Results

By type

          2022-10-02 05:19:54,202 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-10-02 05:19:56,065 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-10-02 05:19:57.186  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Oct 02, 2022 5:20:00 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Oct 02, 2022 5:20:00 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Oct 02, 2022 5:20:00 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Oct 02, 2022 5:20:00 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-10-02 05:20:00.908 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-10-02 05:20:01.361  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-10-02 05:20:01.616  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-10-02 05:20:02.821 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-10-02 05:20:02.825 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
2022-10-02 05:20:02.827 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-10-02 05:20:02.833 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-10-02 05:20:02.888 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2022-10-02 05:20:02.901 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
	{GET [/docs]}: redirectToUi(HttpServletRequest)
2022-10-02 05:20:03.112 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-10-02 05:20:04.220 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Oct 02, 2022 5:20:05 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-10-02 05:20:06.022  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 13.39 seconds (JVM running for 16.059)
Oct 02, 2022 5:20:27 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-10-02 05:21:07.309  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-10-02 05:21:07.325 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-10-02 05:21:07.382 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-10-02 05:21:07.386 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-10-02 05:21:07.419  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-10-02 05:21:07.422  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-10-02 05:21:07.424  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-10-02 05:21:07.427 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-10-02 05:21:07.428 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-02 05:21:07.434 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-10-02 05:21:07.449 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-10-02 05:21:07.457 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-10-02 05:21:07.532 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-10-02 05:21:07.541 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-02 05:21:07.542 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-02 05:21:07.546 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-02 05:21:08.717  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-10-02 05:21:08.721  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-10-02 05:21:08.729 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-10-02 05:21:08.751 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-02 05:21:08.777  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-10-02 05:21:08.779  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-10-02 05:21:08.781 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-02 05:21:08.782 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-02 05:21:08.783 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-02 05:21:08.821 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-02 05:21:08.821 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-02 05:21:08.822 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-02 05:21:08.829 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-02 05:21:08.830 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-02 05:21:08.831 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-02 05:21:08.834 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-10-02 05:21:08.950 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 669603842897259882444202286883808665035402824097
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Oct 02 05:15:34 UTC 2022
           Final Date: Fri Oct 01 05:15:33 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [50:5e:11:47:9e:d8:51:4d:22:7c:ab:ba:3e:0c:f2:9b:fd:19:4c:ff],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: af8150831321bb24dddc2bd076360dc584f4f786
                       da81b2c6291f0ada127beada36bd027025a8f0e4
                       a27903bfb523e01e956003e0212b58ca919170fc
                       0db73a1ec9f80bfc0b82cc321ca98e981ec4b494
                       fbdf59f47a9e776cc2d2b39af57344ad2e6d85c5
                       622c1d6cef0e059a7c26ff0ee32e6ad21b96c31f
                       c68827d8a795e89c665c429818694ab7f6b7f645
                       7e1c18be47726bc17e2faa6631e472579c4d951e
                       978acfd76253c28f7d14c22c60bef8a233417334
                       e58cf0034ef0767b2e10d4e556ed59ab1159e194
                       c8a97a3d4874ea409fb9a0ebe105e0207b4f09f4
                       5c2478457956e0fb69d0d27c7688c8762fc5621a
                       ab914c5ba7ca974d7bb1c98af92bef093cae347b
                       5dd16b010c1f3269cd613999110c2b023e9cd580
                       f2f8e57ec063a205abc44816fc87de5894debd57
                       6a19f72f6739ba393b47a8f5dd053e7939397cd5
                       3e1ec84aff8f11f07e72266621acff595a5b70c8
                       99ddf0402abbda49dbd34d6f0b7df39db5ace39c
                       aac20ae65b90598e86e03fa943d3641ffab9bfc1
                       ab00b713
