Results

By type

          2022-04-29 05:31:11,655 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-04-29 05:31:13,035 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-04-29 05:31:13.898  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Apr 29, 2022 5:31:15 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Apr 29, 2022 5:31:15 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Apr 29, 2022 5:31:15 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Apr 29, 2022 5:31:15 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-04-29 05:31:16.515 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-04-29 05:31:16.793  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-04-29 05:31:16.946  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-04-29 05:31:17.618 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-04-29 05:31:17.621 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
2022-04-29 05:31:17.622 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-04-29 05:31:17.626 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-04-29 05:31:17.664 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
2022-04-29 05:31:17.667 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
	{GET [/docs]}: redirectToUi(HttpServletRequest)
2022-04-29 05:31:17.793 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-04-29 05:31:18.350 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Apr 29, 2022 5:31:19 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-04-29 05:31:19.283  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 8.494 seconds (JVM running for 10.164)
Apr 29, 2022 5:31:40 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-04-29 06:28:24.850  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-29 06:28:24.866 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-29 06:28:24.910 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-04-29 06:28:24.916 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-29 06:28:24.937  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-04-29 06:28:24.940  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-29 06:28:24.942  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-29 06:28:24.943 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-29 06:28:24.943 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-29 06:28:24.948 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-29 06:28:24.954 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-29 06:28:24.958 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-29 06:28:25.007 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-29 06:28:25.014 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-29 06:28:25.015 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-29 06:28:25.019 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-29 06:28:25.752  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-29 06:28:25.755  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-29 06:28:25.755 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-29 06:28:25.757 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-29 06:28:25.767  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-29 06:28:25.768  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-29 06:28:25.768 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-29 06:28:25.769 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-29 06:28:25.769 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-29 06:28:25.799 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-29 06:28:25.799 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-29 06:28:25.800 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-29 06:28:25.813 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-29 06:28:25.814 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-29 06:28:25.814 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-29 06:28:25.817 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-29 06:28:25.857 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 334358462505765134982539560189110634678520689785
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Apr 29 05:09:40 UTC 2022
           Final Date: Wed Apr 28 05:09:39 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ff:bd:20:27:a7:98:20:af:c7:7f:42:4f:c5:df:57:2a:e1:d8:54:21]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 244f5334b0f87a7c579f98916c04c6c80f5a76eb
                       81c1f0a78f3f4c0f3d070d66870c412da7f596bb
                       600b101ea42b6906d6af18153b2dcb12274cc931
                       bb7d4d8ce319078249d64556a0d3934d18ef9b69
                       b28701dc0b5eb83afbe00048468c896073ace92f
                       c264bd9bc7537a644310923d5a954d14eb407b09
                       14fa9b4ced8db2c3416426967225a4da144ed2e8
                       61b9adf022a2bdf1019178a54db2992c47ef1f0c
                       3ba830f9d6b74bdc2b6f0fa6728f33a404226e3d
                       caa6eb9e809e3e4637eac78886032dfbbfb50402
                       63b781b3b5f961e50376d8bf8d7189e6a17365a9
                       f7ce3b48088ebdb237f8cdce685f0eb7b3d93e7a
                       5a110be65abb9bbda8eea5c8f8a8027ba2164219
                       c93a7f4f3ca233298ef446cdbe3ad69a31b450c6
                       503c2614f9bf3b7f4e106214a358c2d7872bc8d9
                       47fc18804b67c0dc088f46b642498d75ba74cdab
                       5f7c2ba04ef349d30b207d00ea8a6510dd45ae75
                       bc2b884cc36e3522e7c4dc6670ce6b2d0263691e
                       1a4941fa49a63e8c847fbb707da27d2abef4c39c
