3233
                       b2c3287a618a6d7f79dc511056489d624dfccc21
                       5747a2faab1707db122cdfab16b58e7b5d3646dd
                       de54d88309b3da8fafd6a968c1d988b01b560768
                       da6b878d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [86:58:21:59:b3:24:e2:6a:9b:f9:16:dc:59:9b:aa:eb:76:e4:06:d1],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-12 06:09:31.602  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-12 06:09:31.603 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-12 06:09:31.605 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2023-01-12 06:09:31.605 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-12 06:09:31.606  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2023-01-12 06:09:31.606  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-12 06:09:31.606  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-12 06:09:31.607 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-12 06:09:31.607 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-12 06:09:31.607 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-12 06:09:31.611 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-12 06:09:31.611 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-12 06:09:31.611 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-12 06:09:31.612 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-12 06:09:31.741  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-12 06:09:31.742  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-12 06:09:31.742 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-12 06:09:31.742 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-12 06:09:31.744  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-12 06:09:31.744  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-12 06:09:31.745 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-12 06:09:31.745 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-12 06:09:31.745 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-12 06:09:31.746 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-12 06:09:31.747 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-12 06:09:31.747 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-12 06:09:31.748 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-12 06:09:31.748 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-12 06:09:31.748 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-12 06:09:31.749 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-12 06:09:31.752 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 126172013863890901979413708265899355209992631185
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Jan 12 03:28:00 UTC 2023
           Final Date: Tue Jan 11 03:27:59 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [5f:9e:8d:34:ef:db:cd:05:d5:fc:60:34:45:24:2d:0f:83:ae:f9:fc],[56:66:d1:a4]
        modulus: 8f1e949f0789211611e8f9d16339e18641f3779e3668b1c4c668adb58933fd750715bb7e3406d194dbc378e02c8940ed4557a896f6c2bc7fa3e3e9ed6c2f58721406b58265568acfa8a50ccb8b037f9d2e6588adbdd4903bb2ee24bf3dcea2fda54266d51a2d26f78843860c7ff90e7fdba99be7ba4014e17eb1afe6b671ce433e4978187dd1d4bae23fe8fb8f52039ddf3c413edf06aa2e1c283e359c135a9ce839868640c8f4bb90c250288a27cd28c9af7e7b3f9898e656eec1d20dd899957fdbf45adeb6963392967cbb412456b190bbd148f6f98887981105dd5acd57eabedf7bfc781e5ab14aed95bf8e4850e62941af7bd28ef82de1533ba84f10dae03c588fde9ec0246a427ed83f1b7cc5bd330b44523351cdba0642067218040228345b3aad985c1d0f02bd0fdb4d286f385430937bdc56d4dfffae76856b7517d56bdb15b53d55dd15dcc04a890030c8ced2587b57db0f2ae2add1e65aff193575e816566347bbc68b579dbea25aa7b7440028aa34da8127c9b786cc8105a0ab11
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3d8ccbd4e8b5f0460dded1cfcef7c12d04ae9eb2
                       dbdc4dfa51a36660e0676ab851becb9297534af8
                       00b9a32dd748a81e0cadbb94fbf99e9df1fb9f21
                       e696e655e71d3e1b5e66f38e44f9950390aab3c7
                       5845a9768382be7e9c52271e34139b4657ce5567
                       fd57856d2f1b2ec421fdae2adb1a881e24e726cb
                       44b9006d12d34e1ebdfb8c4266cf2ef4a8ff5078
                       178fe0edd3eeca3b3a486b15310ae1912f8aaa1f
                       53c2db14226240a59ca8ac803c357213cd6044d9
                       1caa7553639c1c7a5f6eeb1d6d0e5c55dd72ccf8
                       d7c6872bfed9b485b21b684b7ae8f25d4e75718e
                       0026af6ba2894c4abefa27496d547acb57e51aae
                       5f9f61d090592ce5e211dadb52fd7206598bbc12
                       0a6655d32bf30cb20c9d1c5f2cc4c0092e18c01c
                       2566d424b08c07b6b3fc3ec5e73d2c2dc7e1896b
                       856b419478cec0a170c98a5bdcd78de4468b3233
                       b2c3287a618a6d7f79dc511056489d624dfccc21
                       5747a2faab1707db122cdfab16b58e7b5d3646dd
                       de54d88309b3da8fafd6a968c1d988b01b560768
                       da6b878d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [5a:94:52:90:5c:3b:e0:1a:5b:a5:a6:3a:7e:66:ac:e6:ce:5d:5d:dc],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-12 06:34:38.887  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-12 06:34:38.892 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-12 06:34:38.896 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2023-01-12 06:34:38.897 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-12 06:34:38.898  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2023-01-12 06:34:38.899  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-12 06:34:38.899  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-12 06:34:38.913 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-12 06:34:38.914 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-12 06:34:38.915 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-12 06:34:38.920 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-12 06:34:38.921 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-12 06:34:38.921 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-12 06:34:38.922 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-12 06:34:39.119  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-12 06:34:39.119  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-12 06:34:39.120 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-12 06:34:39.120 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-12 06:34:39.121  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-12 06:34:39.122  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-12 06:34:39.122 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-12 06:34:39.122 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-12 06:34:39.123 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-12 06:34:39.125 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-12 06:34:39.126 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-12 06:34:39.126 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-12 06:34:39.127 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-12 06:34:39.127 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-12 06:34:39.127 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-12 06:34:39.130 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-12 06:34:39.135 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 126172013863890901979413708265899355209992631185