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [32:03:e5:1e:ca:8a:6e:77:67:64:72:7f:3f:9f:b3:4f:0c:03:12:74],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-10-02 06:43:15.228  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-10-02 06:43:15.236 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-10-02 06:43:15.241 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-10-02 06:43:15.242 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-10-02 06:43:15.243  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-10-02 06:43:15.244  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-10-02 06:43:15.244  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-10-02 06:43:15.245 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-10-02 06:43:15.246 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-10-02 06:43:15.246 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-10-02 06:43:15.252 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-10-02 06:43:15.254 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-02 06:43:15.254 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-02 06:43:15.255 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-02 06:43:15.687  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-10-02 06:43:15.689  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-10-02 06:43:15.690 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-10-02 06:43:15.691 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-02 06:43:15.706  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-10-02 06:43:15.709  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-10-02 06:43:15.711 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-02 06:43:15.712 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-02 06:43:15.714 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-02 06:43:15.719 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-02 06:43:15.720 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-02 06:43:15.722 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-02 06:43:15.725 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-02 06:43:15.726 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-02 06:43:15.727 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-02 06:43:15.731 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-10-02 06:43:15.744 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 669603842897259882444202286883808665035402824097
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Oct 02 05:15:34 UTC 2022
           Final Date: Fri Oct 01 05:15:33 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [50:5e:11:47:9e:d8:51:4d:22:7c:ab:ba:3e:0c:f2:9b:fd:19:4c:ff],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: af8150831321bb24dddc2bd076360dc584f4f786
                       da81b2c6291f0ada127beada36bd027025a8f0e4
                       a27903bfb523e01e956003e0212b58ca919170fc
                       0db73a1ec9f80bfc0b82cc321ca98e981ec4b494
                       fbdf59f47a9e776cc2d2b39af57344ad2e6d85c5
                       622c1d6cef0e059a7c26ff0ee32e6ad21b96c31f
                       c68827d8a795e89c665c429818694ab7f6b7f645
                       7e1c18be47726bc17e2faa6631e472579c4d951e
                       978acfd76253c28f7d14c22c60bef8a233417334
                       e58cf0034ef0767b2e10d4e556ed59ab1159e194
                       c8a97a3d4874ea409fb9a0ebe105e0207b4f09f4
                       5c2478457956e0fb69d0d27c7688c8762fc5621a
                       ab914c5ba7ca974d7bb1c98af92bef093cae347b
                       5dd16b010c1f3269cd613999110c2b023e9cd580
                       f2f8e57ec063a205abc44816fc87de5894debd57
                       6a19f72f6739ba393b47a8f5dd053e7939397cd5
                       3e1ec84aff8f11f07e72266621acff595a5b70c8
                       99ddf0402abbda49dbd34d6f0b7df39db5ace39c
                       aac20ae65b90598e86e03fa943d3641ffab9bfc1
                       ab00b713
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [24:0a:13:2e:f9:d3:2c:f6:9f:4b:19:15:0e:b6:5b:3d:79:32:ab:cb],[56:66:d1:a4]
        modulus: a24e233dc0bf7ac32244fbe0db9f4cdbfbd466c2459b685841f7b4fe4baf30e5ba466ab4e57f5b0963627428e5dcc824cba861b4ca6e26b7147e02414c56227f9749b38c617799a23aab7b8ea406ca376e83b1deb97c405fc38b1648f8363276947ecc550209067f80ad8730f76ab891f61a6397e435c203042e9bd2e3d0bb337c15cfef0ae8850abeb8a1a52e5d0341f38443f04de09d287b69cfaab4b62e0a698b4635ece5b7ae559e770ccb9bb8d86dee9a6a5ab21f34d69d538c3147938e66cf380539885eb9dbf45f500693312566edb7803a38275724099cac4e7cb1ffe933f541c31255d7b1b660f5595a28caf95248661d86225dc9daafe4608924d3
public exponent: 10001

] 
2022-10-02 06:48:01.846  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-10-02 06:48:01.854 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-10-02 06:48:01.864 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-10-02 06:48:01.868 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-10-02 06:48:01.870  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-10-02 06:48:01.871  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-10-02 06:48:01.872  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-10-02 06:48:01.873 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-10-02 06:48:01.874 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-10-02 06:48:01.876 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-10-02 06:48:01.885 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-10-02 06:48:01.886 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-02 06:48:01.886 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-02 06:48:01.888 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-02 06:48:02.164  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-10-02 06:48:02.165  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-10-02 06:48:02.165 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-10-02 06:48:02.166 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-02 06:48:02.168  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-10-02 06:48:02.169  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-10-02 06:48:02.170 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-02 06:48:02.170 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-02 06:48:02.170 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-02 06:48:02.172 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-02 06:48:02.172 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-02 06:48:02.172 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-02 06:48:02.173 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-02 06:48:02.174 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-02 06:48:02.174 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-02 06:48:02.175 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-10-02 06:48:02.179 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 669603842897259882444202286883808665035402824097