                       ef4ad797
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ac:0e:7a:05:9e:30:fe:c9:99:68:34:95:7e:a9:ea:37:3d:89:df:7a]
            modulus: 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
    public exponent: 10001

] 
2022-04-29 06:28:50.701  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-29 06:28:50.703 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-29 06:28:50.709 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-29 06:28:50.710 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-29 06:28:50.711  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-29 06:28:50.712  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-29 06:28:50.712  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-29 06:28:50.713 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-29 06:28:50.713 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-29 06:28:50.713 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-29 06:28:50.725 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-29 06:28:50.726 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-29 06:28:50.726 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-29 06:28:50.727 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-29 06:28:50.916  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-29 06:28:50.916  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-29 06:28:50.917 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-29 06:28:50.917 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-29 06:28:50.920  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-29 06:28:50.921  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-29 06:28:50.921 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-29 06:28:50.922 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-29 06:28:50.922 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-29 06:28:50.923 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-29 06:28:50.924 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-29 06:28:50.925 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-29 06:28:50.926 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-29 06:28:50.927 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-29 06:28:50.928 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-29 06:28:50.929 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-29 06:28:50.933 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 334358462505765134982539560189110634678520689785
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Apr 29 05:09:40 UTC 2022
           Final Date: Wed Apr 28 05:09:39 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ff:bd:20:27:a7:98:20:af:c7:7f:42:4f:c5:df:57:2a:e1:d8:54:21]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 244f5334b0f87a7c579f98916c04c6c80f5a76eb
                       81c1f0a78f3f4c0f3d070d66870c412da7f596bb
                       600b101ea42b6906d6af18153b2dcb12274cc931
                       bb7d4d8ce319078249d64556a0d3934d18ef9b69
                       b28701dc0b5eb83afbe00048468c896073ace92f
                       c264bd9bc7537a644310923d5a954d14eb407b09
                       14fa9b4ced8db2c3416426967225a4da144ed2e8
                       61b9adf022a2bdf1019178a54db2992c47ef1f0c
                       3ba830f9d6b74bdc2b6f0fa6728f33a404226e3d
                       caa6eb9e809e3e4637eac78886032dfbbfb50402
                       63b781b3b5f961e50376d8bf8d7189e6a17365a9
                       f7ce3b48088ebdb237f8cdce685f0eb7b3d93e7a
                       5a110be65abb9bbda8eea5c8f8a8027ba2164219
                       c93a7f4f3ca233298ef446cdbe3ad69a31b450c6
                       503c2614f9bf3b7f4e106214a358c2d7872bc8d9
                       47fc18804b67c0dc088f46b642498d75ba74cdab
                       5f7c2ba04ef349d30b207d00ea8a6510dd45ae75
                       bc2b884cc36e3522e7c4dc6670ce6b2d0263691e
                       1a4941fa49a63e8c847fbb707da27d2abef4c39c
                       ef4ad797
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [39:ee:e5:47:bc:40:cc:b4:09:25:8d:fe:fa:04:3c:f1:ae:70:8f:34]
            modulus: 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
    public exponent: 10001

] 
2022-04-29 06:30:38.354  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-29 06:30:38.356 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-29 06:30:38.360 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-04-29 06:30:38.363 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-29 06:30:38.364  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-04-29 06:30:38.368  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-29 06:30:38.368  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-29 06:30:38.370 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-29 06:30:38.370 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-29 06:30:38.371 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-29 06:30:38.380 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-29 06:30:38.381 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-29 06:30:38.381 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-29 06:30:38.383 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-29 06:30:38.521  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-29 06:30:38.522  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-29 06:30:38.525 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-29 06:30:38.525 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-29 06:30:38.533  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-29 