Results

By type

          2022-04-04 12:40:26,289 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-04-04 12:40:28,979 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-04-04 12:40:30.551  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Apr 04, 2022 12:40:34 PM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Apr 04, 2022 12:40:34 PM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Apr 04, 2022 12:40:34 PM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Apr 04, 2022 12:40:34 PM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-04-04 12:40:35.863 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-04-04 12:40:36.359  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-04-04 12:40:36.677  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-04-04 12:40:38.035 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-04-04 12:40:38.039 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
2022-04-04 12:40:38.040 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-04-04 12:40:38.045 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-04-04 12:40:38.102 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2022-04-04 12:40:38.107 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/docs]}: redirectToUi(HttpServletRequest)
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
2022-04-04 12:40:38.355 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-04-04 12:40:39.494 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Apr 04, 2022 12:40:40 PM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-04-04 12:40:41.553  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 16.706 seconds (JVM running for 19.765)
Apr 04, 2022 12:40:54 PM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-04-04 12:41:08.411  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-04 12:41:08.429 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-04 12:41:08.525 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-04-04 12:41:08.532 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-04 12:41:08.573  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-04-04 12:41:08.577  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-04 12:41:08.580  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-04 12:41:08.583 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-04 12:41:08.583 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-04 12:41:08.589 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-04 12:41:08.601 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-04 12:41:08.606 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-04 12:41:08.675 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-04 12:41:08.683 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-04 12:41:08.684 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-04 12:41:08.690 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-04 12:41:09.602  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-04 12:41:09.607  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-04 12:41:09.608 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-04 12:41:09.610 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-04 12:41:09.632  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-04 12:41:09.634  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-04 12:41:09.636 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-04 12:41:09.637 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-04 12:41:09.637 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-04 12:41:09.658 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-04 12:41:09.659 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-04 12:41:09.660 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-04 12:41:09.671 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-04 12:41:09.672 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-04 12:41:09.673 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-04 12:41:09.676 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-04 12:41:09.732 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 418035517848075783936831126053155063074648973826
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Apr 04 12:38:09 UTC 2022
           Final Date: Sat Apr 03 12:38:08 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [81:26:af:4e:cf:a3:b5:3f:46:64:ba:cf:38:df:66:55:ae:8c:f8:88]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 0895e3860ace96ecfdf352cfed4a1426d9a468c4
                       e179df5d3f11e205907ed5b794332945d6d57c0f
                       3b4c8c9c343bf6d269a4048d77e0edd446cb5778
                       b3266216e60fb537e895032aa2742954446f8faf
                       9b15f0b937ac7b35821ab1833a1e85d3006f42ad
                       f21822cad313fe4a908c1f787803690edbb6bc97
                       20ffb48b2bd33c9ec45e5a7c6f28d6b01d4a6893
                       df06ef289f94ba98c76b5a5d201d1692116639ca
                       a321178a74d78def173a9e5fb32b6e308839c0ae
                       a1ffe2da0a501162abf5d7f2137153f715bc3dc8
                       cffb7b35ed14153600079bc9a454a97e6cf141d6
                       852d7115c73b07679b13a44d0474f96eafac2db2
                       d65b39d241b4f3968feff177640f58c49cf2425f
                       8583eda9dffd5d75b76557a30a05c2958fb8f305
                       d1746ae90614f75034793caf4d4f71f207b31f46
                       c1142a46f61065946593050770a0a26bd46d4c30
                       8be8c8a801f30703b1e23486ae2889bfcdf6089d
                       df4dd03dc75940dc79247d235632e09dfe57d766