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Oct 02 05:15:34 UTC 2022
           Final Date: Fri Oct 01 05:15:33 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [50:5e:11:47:9e:d8:51:4d:22:7c:ab:ba:3e:0c:f2:9b:fd:19:4c:ff],[56:66:d1:a4]
        modulus: d7d3869743e394b7de20c855be1f9e65c5d911a6426c5bedfc5981b5b06596245247bdb0a2e9d3446a75d8fd6ed3a504daa9a90e3c65d4e33dae8557ed1b09a296041c5cf72cf8a6b4099efcc659bf0b3c5b32b73b0a156ca255226f94d2e8c9e561337cc8dbd3c3e6105088c9fd67701518896777d785078179fb04cd4a801f1e54fad15e6d25990907b8aa0e76f8443ed9256494307a31f33917b25bf0f1302eb0098b4b8901b5f8aa654772320049f61e92761c8a1c874408bc8abcd5acb8db26b8edbfe334a43468e5a5de2b72e70d7ab7f8817d0affba5655fd8a09ade34c5f85a784bc3e5b481073a27fc19351637db2b8550ba07529812ff5e8ea553ca2b258a378da069a5b087e643d96d08b783ec3424b9ac9f7e4f9c4288d0b854c5b6e6c6b1993e49ef8b2a23003c672f98e018d83ab2469152c5daabbe8078aacdde211fefc68ddade4d99b5096e16d90e72605ef56afc1b063c4e8b8f4e90464eb90d1be75ed105eba2386e60371f84b8cd05a8179cb80b4fbf7369835698d2d
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: af8150831321bb24dddc2bd076360dc584f4f786
                       da81b2c6291f0ada127beada36bd027025a8f0e4
                       a27903bfb523e01e956003e0212b58ca919170fc
                       0db73a1ec9f80bfc0b82cc321ca98e981ec4b494
                       fbdf59f47a9e776cc2d2b39af57344ad2e6d85c5
                       622c1d6cef0e059a7c26ff0ee32e6ad21b96c31f
                       c68827d8a795e89c665c429818694ab7f6b7f645
                       7e1c18be47726bc17e2faa6631e472579c4d951e
                       978acfd76253c28f7d14c22c60bef8a233417334
                       e58cf0034ef0767b2e10d4e556ed59ab1159e194
                       c8a97a3d4874ea409fb9a0ebe105e0207b4f09f4
                       5c2478457956e0fb69d0d27c7688c8762fc5621a
                       ab914c5ba7ca974d7bb1c98af92bef093cae347b
                       5dd16b010c1f3269cd613999110c2b023e9cd580
                       f2f8e57ec063a205abc44816fc87de5894debd57
                       6a19f72f6739ba393b47a8f5dd053e7939397cd5
                       3e1ec84aff8f11f07e72266621acff595a5b70c8
                       99ddf0402abbda49dbd34d6f0b7df39db5ace39c
                       aac20ae65b90598e86e03fa943d3641ffab9bfc1
                       ab00b713
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [3e:0b:18:60:ae:98:64:56:b1:b7:ca:ea:34:1c:1c:36:9f:9a:20:f1],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-10-02 06:49:20.010  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-10-02 06:49:20.012 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-10-02 06:49:20.013 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-10-02 06:49:20.014 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-10-02 06:49:20.015  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-10-02 06:49:20.015  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-10-02 06:49:20.016  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-10-02 06:49:20.016 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-10-02 06:49:20.017 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-10-02 06:49:20.017 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-10-02 06:49:20.021 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-10-02 06:49:20.022 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-02 06:49:20.022 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-02 06:49:20.023 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-02 06:49:20.187  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-10-02 06:49:20.188  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-10-02 06:49:20.188 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-10-02 06:49:20.188 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-02 06:49:20.190  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-10-02 06:49:20.191  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-10-02 06:49:20.191 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-02 06:49:20.192 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-02 06:49:20.192 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-02 06:49:20.192 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-02 06:49:20.193 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-02 06:49:20.193 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-02 06:49:20.194 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-02 06:49:20.194 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-02 06:49:20.195 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-02 06:49:20.196 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-10-02 06:49:20.200 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 669603842897259882444202286883808665035402824097
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Oct 02 05:15:34 UTC 2022
           Final Date: Fri Oct 01 05:15:33 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [50:5e:11:47:9e:d8:51:4d:22:7c:ab:ba:3e:0c:f2:9b:fd:19:4c:ff],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: af8150831321bb24dddc2bd076360dc584f4f786
                       da81b2c6291f0ada127beada36bd027025a8f0e4
                       a27903bfb523e01e956003e0212b58ca919170fc
                       0db73a1ec9f80bfc0b82cc321ca98e981ec4b494
                       fbdf59f47a9e776cc2d2b39af57344ad2e6d85c5
                       622c1d6cef0e059a7c26ff0ee32e6ad21b96c31f
                       c68827d8a795e89c665c429818694ab7f6b7f645
                       7e1c18be47726bc17e2faa6631e472579c4d951e
                       978acfd76253c28f7d14c22c60bef8a233417334
                       e58cf0034ef0767b2e10d4e556ed59ab1159e194
                       c8a97a3d4874ea409fb9a0ebe105e0207b4f09f4
                       5c2478457956e0fb69d0d27c7688c8762fc5621a
                       ab914c5ba7ca974d7bb1c98af92bef093cae347b
                       5dd16b010c1f3269cd613999110c2b023e9cd580
                       f2f8e57ec063a205abc44816fc87de5894debd57