06:30:38.535  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-29 06:30:38.536 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-29 06:30:38.537 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-29 06:30:38.538 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-29 06:30:38.540 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-29 06:30:38.541 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-29 06:30:38.542 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-29 06:30:38.543 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-29 06:30:38.544 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-29 06:30:38.545 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-29 06:30:38.547 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-29 06:30:38.558 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 334358462505765134982539560189110634678520689785
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Apr 29 05:09:40 UTC 2022
           Final Date: Wed Apr 28 05:09:39 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ff:bd:20:27:a7:98:20:af:c7:7f:42:4f:c5:df:57:2a:e1:d8:54:21]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 244f5334b0f87a7c579f98916c04c6c80f5a76eb
                       81c1f0a78f3f4c0f3d070d66870c412da7f596bb
                       600b101ea42b6906d6af18153b2dcb12274cc931
                       bb7d4d8ce319078249d64556a0d3934d18ef9b69
                       b28701dc0b5eb83afbe00048468c896073ace92f
                       c264bd9bc7537a644310923d5a954d14eb407b09
                       14fa9b4ced8db2c3416426967225a4da144ed2e8
                       61b9adf022a2bdf1019178a54db2992c47ef1f0c
                       3ba830f9d6b74bdc2b6f0fa6728f33a404226e3d
                       caa6eb9e809e3e4637eac78886032dfbbfb50402
                       63b781b3b5f961e50376d8bf8d7189e6a17365a9
                       f7ce3b48088ebdb237f8cdce685f0eb7b3d93e7a
                       5a110be65abb9bbda8eea5c8f8a8027ba2164219
                       c93a7f4f3ca233298ef446cdbe3ad69a31b450c6
                       503c2614f9bf3b7f4e106214a358c2d7872bc8d9
                       47fc18804b67c0dc088f46b642498d75ba74cdab
                       5f7c2ba04ef349d30b207d00ea8a6510dd45ae75
                       bc2b884cc36e3522e7c4dc6670ce6b2d0263691e
                       1a4941fa49a63e8c847fbb707da27d2abef4c39c
                       ef4ad797
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [df:af:60:14:56:a4:9c:53:49:14:a9:2d:f6:41:b9:5f:6b:32:25:56]
            modulus: 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
    public exponent: 10001

] 
2022-04-29 06:31:49.851  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-29 06:31:49.853 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-29 06:31:49.855 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-04-29 06:31:49.856 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-29 06:31:49.863  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-04-29 06:31:49.864  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-29 06:31:49.864  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-29 06:31:49.865 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-29 06:31:49.865 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-29 06:31:49.868 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-29 06:31:49.873 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-29 06:31:49.874 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-29 06:31:49.874 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-29 06:31:49.875 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-29 06:31:50.042  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-29 06:31:50.042  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-29 06:31:50.043 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-29 06:31:50.044 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-29 06:31:50.047  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-29 06:31:50.047  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-29 06:31:50.048 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-29 06:31:50.048 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-29 06:31:50.049 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-29 06:31:50.050 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-29 06:31:50.050 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-29 06:31:50.050 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-29 06:31:50.051 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-29 06:31:50.051 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-29 06:31:50.052 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-29 06:31:50.053 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-29 06:31:50.058 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 334358462505765134982539560189110634678520689785
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Apr 29 05:09:40 UTC 2022
           Final Date: Wed Apr 28 05:09:39 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ff:bd:20:27:a7:98:20:af:c7:7f:42:4f:c5:df:57:2a:e1:d8:54:21]
            modulus: c0cda13ac0ea73b91748380a62b1d0a3ffca1d7e35d1e28b4f4dedfe808c71d28682a45bac039cb00fb2857f55249ed1b45cf0d3e564ecb700de5c7fb34252feddbe72c1c813ac304da49081913fca524cdad1517ea7a3b70278adeb41cec970c8391d4aaa3e61f7af2d1bf790250bb1085aad0ca141359131bdd852b02bb29b8ba18d12f6dc6bc830face98aaf7f3275e04ad2b7764941a1a02642728c1ea05f90ac1c0782779fc94fe51d290418599b6c8b9536c71a89c2633cbd502b2b1580ef2a06112659262f8ee4185f24cddf0e496eed5b78a4843f71ece102209d8f0827a38ac573afdf7087f6ab93065c4db6353c1686f8eb34fde9061272e961ab6a0af4cf21d0c897a922edbd1717b4e7cee1a03ced572dbc8a8c5e55a1cca4311099de341ae64b093ecf58872ce130a0b9e8772b569f87962301947078dbfa6ace275caac1bf5bf4d9dce467a59f4bb71b9dd3c8f29cafb9c7533dc0eab1dee14528531e5d260b863543780ce29f0e1794f18e727e65a5e6a66843092280fb3f3
