Results

By type

          2022-11-08 05:01:41,645 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-11-08 05:01:43,137 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-11-08 05:01:43.925  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Nov 08, 2022 5:01:46 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Nov 08, 2022 5:01:46 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Nov 08, 2022 5:01:46 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Nov 08, 2022 5:01:46 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-11-08 05:01:46.808 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-11-08 05:01:47.112  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-11-08 05:01:47.325  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-11-08 05:01:48.148 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-11-08 05:01:48.151 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
2022-11-08 05:01:48.153 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-11-08 05:01:48.157 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-11-08 05:01:48.199 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2022-11-08 05:01:48.202 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/docs]}: redirectToUi(HttpServletRequest)
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
2022-11-08 05:01:48.352 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-11-08 05:01:49.097 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Nov 08, 2022 5:01:49 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-11-08 05:01:50.225  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 9.529 seconds (JVM running for 11.374)
Nov 08, 2022 5:02:18 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-11-08 05:02:30.658  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-08 05:02:30.668 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-08 05:02:30.732 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-11-08 05:02:30.735 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-08 05:02:30.754  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-11-08 05:02:30.756  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-08 05:02:30.757  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-08 05:02:30.758 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-08 05:02:30.758 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-08 05:02:30.762 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-08 05:02:30.770 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-08 05:02:30.773 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-08 05:02:30.826 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-08 05:02:30.836 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-08 05:02:30.836 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-08 05:02:30.839 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-08 05:02:31.369  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-08 05:02:31.371  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-08 05:02:31.372 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-08 05:02:31.374 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-08 05:02:31.384  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-08 05:02:31.388  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-08 05:02:31.389 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-08 05:02:31.389 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-08 05:02:31.390 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-08 05:02:31.407 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-08 05:02:31.408 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-08 05:02:31.408 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-08 05:02:31.417 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-08 05:02:31.417 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-08 05:02:31.418 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-08 05:02:31.419 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-08 05:02:31.450 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 694778186143002816618083879067426339015281333440
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Nov 08 04:58:43 UTC 2022
           Final Date: Sun Nov 07 04:58:42 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [91:72:4e:12:f6:82:a2:de:98:38:7d:f6:88:f1:f3:46:ec:36:c1:03],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 004e96ebaee43ff931b741894bf13a40b30e2e84
                       b9199f1f594b6da20dbec47c7007b07e9a96d04a
                       e13fe69449dd0187005eff828bf81964002230e2
                       4423bdf1b1e758571080a315be57d5019af10fa1
                       6f2b91e13708c40ac2b4b0a4270445606f2cc7a5
                       9d43ed52bc2fb827bb0b711c73dcc28252ecd688
                       bd9da5d014a37bcaac1fdc7ababcd2deabc1b9d3
                       4b5878c16507147ce7213729e8ebc97afb4314e7
                       823135a14044a98a084dea47d10decb775d00ce2
                       9d4495929f42602189cb5e5858bba26b5d5e4caf
                       e4f09e82381de946d3c75d0db2d6ccb4b0e116d6
                       ecb999cfb1b3d8920db58b457a246c138a3680ac
                       2542c537d2feb48a9b0e53fddd7d9a936e51aec0
                       02ab37313630e4dd4fd1d4208d3641a97ea76cbf
                       079a4fd1b19a8d48091eba3590d663376c3804bd
                       1c7eecea00544e430183d728496d2653da4790c1
                       22d582ed5e9ea94324317fca8acae39f3d7ab043
                       c3281f2e9034bfe3e87df9ec4793a65cfdede841
                       51511063f6fe86d6c15941ccf765d7b8a15647a1
                       b66b1b16