                       6a19f72f6739ba393b47a8f5dd053e7939397cd5
                       3e1ec84aff8f11f07e72266621acff595a5b70c8
                       99ddf0402abbda49dbd34d6f0b7df39db5ace39c
                       aac20ae65b90598e86e03fa943d3641ffab9bfc1
                       ab00b713
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ad:22:bb:f3:47:80:3d:4e:23:81:d2:6e:c3:8a:b9:19:db:d3:5c:ae],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-10-02 06:50:21.859  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-10-02 06:50:21.862 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-10-02 06:50:21.866 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-10-02 06:50:21.867 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-10-02 06:50:21.868  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-10-02 06:50:21.869  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-10-02 06:50:21.870  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-10-02 06:50:21.870 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-10-02 06:50:21.872 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-10-02 06:50:21.872 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-10-02 06:50:21.879 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-10-02 06:50:21.881 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-02 06:50:21.881 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-02 06:50:21.882 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-02 06:50:22.092  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-10-02 06:50:22.093  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-10-02 06:50:22.094 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-10-02 06:50:22.094 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-02 06:50:22.096  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-10-02 06:50:22.097  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-10-02 06:50:22.098 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-02 06:50:22.098 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-02 06:50:22.099 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-02 06:50:22.100 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-02 06:50:22.101 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-02 06:50:22.101 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-02 06:50:22.102 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-02 06:50:22.102 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-02 06:50:22.103 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-02 06:50:22.104 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-10-02 06:50:22.108 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 669603842897259882444202286883808665035402824097
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Oct 02 05:15:34 UTC 2022
           Final Date: Fri Oct 01 05:15:33 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [50:5e:11:47:9e:d8:51:4d:22:7c:ab:ba:3e:0c:f2:9b:fd:19:4c:ff],[56:66:d1:a4]
        modulus: d7d3869743e394b7de20c855be1f9e65c5d911a6426c5bedfc5981b5b06596245247bdb0a2e9d3446a75d8fd6ed3a504daa9a90e3c65d4e33dae8557ed1b09a296041c5cf72cf8a6b4099efcc659bf0b3c5b32b73b0a156ca255226f94d2e8c9e561337cc8dbd3c3e6105088c9fd67701518896777d785078179fb04cd4a801f1e54fad15e6d25990907b8aa0e76f8443ed9256494307a31f33917b25bf0f1302eb0098b4b8901b5f8aa654772320049f61e92761c8a1c874408bc8abcd5acb8db26b8edbfe334a43468e5a5de2b72e70d7ab7f8817d0affba5655fd8a09ade34c5f85a784bc3e5b481073a27fc19351637db2b8550ba07529812ff5e8ea553ca2b258a378da069a5b087e643d96d08b783ec3424b9ac9f7e4f9c4288d0b854c5b6e6c6b1993e49ef8b2a23003c672f98e018d83ab2469152c5daabbe8078aacdde211fefc68ddade4d99b5096e16d90e72605ef56afc1b063c4e8b8f4e90464eb90d1be75ed105eba2386e60371f84b8cd05a8179cb80b4fbf7369835698d2d
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: af8150831321bb24dddc2bd076360dc584f4f786
                       da81b2c6291f0ada127beada36bd027025a8f0e4
                       a27903bfb523e01e956003e0212b58ca919170fc
                       0db73a1ec9f80bfc0b82cc321ca98e981ec4b494
                       fbdf59f47a9e776cc2d2b39af57344ad2e6d85c5
                       622c1d6cef0e059a7c26ff0ee32e6ad21b96c31f
                       c68827d8a795e89c665c429818694ab7f6b7f645
                       7e1c18be47726bc17e2faa6631e472579c4d951e
                       978acfd76253c28f7d14c22c60bef8a233417334
                       e58cf0034ef0767b2e10d4e556ed59ab1159e194
                       c8a97a3d4874ea409fb9a0ebe105e0207b4f09f4
                       5c2478457956e0fb69d0d27c7688c8762fc5621a
                       ab914c5ba7ca974d7bb1c98af92bef093cae347b
                       5dd16b010c1f3269cd613999110c2b023e9cd580
                       f2f8e57ec063a205abc44816fc87de5894debd57
                       6a19f72f6739ba393b47a8f5dd053e7939397cd5
                       3e1ec84aff8f11f07e72266621acff595a5b70c8
                       99ddf0402abbda49dbd34d6f0b7df39db5ace39c
                       aac20ae65b90598e86e03fa943d3641ffab9bfc1
                       ab00b713
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [e1:5b:e2:7b:6f:ce:05:51:95:e2:3a:a9:5d:46:aa:b9:b0:93:cc:9a],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-10-02 06:52:28.218  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-10-02 06:52:28.220 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-10-02 06:52:28.222 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-10-02 06:52:28.224 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-10-02 06:52:28.225  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-10-02 06:52:28.226  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-10-02 06:52:28.226  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-10-02 06:52:28.226 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-10-02 06:52:28.227 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-10-02 06:52:28.228 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-10-02 06:52:28.235 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-10-02 06:52:28.237 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-02 06:52:28.237 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-02 