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 244f5334b0f87a7c579f98916c04c6c80f5a76eb
                       81c1f0a78f3f4c0f3d070d66870c412da7f596bb
                       600b101ea42b6906d6af18153b2dcb12274cc931
                       bb7d4d8ce319078249d64556a0d3934d18ef9b69
                       b28701dc0b5eb83afbe00048468c896073ace92f
                       c264bd9bc7537a644310923d5a954d14eb407b09
                       14fa9b4ced8db2c3416426967225a4da144ed2e8
                       61b9adf022a2bdf1019178a54db2992c47ef1f0c
                       3ba830f9d6b74bdc2b6f0fa6728f33a404226e3d
                       caa6eb9e809e3e4637eac78886032dfbbfb50402
                       63b781b3b5f961e50376d8bf8d7189e6a17365a9
                       f7ce3b48088ebdb237f8cdce685f0eb7b3d93e7a
                       5a110be65abb9bbda8eea5c8f8a8027ba2164219
                       c93a7f4f3ca233298ef446cdbe3ad69a31b450c6
                       503c2614f9bf3b7f4e106214a358c2d7872bc8d9
                       47fc18804b67c0dc088f46b642498d75ba74cdab
                       5f7c2ba04ef349d30b207d00ea8a6510dd45ae75
                       bc2b884cc36e3522e7c4dc6670ce6b2d0263691e
                       1a4941fa49a63e8c847fbb707da27d2abef4c39c
                       ef4ad797
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [3d:46:57:cb:8a:7d:7e:44:2f:89:35:7e:05:c0:a9:1d:2e:ff:78:52]
            modulus: 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
    public exponent: 10001

] 
2022-04-29 06:33:40.191  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-29 06:33:40.194 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-29 06:33:40.196 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-29 06:33:40.197 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-29 06:33:40.197  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-29 06:33:40.198  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-29 06:33:40.199  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-29 06:33:40.199 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-29 06:33:40.200 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-29 06:33:40.200 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-29 06:33:40.205 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-29 06:33:40.206 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-29 06:33:40.206 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-29 06:33:40.207 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-29 06:33:40.360  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-29 06:33:40.360  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-29 06:33:40.361 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-29 06:33:40.361 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-29 06:33:40.363  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-29 06:33:40.364  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-29 06:33:40.364 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-29 06:33:40.365 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-29 06:33:40.365 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-29 06:33:40.366 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-29 06:33:40.366 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-29 06:33:40.366 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-29 06:33:40.367 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-29 06:33:40.368 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-29 06:33:40.368 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-29 06:33:40.369 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-29 06:33:40.373 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 334358462505765134982539560189110634678520689785
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Apr 29 05:09:40 UTC 2022
           Final Date: Wed Apr 28 05:09:39 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ff:bd:20:27:a7:98:20:af:c7:7f:42:4f:c5:df:57:2a:e1:d8:54:21]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 244f5334b0f87a7c579f98916c04c6c80f5a76eb
                       81c1f0a78f3f4c0f3d070d66870c412da7f596bb
                       600b101ea42b6906d6af18153b2dcb12274cc931
                       bb7d4d8ce319078249d64556a0d3934d18ef9b69
                       b28701dc0b5eb83afbe00048468c896073ace92f
                       c264bd9bc7537a644310923d5a954d14eb407b09
                       14fa9b4ced8db2c3416426967225a4da144ed2e8
                       61b9adf022a2bdf1019178a54db2992c47ef1f0c
                       3ba830f9d6b74bdc2b6f0fa6728f33a404226e3d
                       caa6eb9e809e3e4637eac78886032dfbbfb50402
                       63b781b3b5f961e50376d8bf8d7189e6a17365a9
                       f7ce3b48088ebdb237f8cdce685f0eb7b3d93e7a
                       5a110be65abb9bbda8eea5c8f8a8027ba2164219
                       c93a7f4f3ca233298ef446cdbe3ad69a31b450c6
                       503c2614f9bf3b7f4e106214a358c2d7872bc8d9
                       47fc18804b67c0dc088f46b642498d75ba74cdab
                       5f7c2ba04ef349d30b207d00ea8a6510dd45ae75
                       bc2b884cc36e3522e7c4dc6670ce6b2d0263691e
                       1a4941fa49a63e8c847fbb707da27d2abef4c39c