                       c8a3f75e07a838fadb0ef4868d6f009de87ac882
                       d2a9d6b7
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [d1:56:14:9b:96:e3:77:34:8a:c2:8d:87:43:d5:80:33:71:2a:e0:6e]
            modulus: adfadb4d2a15d018f83de67f055593948e2e9964342cae3d2eb08b4f760e49c6ca363d1ef8949ab0ad8510b416b281aa03d95545db6a6881db5fccf8eba21e3d144d8e8e5f2009d2d3bafcf7207dc46bd4a2336dbd2fdec53bd50627b6eed480c1bcc2306c099f1ae51d90e620ceeb5b4011d7ddee5fa5a3629d95505932a6fd2fcdddd196c08fda7219d18553002aab683315451c18b372f1631367a584521217e243c4b7fdd716f16b0e9bb6fa517d014f0651e1e0b3cfb12b3b54c7c47aa5d6603f6c1eb0a6354999cbf8f3af005743adc893c5f344af158c7ef06aaecb7cd99a7cd37833659dfe588c6801f8463cd4416205de64959763135b046336b453
    public exponent: 10001

] 
2022-04-04 14:04:43.560  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-04 14:04:43.577 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-04 14:04:43.590 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-04-04 14:04:43.593 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-04 14:04:43.594  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-04-04 14:04:43.594  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-04 14:04:43.595  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-04 14:04:43.595 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-04 14:04:43.596 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-04 14:04:43.597 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-04 14:04:43.607 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-04 14:04:43.609 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-04 14:04:43.610 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-04 14:04:43.611 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-04 14:04:44.072  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-04 14:04:44.074  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-04 14:04:44.074 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-04 14:04:44.075 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-04 14:04:44.079  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-04 14:04:44.080  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-04 14:04:44.081 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-04 14:04:44.082 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-04 14:04:44.082 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-04 14:04:44.086 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-04 14:04:44.087 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-04 14:04:44.087 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-04 14:04:44.089 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-04 14:04:44.090 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-04 14:04:44.090 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-04 14:04:44.093 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-04 14:04:44.102 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 418035517848075783936831126053155063074648973826
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Apr 04 12:38:09 UTC 2022
           Final Date: Sat Apr 03 12:38:08 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [81:26:af:4e:cf:a3:b5:3f:46:64:ba:cf:38:df:66:55:ae:8c:f8:88]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 0895e3860ace96ecfdf352cfed4a1426d9a468c4
                       e179df5d3f11e205907ed5b794332945d6d57c0f
                       3b4c8c9c343bf6d269a4048d77e0edd446cb5778
                       b3266216e60fb537e895032aa2742954446f8faf
                       9b15f0b937ac7b35821ab1833a1e85d3006f42ad
                       f21822cad313fe4a908c1f787803690edbb6bc97
                       20ffb48b2bd33c9ec45e5a7c6f28d6b01d4a6893
                       df06ef289f94ba98c76b5a5d201d1692116639ca
                       a321178a74d78def173a9e5fb32b6e308839c0ae
                       a1ffe2da0a501162abf5d7f2137153f715bc3dc8
                       cffb7b35ed14153600079bc9a454a97e6cf141d6
                       852d7115c73b07679b13a44d0474f96eafac2db2
                       d65b39d241b4f3968feff177640f58c49cf2425f
                       8583eda9dffd5d75b76557a30a05c2958fb8f305
                       d1746ae90614f75034793caf4d4f71f207b31f46
                       c1142a46f61065946593050770a0a26bd46d4c30
                       8be8c8a801f30703b1e23486ae2889bfcdf6089d
                       df4dd03dc75940dc79247d235632e09dfe57d766
                       c8a3f75e07a838fadb0ef4868d6f009de87ac882
                       d2a9d6b7
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [37:b1:07:52:4b:29:df:72:32:0a:c2:fb:d6:d3:c6:ea:c3:c3:5c:d5]
            modulus: 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
    public exponent: 10001

] 