06:52:28.238 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-02 06:52:28.447  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-10-02 06:52:28.448  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-10-02 06:52:28.452 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-10-02 06:52:28.452 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-02 06:52:28.455  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-10-02 06:52:28.455  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-10-02 06:52:28.457 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-02 06:52:28.457 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-02 06:52:28.458 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-02 06:52:28.459 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-02 06:52:28.459 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-02 06:52:28.459 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-02 06:52:28.460 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-02 06:52:28.460 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-02 06:52:28.461 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-02 06:52:28.463 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-10-02 06:52:28.469 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 669603842897259882444202286883808665035402824097
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Oct 02 05:15:34 UTC 2022
           Final Date: Fri Oct 01 05:15:33 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [50:5e:11:47:9e:d8:51:4d:22:7c:ab:ba:3e:0c:f2:9b:fd:19:4c:ff],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: af8150831321bb24dddc2bd076360dc584f4f786
                       da81b2c6291f0ada127beada36bd027025a8f0e4
                       a27903bfb523e01e956003e0212b58ca919170fc
                       0db73a1ec9f80bfc0b82cc321ca98e981ec4b494
                       fbdf59f47a9e776cc2d2b39af57344ad2e6d85c5
                       622c1d6cef0e059a7c26ff0ee32e6ad21b96c31f
                       c68827d8a795e89c665c429818694ab7f6b7f645
                       7e1c18be47726bc17e2faa6631e472579c4d951e
                       978acfd76253c28f7d14c22c60bef8a233417334
                       e58cf0034ef0767b2e10d4e556ed59ab1159e194
                       c8a97a3d4874ea409fb9a0ebe105e0207b4f09f4
                       5c2478457956e0fb69d0d27c7688c8762fc5621a
                       ab914c5ba7ca974d7bb1c98af92bef093cae347b
                       5dd16b010c1f3269cd613999110c2b023e9cd580
                       f2f8e57ec063a205abc44816fc87de5894debd57
                       6a19f72f6739ba393b47a8f5dd053e7939397cd5
                       3e1ec84aff8f11f07e72266621acff595a5b70c8
                       99ddf0402abbda49dbd34d6f0b7df39db5ace39c
                       aac20ae65b90598e86e03fa943d3641ffab9bfc1
                       ab00b713
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [48:03:5c:c0:1e:c5:cc:a4:b9:d8:a9:29:a3:fd:8d:36:32:e9:07:8c],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-10-02 06:58:15.300  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-10-02 06:58:15.303 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-10-02 06:58:15.306 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-10-02 06:58:15.310 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-10-02 06:58:15.313  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-10-02 06:58:15.314  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-10-02 06:58:15.314  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-10-02 06:58:15.314 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-10-02 06:58:15.315 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-10-02 06:58:15.316 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-10-02 06:58:15.321 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-10-02 06:58:15.323 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-02 06:58:15.323 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-02 06:58:15.324 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-02 06:58:15.585  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-10-02 06:58:15.585  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-10-02 06:58:15.586 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-10-02 06:58:15.587 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-02 06:58:15.589  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-10-02 06:58:15.589  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-10-02 06:58:15.590 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-02 06:58:15.590 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-02 06:58:15.590 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-02 06:58:15.591 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-02 06:58:15.592 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-02 06:58:15.592 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-02 06:58:15.593 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-02 06:58:15.593 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-02 06:58:15.594 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-02 06:58:15.595 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-10-02 06:58:15.598 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 669603842897259882444202286883808665035402824097
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Oct 02 05:15:34 UTC 2022
           Final Date: Fri Oct 01 05:15:33 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [50:5e:11:47:9e:d8:51:4d:22:7c:ab:ba:3e:0c:f2:9b:fd:19:4c:ff],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: af8150831321bb24dddc2bd076360dc584f4f786
                       da81b2c6291f0ada127beada36bd027025a8f0e4
                       a27903bfb523e01e956003e0212b58ca919170fc
                       0db73a1ec9f80bfc0b82cc321ca98e981ec4b494
                       fbdf59f47a9e776cc2d2b39af57344ad2e6d85c5
                       622c1d6cef0e059a7c26ff0ee32e6ad21b96c31f
                       c68827d8a795e89c665c429818694ab7f6b7f645
                       7e1c18be47726bc17e2faa6631e472579c4d951e
                       978acfd76253c28f7d14c22c60bef8a233417334