                       ef4ad797
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [eb:7f:d1:5c:05:ac:da:d9:2f:69:0c:16:45:e9:16:d1:30:a1:a4:3c]
            modulus: c6450c82a2d615fb72653f73e5a66ba635eca1391aa7afaa85c2de8daf56df3da4dd648d5b360e2f388264e27c9df85a2a2cfc1673308e09f9479423919f7b18f110f13c081f5046f82b4dae06d03d1e8424e980ac575465cc27f76dd60401f3a65188cf23f73385e6480c0587ef7334322a25e7375d9884192a29a73238d49ca3ace86dd2600c19fdc2c252d51e56b52f98a452b2526a633e3bd35b1ea030947d9aa62d7a5420cab9d6b0c4fafd763dc9b36d9d24912f7e5deba5c700a6c02b9f03722e8d1a1c686d424e78801386f1dce318d10f9d056e63e675d833e09c0b753c1f1b6b1a2309c214b99bf93fb1c3c4874d9ade980a6e92e3bc921b8d9333
    public exponent: 10001

] 
2022-04-29 06:33:58.026  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-29 06:33:58.027 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-29 06:33:58.029 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-04-29 06:33:58.029 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-29 06:33:58.030  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-04-29 06:33:58.031  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-29 06:33:58.031  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-29 06:33:58.031 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-29 06:33:58.032 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-29 06:33:58.032 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-29 06:33:58.039 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-29 06:33:58.040 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-29 06:33:58.040 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-29 06:33:58.041 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-29 06:33:58.142  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-29 06:33:58.142  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-29 06:33:58.143 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-29 06:33:58.143 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-29 06:33:58.144  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-29 06:33:58.145  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-29 06:33:58.145 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-29 06:33:58.146 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-29 06:33:58.146 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-29 06:33:58.147 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-29 06:33:58.147 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-29 06:33:58.147 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-29 06:33:58.148 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-29 06:33:58.149 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-29 06:33:58.149 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-29 06:33:58.150 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-29 06:33:58.154 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 334358462505765134982539560189110634678520689785
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Apr 29 05:09:40 UTC 2022
           Final Date: Wed Apr 28 05:09:39 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ff:bd:20:27:a7:98:20:af:c7:7f:42:4f:c5:df:57:2a:e1:d8:54:21]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 244f5334b0f87a7c579f98916c04c6c80f5a76eb
                       81c1f0a78f3f4c0f3d070d66870c412da7f596bb
                       600b101ea42b6906d6af18153b2dcb12274cc931
                       bb7d4d8ce319078249d64556a0d3934d18ef9b69
                       b28701dc0b5eb83afbe00048468c896073ace92f
                       c264bd9bc7537a644310923d5a954d14eb407b09
                       14fa9b4ced8db2c3416426967225a4da144ed2e8
                       61b9adf022a2bdf1019178a54db2992c47ef1f0c
                       3ba830f9d6b74bdc2b6f0fa6728f33a404226e3d
                       caa6eb9e809e3e4637eac78886032dfbbfb50402
                       63b781b3b5f961e50376d8bf8d7189e6a17365a9
                       f7ce3b48088ebdb237f8cdce685f0eb7b3d93e7a
                       5a110be65abb9bbda8eea5c8f8a8027ba2164219
                       c93a7f4f3ca233298ef446cdbe3ad69a31b450c6
                       503c2614f9bf3b7f4e106214a358c2d7872bc8d9
                       47fc18804b67c0dc088f46b642498d75ba74cdab
                       5f7c2ba04ef349d30b207d00ea8a6510dd45ae75
                       bc2b884cc36e3522e7c4dc6670ce6b2d0263691e
                       1a4941fa49a63e8c847fbb707da27d2abef4c39c
                       ef4ad797
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [be:58:25:e6:c7:23:b1:8a:dd:e4:e1:db:8f:fb:49:22:38:b6:8e:ee]
            modulus: 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
    public exponent: 10001

] 