2022-04-04 14:05:04.277  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-04 14:05:04.281 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-04 14:05:04.286 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-04 14:05:04.288 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-04 14:05:04.290  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-04 14:05:04.292  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-04 14:05:04.292  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-04 14:05:04.293 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-04 14:05:04.295 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-04 14:05:04.297 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-04 14:05:04.306 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-04 14:05:04.307 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-04 14:05:04.307 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-04 14:05:04.309 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-04 14:05:04.513  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-04 14:05:04.515  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-04 14:05:04.516 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-04 14:05:04.519 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-04 14:05:04.546  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-04 14:05:04.549  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-04 14:05:04.550 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-04 14:05:04.551 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-04 14:05:04.551 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-04 14:05:04.556 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-04 14:05:04.558 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-04 14:05:04.559 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-04 14:05:04.562 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-04 14:05:04.563 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-04 14:05:04.564 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-04 14:05:04.570 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-04 14:05:04.582 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 418035517848075783936831126053155063074648973826
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Apr 04 12:38:09 UTC 2022
           Final Date: Sat Apr 03 12:38:08 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [81:26:af:4e:cf:a3:b5:3f:46:64:ba:cf:38:df:66:55:ae:8c:f8:88]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 0895e3860ace96ecfdf352cfed4a1426d9a468c4
                       e179df5d3f11e205907ed5b794332945d6d57c0f
                       3b4c8c9c343bf6d269a4048d77e0edd446cb5778
                       b3266216e60fb537e895032aa2742954446f8faf
                       9b15f0b937ac7b35821ab1833a1e85d3006f42ad
                       f21822cad313fe4a908c1f787803690edbb6bc97
                       20ffb48b2bd33c9ec45e5a7c6f28d6b01d4a6893
                       df06ef289f94ba98c76b5a5d201d1692116639ca
                       a321178a74d78def173a9e5fb32b6e308839c0ae
                       a1ffe2da0a501162abf5d7f2137153f715bc3dc8
                       cffb7b35ed14153600079bc9a454a97e6cf141d6
                       852d7115c73b07679b13a44d0474f96eafac2db2
                       d65b39d241b4f3968feff177640f58c49cf2425f
                       8583eda9dffd5d75b76557a30a05c2958fb8f305
                       d1746ae90614f75034793caf4d4f71f207b31f46
                       c1142a46f61065946593050770a0a26bd46d4c30
                       8be8c8a801f30703b1e23486ae2889bfcdf6089d
                       df4dd03dc75940dc79247d235632e09dfe57d766
                       c8a3f75e07a838fadb0ef4868d6f009de87ac882
                       d2a9d6b7
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [02:16:08:1e:97:e5:d6:1a:01:1b:50:33:df:e9:a0:e6:2a:84:21:d8]
            modulus: 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
    public exponent: 10001

] 
2022-04-04 14:06:52.165  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-04 14:06:52.171 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-04 14:06:52.175 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-04-04 14:06:52.177 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-04 14:06:52.178  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-04-04 14:06:52.188  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-04 14:06:52.189  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-04 14:06:52.190 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-04 14:06:52.191 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-04 14:06:52.191 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-04 14:06:52.209 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-04 14:06:52.211 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-04 14:06:52.211 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-04 14:06:52.212 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-04 14:06:52.372  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-04 14:06:52.373  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-04 14:06:52.374 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-04 14:06:52.376 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-04 14:06:52.380  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-04 14:06:52.381  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-04 14:06:52.381 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-04 14:06:52.382 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-04 14:06:52.382 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-04 14:06:52.384 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-04 14:06:52.385 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-04 14:06:52.385 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-04 14:06:52.386 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-04 14:06:52.386 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-04 14:06:52.387 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-04 14:06:52.388 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-04 14:06:52.396 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 418035517848075783936831126053155063074648973826
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Apr 04 12:38:09 UTC 2022