                       e58cf0034ef0767b2e10d4e556ed59ab1159e194
                       c8a97a3d4874ea409fb9a0ebe105e0207b4f09f4
                       5c2478457956e0fb69d0d27c7688c8762fc5621a
                       ab914c5ba7ca974d7bb1c98af92bef093cae347b
                       5dd16b010c1f3269cd613999110c2b023e9cd580
                       f2f8e57ec063a205abc44816fc87de5894debd57
                       6a19f72f6739ba393b47a8f5dd053e7939397cd5
                       3e1ec84aff8f11f07e72266621acff595a5b70c8
                       99ddf0402abbda49dbd34d6f0b7df39db5ace39c
                       aac20ae65b90598e86e03fa943d3641ffab9bfc1
                       ab00b713
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [f7:3e:28:3d:b2:24:4b:25:54:e9:e9:bf:8f:b5:31:76:6e:98:12:2a],[56:66:d1:a4]
        modulus: a630a6395d811a6daeb8f22f140e50af8dadc4fa27ddf16fbf408a5b6219de6248f7f2270b5b411752908127a73ba19e67a32b6813551aa718fe3cf971a90693df0684b7e031c3dd0e78a1fc743fd64ba6ebafc86d3d739215fe46bf7892648f225ffd020bea657405eeca113d24959abcc84cb7364b16314ea32aabf562128690e064034d6217b1802859e3234a912ebe96533deef6df10d019829f2a40a6ece355bbfc562f599d26262854b3a81225966f1ad8674aee58aca30433224fb9214745c1891e3272676dcc617efc31814135f34bebc4f55827075eda108d332616b678913d4db4a03580874a1704060aad2ff955d14197c3fe64c8e2644a60865d
public exponent: 10001

] 
2022-10-02 07:03:11.238  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-10-02 07:03:11.249 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-10-02 07:03:11.259 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-10-02 07:03:11.266 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-10-02 07:03:11.266  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-10-02 07:03:11.267  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-10-02 07:03:11.268  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-10-02 07:03:11.272 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-10-02 07:03:11.273 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-10-02 07:03:11.273 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-10-02 07:03:11.282 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-10-02 07:03:11.286 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-02 07:03:11.287 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-02 07:03:11.287 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-02 07:03:12.089  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-10-02 07:03:12.091  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-10-02 07:03:12.092 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-10-02 07:03:12.094 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-02 07:03:12.101  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-10-02 07:03:12.108  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-10-02 07:03:12.113 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-02 07:03:12.118 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-02 07:03:12.126 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-02 07:03:12.134 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-02 07:03:12.135 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-02 07:03:12.140 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-02 07:03:12.141 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-02 07:03:12.142 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-02 07:03:12.142 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-02 07:03:12.143 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-10-02 07:03:12.155 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 669603842897259882444202286883808665035402824097
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Oct 02 05:15:34 UTC 2022
           Final Date: Fri Oct 01 05:15:33 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [50:5e:11:47:9e:d8:51:4d:22:7c:ab:ba:3e:0c:f2:9b:fd:19:4c:ff],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: af8150831321bb24dddc2bd076360dc584f4f786
                       da81b2c6291f0ada127beada36bd027025a8f0e4
                       a27903bfb523e01e956003e0212b58ca919170fc
                       0db73a1ec9f80bfc0b82cc321ca98e981ec4b494
                       fbdf59f47a9e776cc2d2b39af57344ad2e6d85c5
                       622c1d6cef0e059a7c26ff0ee32e6ad21b96c31f
                       c68827d8a795e89c665c429818694ab7f6b7f645
                       7e1c18be47726bc17e2faa6631e472579c4d951e
                       978acfd76253c28f7d14c22c60bef8a233417334
                       e58cf0034ef0767b2e10d4e556ed59ab1159e194
                       c8a97a3d4874ea409fb9a0ebe105e0207b4f09f4
                       5c2478457956e0fb69d0d27c7688c8762fc5621a
                       ab914c5ba7ca974d7bb1c98af92bef093cae347b
                       5dd16b010c1f3269cd613999110c2b023e9cd580
                       f2f8e57ec063a205abc44816fc87de5894debd57
                       6a19f72f6739ba393b47a8f5dd053e7939397cd5
                       3e1ec84aff8f11f07e72266621acff595a5b70c8
                       99ddf0402abbda49dbd34d6f0b7df39db5ace39c
                       aac20ae65b90598e86e03fa943d3641ffab9bfc1
                       ab00b713
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [55:6e:d6:3b:ef:3e:ef:a9:41:f4:5d:33:10:e6:f6:0f:96:1b:e1:92],[56:66:d1:a4]
        modulus: a6dba70933fb2aaf0867ad71343477eb46d3733403bb383b4b80ce751ece4db43c37a43a4055158cc4c85e537bb0b77a5cd16197be43ab49ddc40849cb180ad732022dc134d4e6c8e53c68f4773aab6d90b7cb40d0174e1308e60dcd0eeeeebb8a83dd5ab009ddb78dddee3252254b723e8f011650c74115b5a19a0f1d22c36068fe79dae5df31ddebdbe45c33d9032d3511b39e2141f86d471b5c1401a2479d417d03b3d8b97a0f913f5389d138bdd61b2f88bd39e320572740513a39c98c7b2ec96d7958e911c5fde728f58cbaddf8fe5345c40815b9b93fc8fa774add94afab57156f05e9d368bab4f8ceb71fbfea0cee88f34eacf9a279b2151e24ff9aad
public exponent: 10001

] 