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [59:08:31:1e:d8:34:b8:87:b5:60:00:aa:5e:ff:6d:95:07:80:9b:bc],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-11-08 06:09:40.389  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-08 06:09:40.393 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-08 06:09:40.400 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-08 06:09:40.401 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-08 06:09:40.406  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-08 06:09:40.408  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-08 06:09:40.411  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-08 06:09:40.411 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-08 06:09:40.413 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-08 06:09:40.414 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-08 06:09:40.425 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-08 06:09:40.430 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-08 06:09:40.430 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-08 06:09:40.440 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-08 06:09:40.739  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-08 06:09:40.746  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-08 06:09:40.746 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-08 06:09:40.747 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-08 06:09:40.749  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-08 06:09:40.753  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-08 06:09:40.754 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-08 06:09:40.755 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-08 06:09:40.755 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-08 06:09:40.756 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-08 06:09:40.757 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-08 06:09:40.757 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-08 06:09:40.759 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-08 06:09:40.760 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-08 06:09:40.760 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-08 06:09:40.761 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-08 06:09:40.766 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 694778186143002816618083879067426339015281333440
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Nov 08 04:58:43 UTC 2022
           Final Date: Sun Nov 07 04:58:42 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [91:72:4e:12:f6:82:a2:de:98:38:7d:f6:88:f1:f3:46:ec:36:c1:03],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 004e96ebaee43ff931b741894bf13a40b30e2e84
                       b9199f1f594b6da20dbec47c7007b07e9a96d04a
                       e13fe69449dd0187005eff828bf81964002230e2
                       4423bdf1b1e758571080a315be57d5019af10fa1
                       6f2b91e13708c40ac2b4b0a4270445606f2cc7a5
                       9d43ed52bc2fb827bb0b711c73dcc28252ecd688
                       bd9da5d014a37bcaac1fdc7ababcd2deabc1b9d3
                       4b5878c16507147ce7213729e8ebc97afb4314e7
                       823135a14044a98a084dea47d10decb775d00ce2
                       9d4495929f42602189cb5e5858bba26b5d5e4caf
                       e4f09e82381de946d3c75d0db2d6ccb4b0e116d6
                       ecb999cfb1b3d8920db58b457a246c138a3680ac
                       2542c537d2feb48a9b0e53fddd7d9a936e51aec0
                       02ab37313630e4dd4fd1d4208d3641a97ea76cbf
                       079a4fd1b19a8d48091eba3590d663376c3804bd
                       1c7eecea00544e430183d728496d2653da4790c1
                       22d582ed5e9ea94324317fca8acae39f3d7ab043
                       c3281f2e9034bfe3e87df9ec4793a65cfdede841
                       51511063f6fe86d6c15941ccf765d7b8a15647a1
                       b66b1b16
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [25:4e:ac:66:79:4a:6d:31:af:aa:2e:51:1f:ce:e6:65:b7:ec:2c:4c],[56:66:d1:a4]
        modulus: bc75a0630899cc93570b3b04d7afe16e6c8e741f252e6f8521f91409434d6843e28aca4fdf90f74e108cf01c49e017817b1cca4e55e2e0890dc353fc8b326a71ecd024f4fde6c154929dc6fa6cb7120ecce3304e7679f9552ad6c7f0f23362f580cb2c71686c835c78c2924726223974f7b3ecc7c5f25c0019f7df7424d74843624e323261106d80c2d3129c28572e75ff1eb982e737b15f1869637924e5cb17d70c5713c9b8ec8d82c2569c4aad64fc64e3d842266bcca85209ccd943e0432577d68f86a92e8a39d76c14797f8d02663d735a37ee579df78a88b623af1f1dff82e71c5830341fe3985078c7d87912f38f6da9e1c9e641b72c88f64f6e424a0d
public exponent: 10001

] 
2022-11-08 06:11:28.349  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-08 06:11:28.351 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-08 06:11:28.353 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-11-08 06:11:28.354 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-08 06:11:28.355  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-11-08 06:11:28.356  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-08 06:11:28.356  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-08 06:11:28.357 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-08 06:11:28.357 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-08 06:11:28.358 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-08 06:11:28.363 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-08 06:11:28.363 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-08 06:11:28.364 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-08 06:11:28.364 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-08 06:11:28.506  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-08 06:11:28.507  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-08 06:11:28.508 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-08 06:11:28.508 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-08 06:11:28.510  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-08 06:11:28.511  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-08 06:11:28.512 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-08 06:11:28.512 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-08 06:11:28.513 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-08 06:11:28.514 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-08 06:11:28.514 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-08 06:11:28.514 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-08 06:11:28.516 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-08 06:11:28.516 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-08 06:11:28.516 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-08 06:11:28.518 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-08 06:11:28.521 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 694778186143002816618083879067426339015281333440