           Final Date: Sat Apr 03 12:38:08 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [81:26:af:4e:cf:a3:b5:3f:46:64:ba:cf:38:df:66:55:ae:8c:f8:88]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 0895e3860ace96ecfdf352cfed4a1426d9a468c4
                       e179df5d3f11e205907ed5b794332945d6d57c0f
                       3b4c8c9c343bf6d269a4048d77e0edd446cb5778
                       b3266216e60fb537e895032aa2742954446f8faf
                       9b15f0b937ac7b35821ab1833a1e85d3006f42ad
                       f21822cad313fe4a908c1f787803690edbb6bc97
                       20ffb48b2bd33c9ec45e5a7c6f28d6b01d4a6893
                       df06ef289f94ba98c76b5a5d201d1692116639ca
                       a321178a74d78def173a9e5fb32b6e308839c0ae
                       a1ffe2da0a501162abf5d7f2137153f715bc3dc8
                       cffb7b35ed14153600079bc9a454a97e6cf141d6
                       852d7115c73b07679b13a44d0474f96eafac2db2
                       d65b39d241b4f3968feff177640f58c49cf2425f
                       8583eda9dffd5d75b76557a30a05c2958fb8f305
                       d1746ae90614f75034793caf4d4f71f207b31f46
                       c1142a46f61065946593050770a0a26bd46d4c30
                       8be8c8a801f30703b1e23486ae2889bfcdf6089d
                       df4dd03dc75940dc79247d235632e09dfe57d766
                       c8a3f75e07a838fadb0ef4868d6f009de87ac882
                       d2a9d6b7
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [b9:f2:eb:9e:6e:fb:07:4c:7f:78:63:83:f2:7d:d4:0e:9a:1a:89:79]
            modulus: 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
    public exponent: 10001

] 
2022-04-04 14:08:10.283  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-04 14:08:10.287 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-04 14:08:10.289 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-04-04 14:08:10.292 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-04 14:08:10.293  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-04-04 14:08:10.295  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-04 14:08:10.296  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-04 14:08:10.296 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-04 14:08:10.297 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-04 14:08:10.297 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-04 14:08:10.305 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-04 14:08:10.307 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-04 14:08:10.307 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-04 14:08:10.307 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-04 14:08:10.480  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-04 14:08:10.480  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-04 14:08:10.481 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-04 14:08:10.481 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-04 14:08:10.483  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-04 14:08:10.483  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-04 14:08:10.483 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-04 14:08:10.484 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-04 14:08:10.484 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-04 14:08:10.485 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-04 14:08:10.485 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-04 14:08:10.485 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-04 14:08:10.486 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-04 14:08:10.486 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-04 14:08:10.487 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-04 14:08:10.488 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-04 14:08:10.493 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 418035517848075783936831126053155063074648973826
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Apr 04 12:38:09 UTC 2022
           Final Date: Sat Apr 03 12:38:08 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [81:26:af:4e:cf:a3:b5:3f:46:64:ba:cf:38:df:66:55:ae:8c:f8:88]
            modulus: a772b24e0d3f2b6aea8c3d4192d6c110ec23884a7d9a0783691f1b80440ccd22d6ef1895b6b0eea6ef85f4e999942cf9a075df963dc7d9d3c34dd28bec352be5b7d886e592b15aca202952a25e2b146f42f4ad0503d60b128a1f7159527000bdb8714b9ba031275b04fdb9709bd2d1fbad57ca8bc493156b816668c76083a51c98104f538cb9b4b32983581fb5baf43c7b7c19ece069a48108b3b4872aaef3161f6f081a68020ad7166700fac9b17d954cd292bf3a1304069b66762f27be3a921b4ed33cc3d364c954af5c0ce334cfd9f91c432050614d783f9271662790b1bce99db8afaa8ab8a7fe90f4ed1bb145310b278f7b387b7eb26e05693d6a2fe6a1b6bde40595216a8cf06939a794f93e695306f9e2177926f097430fd42a3e42bc4d5429f946d307293cefa252c3fc627f12f22a69c672c536ceb24984b429e61ad886c98343af44faf2e173d6cacb83954878b9981a015ac988c232986e4d80a933923ddb7d183a20abdb7230b5c358f9f2c1477c1e484772c8b5381d2b2d1ec5
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 0895e3860ace96ecfdf352cfed4a1426d9a468c4
                       e179df5d3f11e205907ed5b794332945d6d57c0f
                       3b4c8c9c343bf6d269a4048d77e0edd446cb5778
                       b3266216e60fb537e895032aa2742954446f8faf
                       9b15f0b937ac7b35821ab1833a1e85d3006f42ad
                       f21822cad313fe4a908c1f787803690edbb6bc97
                       20ffb48b2bd33c9ec45e5a7c6f28d6b01d4a6893
                       df06ef289f94ba98c76b5a5d201d1692116639ca
                       a321178a74d78def173a9e5fb32b6e308839c0ae
                       a1ffe2da0a501162abf5d7f2137153f715bc3dc8
                       cffb7b35ed14153600079bc9a454a97e6cf141d6