2022-10-02 07:03:26.544  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-10-02 07:03:26.556 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-10-02 07:03:26.576 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-10-02 07:03:26.577 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-10-02 07:03:26.577  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-10-02 07:03:26.578  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-10-02 07:03:26.578  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-10-02 07:03:26.579 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-10-02 07:03:26.579 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-10-02 07:03:26.580 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-10-02 07:03:26.586 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-10-02 07:03:26.587 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-02 07:03:26.587 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-02 07:03:26.596 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-02 07:03:26.911  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-10-02 07:03:26.912  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-10-02 07:03:26.913 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-10-02 07:03:26.913 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-02 07:03:26.915  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-10-02 07:03:26.915  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-10-02 07:03:26.916 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-02 07:03:26.916 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-02 07:03:26.916 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-02 07:03:26.917 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-02 07:03:26.917 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-02 07:03:26.918 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-02 07:03:26.919 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-02 07:03:26.919 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-02 07:03:26.927 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-02 07:03:26.929 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-10-02 07:03:26.939 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 669603842897259882444202286883808665035402824097
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Oct 02 05:15:34 UTC 2022
           Final Date: Fri Oct 01 05:15:33 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [50:5e:11:47:9e:d8:51:4d:22:7c:ab:ba:3e:0c:f2:9b:fd:19:4c:ff],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: af8150831321bb24dddc2bd076360dc584f4f786
                       da81b2c6291f0ada127beada36bd027025a8f0e4
                       a27903bfb523e01e956003e0212b58ca919170fc
                       0db73a1ec9f80bfc0b82cc321ca98e981ec4b494
                       fbdf59f47a9e776cc2d2b39af57344ad2e6d85c5
                       622c1d6cef0e059a7c26ff0ee32e6ad21b96c31f
                       c68827d8a795e89c665c429818694ab7f6b7f645
                       7e1c18be47726bc17e2faa6631e472579c4d951e
                       978acfd76253c28f7d14c22c60bef8a233417334
                       e58cf0034ef0767b2e10d4e556ed59ab1159e194
                       c8a97a3d4874ea409fb9a0ebe105e0207b4f09f4
                       5c2478457956e0fb69d0d27c7688c8762fc5621a
                       ab914c5ba7ca974d7bb1c98af92bef093cae347b
                       5dd16b010c1f3269cd613999110c2b023e9cd580
                       f2f8e57ec063a205abc44816fc87de5894debd57
                       6a19f72f6739ba393b47a8f5dd053e7939397cd5
                       3e1ec84aff8f11f07e72266621acff595a5b70c8
                       99ddf0402abbda49dbd34d6f0b7df39db5ace39c
                       aac20ae65b90598e86e03fa943d3641ffab9bfc1
                       ab00b713
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [1d:19:2f:4d:9d:fb:ad:83:71:67:d9:91:c9:5c:60:d0:a8:d2:2d:d4],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-10-02 07:23:06.489  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-10-02 07:23:06.493 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-10-02 07:23:06.496 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-10-02 07:23:06.497 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-10-02 07:23:06.497  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-10-02 07:23:06.499  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-10-02 07:23:06.499  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-10-02 07:23:06.500 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-10-02 07:23:06.500 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-10-02 07:23:06.501 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-10-02 07:23:06.508 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-10-02 07:23:06.509 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-02 07:23:06.509 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-02 07:23:06.510 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-02 07:23:06.765  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-10-02 07:23:06.766  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-10-02 07:23:06.767 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-10-02 07:23:06.767 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-02 07:23:06.769  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-10-02 07:23:06.770  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-10-02 07:23:06.770 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-02 07:23:06.770 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-02 07:23:06.771 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-02 07:23:06.772 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-02 07:23:06.773 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-02 07:23:06.773 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-02 07:23:06.775 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-02 07:23:06.775 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-02 07:23:06.777 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-02 07:23:06.778 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-10-02 07:23:06.783 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 669603842897259882444202286883808665035402824097
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Oct 02 05:15:34 UTC 2022
           Final Date: Fri Oct 01 05:15:33 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [50:5e:11:47:9e:d8:51:4d:22:7c:ab:ba:3e:0c:f2:9b:fd:19:4c:ff],[56:66:d1:a4]