2022-04-29 06:34:14.974  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-29 06:34:14.975 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-29 06:34:14.976 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-04-29 06:34:14.977 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-29 06:34:14.977  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-04-29 06:34:14.978  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-29 06:34:14.978  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-29 06:34:14.979 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-29 06:34:14.979 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-29 06:34:14.980 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-29 06:34:14.984 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-29 06:34:14.985 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-29 06:34:14.985 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-29 06:34:14.985 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-29 06:34:15.118  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-29 06:34:15.119  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-29 06:34:15.120 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-29 06:34:15.120 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-29 06:34:15.122  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-29 06:34:15.123  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-29 06:34:15.124 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-29 06:34:15.124 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-29 06:34:15.124 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-29 06:34:15.125 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-29 06:34:15.126 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-29 06:34:15.127 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-29 06:34:15.127 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-29 06:34:15.128 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-29 06:34:15.128 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-29 06:34:15.129 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-29 06:34:15.133 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 334358462505765134982539560189110634678520689785
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Apr 29 05:09:40 UTC 2022
           Final Date: Wed Apr 28 05:09:39 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ff:bd:20:27:a7:98:20:af:c7:7f:42:4f:c5:df:57:2a:e1:d8:54:21]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 244f5334b0f87a7c579f98916c04c6c80f5a76eb
                       81c1f0a78f3f4c0f3d070d66870c412da7f596bb
                       600b101ea42b6906d6af18153b2dcb12274cc931
                       bb7d4d8ce319078249d64556a0d3934d18ef9b69
                       b28701dc0b5eb83afbe00048468c896073ace92f
                       c264bd9bc7537a644310923d5a954d14eb407b09
                       14fa9b4ced8db2c3416426967225a4da144ed2e8
                       61b9adf022a2bdf1019178a54db2992c47ef1f0c
                       3ba830f9d6b74bdc2b6f0fa6728f33a404226e3d
                       caa6eb9e809e3e4637eac78886032dfbbfb50402
                       63b781b3b5f961e50376d8bf8d7189e6a17365a9
                       f7ce3b48088ebdb237f8cdce685f0eb7b3d93e7a
                       5a110be65abb9bbda8eea5c8f8a8027ba2164219
                       c93a7f4f3ca233298ef446cdbe3ad69a31b450c6
                       503c2614f9bf3b7f4e106214a358c2d7872bc8d9
                       47fc18804b67c0dc088f46b642498d75ba74cdab
                       5f7c2ba04ef349d30b207d00ea8a6510dd45ae75
                       bc2b884cc36e3522e7c4dc6670ce6b2d0263691e
                       1a4941fa49a63e8c847fbb707da27d2abef4c39c
                       ef4ad797
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [08:70:03:72:48:02:57:87:3d:ed:b1:6f:0e:1d:b7:a9:02:19:cb:c1]
            modulus: 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
    public exponent: 10001

] 
2022-04-29 06:51:16.408  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-29 06:51:16.412 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-29 06:51:16.415 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-04-29 06:51:16.419 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-29 06:51:16.420  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-04-29 06:51:16.421  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-29 06:51:16.421  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-29 06:51:16.422 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-29 06:51:16.422 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-29 06:51:16.423 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-29 06:51:16.433 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-29 06:51:16.434 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-29 06:51:16.435 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-29 06:51:16.435 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-29 06:51:16.701  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-29 06:51:16.702  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-29 06:51:16.702 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-29 06:51:16.702 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-29 06:51:16.704  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-29 06:51:16.706  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-29 06:51:16.706 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-29 06:51:16.707 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-29 06:51:16.707 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-29 06:51:16.708 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-29 06:51:16.708 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-29 06:51:16.708 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-29 06:51:16.709 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-29 06:51:16.709 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-29 06:51:16.710 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-29 06:51:16.710 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-29 06:51:16.716 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 334358462505765134982539560189110634678520689785
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Apr 29 05:09:40 UTC 2022