                       852d7115c73b07679b13a44d0474f96eafac2db2
                       d65b39d241b4f3968feff177640f58c49cf2425f
                       8583eda9dffd5d75b76557a30a05c2958fb8f305
                       d1746ae90614f75034793caf4d4f71f207b31f46
                       c1142a46f61065946593050770a0a26bd46d4c30
                       8be8c8a801f30703b1e23486ae2889bfcdf6089d
                       df4dd03dc75940dc79247d235632e09dfe57d766
                       c8a3f75e07a838fadb0ef4868d6f009de87ac882
                       d2a9d6b7
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [b7:e5:ab:eb:1a:fa:10:a8:89:d1:36:2e:2a:9e:c1:be:30:0e:9a:51]
            modulus: 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
    public exponent: 10001

] 
2022-04-04 14:09:44.404  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-04 14:09:44.407 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-04 14:09:44.410 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-04 14:09:44.411 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-04 14:09:44.412  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-04 14:09:44.413  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-04 14:09:44.413  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-04 14:09:44.414 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-04 14:09:44.414 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-04 14:09:44.415 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-04 14:09:44.425 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-04 14:09:44.427 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-04 14:09:44.427 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-04 14:09:44.428 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-04 14:09:44.622  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-04 14:09:44.623  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-04 14:09:44.624 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-04 14:09:44.625 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-04 14:09:44.629  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-04 14:09:44.630  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-04 14:09:44.631 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-04 14:09:44.633 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-04 14:09:44.636 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-04 14:09:44.644 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-04 14:09:44.649 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-04 14:09:44.657 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-04 14:09:44.659 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-04 14:09:44.660 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-04 14:09:44.660 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-04 14:09:44.662 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-04 14:09:44.668 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 418035517848075783936831126053155063074648973826
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Apr 04 12:38:09 UTC 2022
           Final Date: Sat Apr 03 12:38:08 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [81:26:af:4e:cf:a3:b5:3f:46:64:ba:cf:38:df:66:55:ae:8c:f8:88]
            modulus: a772b24e0d3f2b6aea8c3d4192d6c110ec23884a7d9a0783691f1b80440ccd22d6ef1895b6b0eea6ef85f4e999942cf9a075df963dc7d9d3c34dd28bec352be5b7d886e592b15aca202952a25e2b146f42f4ad0503d60b128a1f7159527000bdb8714b9ba031275b04fdb9709bd2d1fbad57ca8bc493156b816668c76083a51c98104f538cb9b4b32983581fb5baf43c7b7c19ece069a48108b3b4872aaef3161f6f081a68020ad7166700fac9b17d954cd292bf3a1304069b66762f27be3a921b4ed33cc3d364c954af5c0ce334cfd9f91c432050614d783f9271662790b1bce99db8afaa8ab8a7fe90f4ed1bb145310b278f7b387b7eb26e05693d6a2fe6a1b6bde40595216a8cf06939a794f93e695306f9e2177926f097430fd42a3e42bc4d5429f946d307293cefa252c3fc627f12f22a69c672c536ceb24984b429e61ad886c98343af44faf2e173d6cacb83954878b9981a015ac988c232986e4d80a933923ddb7d183a20abdb7230b5c358f9f2c1477c1e484772c8b5381d2b2d1ec5
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 0895e3860ace96ecfdf352cfed4a1426d9a468c4
                       e179df5d3f11e205907ed5b794332945d6d57c0f
                       3b4c8c9c343bf6d269a4048d77e0edd446cb5778
                       b3266216e60fb537e895032aa2742954446f8faf
                       9b15f0b937ac7b35821ab1833a1e85d3006f42ad
                       f21822cad313fe4a908c1f787803690edbb6bc97
                       20ffb48b2bd33c9ec45e5a7c6f28d6b01d4a6893
                       df06ef289f94ba98c76b5a5d201d1692116639ca
                       a321178a74d78def173a9e5fb32b6e308839c0ae
                       a1ffe2da0a501162abf5d7f2137153f715bc3dc8
                       cffb7b35ed14153600079bc9a454a97e6cf141d6
                       852d7115c73b07679b13a44d0474f96eafac2db2
                       d65b39d241b4f3968feff177640f58c49cf2425f
                       8583eda9dffd5d75b76557a30a05c2958fb8f305
                       d1746ae90614f75034793caf4d4f71f207b31f46
                       c1142a46f61065946593050770a0a26bd46d4c30
                       8be8c8a801f30703b1e23486ae2889bfcdf6089d
                       df4dd03dc75940dc79247d235632e09dfe57d766
                       c8a3f75e07a838fadb0ef4868d6f009de87ac882
                       d2a9d6b7
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [49:38:be:cb:ae:8f:ca:47:69:2a:3a:5f:cc:af:a0:40:a8:ba:c5:b4]
            modulus: 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
    public exponent: 10001

]