        modulus: d7d3869743e394b7de20c855be1f9e65c5d911a6426c5bedfc5981b5b06596245247bdb0a2e9d3446a75d8fd6ed3a504daa9a90e3c65d4e33dae8557ed1b09a296041c5cf72cf8a6b4099efcc659bf0b3c5b32b73b0a156ca255226f94d2e8c9e561337cc8dbd3c3e6105088c9fd67701518896777d785078179fb04cd4a801f1e54fad15e6d25990907b8aa0e76f8443ed9256494307a31f33917b25bf0f1302eb0098b4b8901b5f8aa654772320049f61e92761c8a1c874408bc8abcd5acb8db26b8edbfe334a43468e5a5de2b72e70d7ab7f8817d0affba5655fd8a09ade34c5f85a784bc3e5b481073a27fc19351637db2b8550ba07529812ff5e8ea553ca2b258a378da069a5b087e643d96d08b783ec3424b9ac9f7e4f9c4288d0b854c5b6e6c6b1993e49ef8b2a23003c672f98e018d83ab2469152c5daabbe8078aacdde211fefc68ddade4d99b5096e16d90e72605ef56afc1b063c4e8b8f4e90464eb90d1be75ed105eba2386e60371f84b8cd05a8179cb80b4fbf7369835698d2d
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: af8150831321bb24dddc2bd076360dc584f4f786
                       da81b2c6291f0ada127beada36bd027025a8f0e4
                       a27903bfb523e01e956003e0212b58ca919170fc
                       0db73a1ec9f80bfc0b82cc321ca98e981ec4b494
                       fbdf59f47a9e776cc2d2b39af57344ad2e6d85c5
                       622c1d6cef0e059a7c26ff0ee32e6ad21b96c31f
                       c68827d8a795e89c665c429818694ab7f6b7f645
                       7e1c18be47726bc17e2faa6631e472579c4d951e
                       978acfd76253c28f7d14c22c60bef8a233417334
                       e58cf0034ef0767b2e10d4e556ed59ab1159e194
                       c8a97a3d4874ea409fb9a0ebe105e0207b4f09f4
                       5c2478457956e0fb69d0d27c7688c8762fc5621a
                       ab914c5ba7ca974d7bb1c98af92bef093cae347b
                       5dd16b010c1f3269cd613999110c2b023e9cd580
                       f2f8e57ec063a205abc44816fc87de5894debd57
                       6a19f72f6739ba393b47a8f5dd053e7939397cd5
                       3e1ec84aff8f11f07e72266621acff595a5b70c8
                       99ddf0402abbda49dbd34d6f0b7df39db5ace39c
                       aac20ae65b90598e86e03fa943d3641ffab9bfc1
                       ab00b713
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [39:79:f4:ae:18:d2:3f:3e:67:68:93:97:1d:39:2a:75:14:01:33:ba],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-10-02 07:23:11.146  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-10-02 07:23:11.148 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-10-02 07:23:11.150 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-10-02 07:23:11.150 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-10-02 07:23:11.151  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-10-02 07:23:11.152  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-10-02 07:23:11.152  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-10-02 07:23:11.152 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-10-02 07:23:11.153 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-10-02 07:23:11.153 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-10-02 07:23:11.157 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-10-02 07:23:11.158 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-02 07:23:11.159 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-02 07:23:11.159 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-02 07:23:11.304  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-10-02 07:23:11.305  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-10-02 07:23:11.306 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-10-02 07:23:11.306 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-02 07:23:11.307  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-10-02 07:23:11.308  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-10-02 07:23:11.308 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-02 07:23:11.309 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-02 07:23:11.309 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-02 07:23:11.310 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-02 07:23:11.310 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-02 07:23:11.310 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-02 07:23:11.311 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-02 07:23:11.311 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-02 07:23:11.312 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-02 07:23:11.312 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-10-02 07:23:11.315 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 669603842897259882444202286883808665035402824097
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Oct 02 05:15:34 UTC 2022
           Final Date: Fri Oct 01 05:15:33 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [50:5e:11:47:9e:d8:51:4d:22:7c:ab:ba:3e:0c:f2:9b:fd:19:4c:ff],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: af8150831321bb24dddc2bd076360dc584f4f786
                       da81b2c6291f0ada127beada36bd027025a8f0e4
                       a27903bfb523e01e956003e0212b58ca919170fc
                       0db73a1ec9f80bfc0b82cc321ca98e981ec4b494
                       fbdf59f47a9e776cc2d2b39af57344ad2e6d85c5
                       622c1d6cef0e059a7c26ff0ee32e6ad21b96c31f
                       c68827d8a795e89c665c429818694ab7f6b7f645
                       7e1c18be47726bc17e2faa6631e472579c4d951e
                       978acfd76253c28f7d14c22c60bef8a233417334
                       e58cf0034ef0767b2e10d4e556ed59ab1159e194
                       c8a97a3d4874ea409fb9a0ebe105e0207b4f09f4
                       5c2478457956e0fb69d0d27c7688c8762fc5621a
                       ab914c5ba7ca974d7bb1c98af92bef093cae347b
                       5dd16b010c1f3269cd613999110c2b023e9cd580
                       f2f8e57ec063a205abc44816fc87de5894debd57
                       6a19f72f6739ba393b47a8f5dd053e7939397cd5
                       3e1ec84aff8f11f07e72266621acff595a5b70c8
                       99ddf0402abbda49dbd34d6f0b7df39db5ace39c
                       aac20ae65b90598e86e03fa943d3641ffab9bfc1
                       ab00b713
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [52:3d:51:40:98:b1:fa:f3:76:22:d1:9b:b4:39:cf:ec:fc:a7:7f:9e],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

]