           Final Date: Wed Apr 28 05:09:39 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ff:bd:20:27:a7:98:20:af:c7:7f:42:4f:c5:df:57:2a:e1:d8:54:21]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 244f5334b0f87a7c579f98916c04c6c80f5a76eb
                       81c1f0a78f3f4c0f3d070d66870c412da7f596bb
                       600b101ea42b6906d6af18153b2dcb12274cc931
                       bb7d4d8ce319078249d64556a0d3934d18ef9b69
                       b28701dc0b5eb83afbe00048468c896073ace92f
                       c264bd9bc7537a644310923d5a954d14eb407b09
                       14fa9b4ced8db2c3416426967225a4da144ed2e8
                       61b9adf022a2bdf1019178a54db2992c47ef1f0c
                       3ba830f9d6b74bdc2b6f0fa6728f33a404226e3d
                       caa6eb9e809e3e4637eac78886032dfbbfb50402
                       63b781b3b5f961e50376d8bf8d7189e6a17365a9
                       f7ce3b48088ebdb237f8cdce685f0eb7b3d93e7a
                       5a110be65abb9bbda8eea5c8f8a8027ba2164219
                       c93a7f4f3ca233298ef446cdbe3ad69a31b450c6
                       503c2614f9bf3b7f4e106214a358c2d7872bc8d9
                       47fc18804b67c0dc088f46b642498d75ba74cdab
                       5f7c2ba04ef349d30b207d00ea8a6510dd45ae75
                       bc2b884cc36e3522e7c4dc6670ce6b2d0263691e
                       1a4941fa49a63e8c847fbb707da27d2abef4c39c
                       ef4ad797
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [71:37:9b:69:45:e8:e7:a3:0a:a1:d5:c2:fa:67:54:2e:f0:de:3f:61]
            modulus: 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
    public exponent: 10001

] 
2022-04-29 06:51:33.369  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-29 06:51:33.372 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-29 06:51:33.373 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-04-29 06:51:33.374 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-29 06:51:33.375  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-04-29 06:51:33.375  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-29 06:51:33.376  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-29 06:51:33.376 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-29 06:51:33.376 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-29 06:51:33.377 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-29 06:51:33.383 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-29 06:51:33.384 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-29 06:51:33.384 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-29 06:51:33.385 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-29 06:51:33.507  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-29 06:51:33.507  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-29 06:51:33.508 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-29 06:51:33.508 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-29 06:51:33.510  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-29 06:51:33.510  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-29 06:51:33.511 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-29 06:51:33.511 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-29 06:51:33.511 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-29 06:51:33.512 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-29 06:51:33.512 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-29 06:51:33.513 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-29 06:51:33.514 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-29 06:51:33.514 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-29 06:51:33.514 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-29 06:51:33.515 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-29 06:51:33.519 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 334358462505765134982539560189110634678520689785
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Apr 29 05:09:40 UTC 2022
           Final Date: Wed Apr 28 05:09:39 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ff:bd:20:27:a7:98:20:af:c7:7f:42:4f:c5:df:57:2a:e1:d8:54:21]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 244f5334b0f87a7c579f98916c04c6c80f5a76eb
                       81c1f0a78f3f4c0f3d070d66870c412da7f596bb
                       600b101ea42b6906d6af18153b2dcb12274cc931
                       bb7d4d8ce319078249d64556a0d3934d18ef9b69
                       b28701dc0b5eb83afbe00048468c896073ace92f
                       c264bd9bc7537a644310923d5a954d14eb407b09
                       14fa9b4ced8db2c3416426967225a4da144ed2e8
                       61b9adf022a2bdf1019178a54db2992c47ef1f0c
                       3ba830f9d6b74bdc2b6f0fa6728f33a404226e3d
                       caa6eb9e809e3e4637eac78886032dfbbfb50402
                       63b781b3b5f961e50376d8bf8d7189e6a17365a9
                       f7ce3b48088ebdb237f8cdce685f0eb7b3d93e7a
                       5a110be65abb9bbda8eea5c8f8a8027ba2164219
                       c93a7f4f3ca233298ef446cdbe3ad69a31b450c6
                       503c2614f9bf3b7f4e106214a358c2d7872bc8d9
                       47fc18804b67c0dc088f46b642498d75ba74cdab
                       5f7c2ba04ef349d30b207d00ea8a6510dd45ae75
                       bc2b884cc36e3522e7c4dc6670ce6b2d0263691e
                       1a4941fa49a63e8c847fbb707da27d2abef4c39c
                       ef4ad797
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [1f:2f:eb:d5:37:88:38:e9:91:9f:37:4b:53:e3:e2:b9:e6:56:e5:66]
            modulus: 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
    public exponent: 10001

]