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Jan 12 03:28:00 UTC 2023
           Final Date: Tue Jan 11 03:27:59 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [5f:9e:8d:34:ef:db:cd:05:d5:fc:60:34:45:24:2d:0f:83:ae:f9:fc],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3d8ccbd4e8b5f0460dded1cfcef7c12d04ae9eb2
                       dbdc4dfa51a36660e0676ab851becb9297534af8
                       00b9a32dd748a81e0cadbb94fbf99e9df1fb9f21
                       e696e655e71d3e1b5e66f38e44f9950390aab3c7
                       5845a9768382be7e9c52271e34139b4657ce5567
                       fd57856d2f1b2ec421fdae2adb1a881e24e726cb
                       44b9006d12d34e1ebdfb8c4266cf2ef4a8ff5078
                       178fe0edd3eeca3b3a486b15310ae1912f8aaa1f
                       53c2db14226240a59ca8ac803c357213cd6044d9
                       1caa7553639c1c7a5f6eeb1d6d0e5c55dd72ccf8
                       d7c6872bfed9b485b21b684b7ae8f25d4e75718e
                       0026af6ba2894c4abefa27496d547acb57e51aae
                       5f9f61d090592ce5e211dadb52fd7206598bbc12
                       0a6655d32bf30cb20c9d1c5f2cc4c0092e18c01c
                       2566d424b08c07b6b3fc3ec5e73d2c2dc7e1896b
                       856b419478cec0a170c98a5bdcd78de4468b3233
                       b2c3287a618a6d7f79dc511056489d624dfccc21
                       5747a2faab1707db122cdfab16b58e7b5d3646dd
                       de54d88309b3da8fafd6a968c1d988b01b560768
                       da6b878d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [07:b9:d9:50:9d:f2:e6:e7:0b:78:f1:5d:66:22:9c:93:20:04:eb:12],[56:66:d1:a4]
        modulus: c281af1665550644f7e73e52c6b10390dd91238fb478da904c22c805ef34b3e4c42cab3b02df6e774d2c01bbc3f10b24e8f4a3fc9d7ce1fc07569f17f39a82962bc742d6be90e6e2541e706c7720ce198a10b1932a212a1ffda3ee33ea254014db57b2884e68e30de0e04bb45ed6917ae5067fad3e1966fb2435255a5f0d664716a73415cf116e43e6551bce9a1278308b3a41982be8f144ebb295443d43fd1f6e9357e83e9eda26ffbc532ed320d5aa43496984da226f9e810a9583acf68b71f0b7b26ae9de71482c7b9f9008921c86497db3bcdc73eb2dfdc738e1121c435769134abe7c831c2bbd3f77259e6842f9d8487e728914a4d81b1f2e696597c08d
public exponent: 10001

] 
2023-01-12 06:34:56.188  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-12 06:34:56.189 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-12 06:34:56.190 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2023-01-12 06:34:56.191 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-12 06:34:56.191  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2023-01-12 06:34:56.192  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-12 06:34:56.192  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-12 06:34:56.193 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-12 06:34:56.193 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-12 06:34:56.193 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-12 06:34:56.200 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-12 06:34:56.200 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-12 06:34:56.201 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-12 06:34:56.201 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-12 06:34:56.343  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-12 06:34:56.343  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-12 06:34:56.344 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-12 06:34:56.345 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-12 06:34:56.346  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-12 06:34:56.346  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-12 06:34:56.347 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-12 06:34:56.347 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-12 06:34:56.347 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-12 06:34:56.349 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-12 06:34:56.349 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-12 06:34:56.349 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-12 06:34:56.352 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-12 06:34:56.357 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-12 06:34:56.362 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-12 06:34:56.363 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-12 06:34:56.367 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 126172013863890901979413708265899355209992631185
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Jan 12 03:28:00 UTC 2023
           Final Date: Tue Jan 11 03:27:59 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [5f:9e:8d:34:ef:db:cd:05:d5:fc:60:34:45:24:2d:0f:83:ae:f9:fc],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3d8ccbd4e8b5f0460dded1cfcef7c12d04ae9eb2
                       dbdc4dfa51a36660e0676ab851becb9297534af8
                       00b9a32dd748a81e0cadbb94fbf99e9df1fb9f21
                       e696e655e71d3e1b5e66f38e44f9950390aab3c7
                       5845a9768382be7e9c52271e34139b4657ce5567
                       fd57856d2f1b2ec421fdae2adb1a881e24e726cb
                       44b9006d12d34e1ebdfb8c4266cf2ef4a8ff5078
                       178fe0edd3eeca3b3a486b15310ae1912f8aaa1f
                       53c2db14226240a59ca8ac803c357213cd6044d9
                       1caa7553639c1c7a5f6eeb1d6d0e5c55dd72ccf8
                       d7c6872bfed9b485b21b684b7ae8f25d4e75718e
                       0026af6ba2894c4abefa27496d547acb57e51aae
                       5f9f61d090592ce5e211dadb52fd7206598bbc12
                       0a6655d32bf30cb20c9d1c5f2cc4c0092e18c01c
                       2566d424b08c07b6b3fc3ec5e73d2c2dc7e1896b
                       856b419478cec0a170c98a5bdcd78de4468b3233
                       b2c3287a618a6d7f79dc511056489d624dfccc21
                       5747a2faab1707db122cdfab16b58e7b5d3646dd
                       de54d88309b3da8fafd6a968c1d988b01b560768
                       da6b878d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [2c:5a:e9:6c:0a:e0:e2:f3:35:12:97:e3:e2:6e:3b:83:2d:77:82:4f],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

]