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Nov 08 04:58:43 UTC 2022
           Final Date: Sun Nov 07 04:58:42 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [91:72:4e:12:f6:82:a2:de:98:38:7d:f6:88:f1:f3:46:ec:36:c1:03],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 004e96ebaee43ff931b741894bf13a40b30e2e84
                       b9199f1f594b6da20dbec47c7007b07e9a96d04a
                       e13fe69449dd0187005eff828bf81964002230e2
                       4423bdf1b1e758571080a315be57d5019af10fa1
                       6f2b91e13708c40ac2b4b0a4270445606f2cc7a5
                       9d43ed52bc2fb827bb0b711c73dcc28252ecd688
                       bd9da5d014a37bcaac1fdc7ababcd2deabc1b9d3
                       4b5878c16507147ce7213729e8ebc97afb4314e7
                       823135a14044a98a084dea47d10decb775d00ce2
                       9d4495929f42602189cb5e5858bba26b5d5e4caf
                       e4f09e82381de946d3c75d0db2d6ccb4b0e116d6
                       ecb999cfb1b3d8920db58b457a246c138a3680ac
                       2542c537d2feb48a9b0e53fddd7d9a936e51aec0
                       02ab37313630e4dd4fd1d4208d3641a97ea76cbf
                       079a4fd1b19a8d48091eba3590d663376c3804bd
                       1c7eecea00544e430183d728496d2653da4790c1
                       22d582ed5e9ea94324317fca8acae39f3d7ab043
                       c3281f2e9034bfe3e87df9ec4793a65cfdede841
                       51511063f6fe86d6c15941ccf765d7b8a15647a1
                       b66b1b16
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [20:cf:c6:9f:84:9a:48:1d:52:50:dc:ca:0c:fb:c4:98:e3:e1:00:e4],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-11-08 06:12:44.182  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-08 06:12:44.183 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-08 06:12:44.185 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-11-08 06:12:44.186 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-08 06:12:44.186  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-11-08 06:12:44.187  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-08 06:12:44.187  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-08 06:12:44.187 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-08 06:12:44.189 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-08 06:12:44.189 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-08 06:12:44.193 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-08 06:12:44.193 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-08 06:12:44.193 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-08 06:12:44.194 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-08 06:12:44.507  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-08 06:12:44.507  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-08 06:12:44.508 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-08 06:12:44.508 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-08 06:12:44.509  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-08 06:12:44.510  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-08 06:12:44.510 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-08 06:12:44.511 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-08 06:12:44.511 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-08 06:12:44.512 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-08 06:12:44.513 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-08 06:12:44.513 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-08 06:12:44.514 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-08 06:12:44.514 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-08 06:12:44.515 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-08 06:12:44.516 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-08 06:12:44.519 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 694778186143002816618083879067426339015281333440
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Nov 08 04:58:43 UTC 2022
           Final Date: Sun Nov 07 04:58:42 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [91:72:4e:12:f6:82:a2:de:98:38:7d:f6:88:f1:f3:46:ec:36:c1:03],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 004e96ebaee43ff931b741894bf13a40b30e2e84
                       b9199f1f594b6da20dbec47c7007b07e9a96d04a
                       e13fe69449dd0187005eff828bf81964002230e2
                       4423bdf1b1e758571080a315be57d5019af10fa1
                       6f2b91e13708c40ac2b4b0a4270445606f2cc7a5
                       9d43ed52bc2fb827bb0b711c73dcc28252ecd688
                       bd9da5d014a37bcaac1fdc7ababcd2deabc1b9d3
                       4b5878c16507147ce7213729e8ebc97afb4314e7
                       823135a14044a98a084dea47d10decb775d00ce2
                       9d4495929f42602189cb5e5858bba26b5d5e4caf
                       e4f09e82381de946d3c75d0db2d6ccb4b0e116d6
                       ecb999cfb1b3d8920db58b457a246c138a3680ac
                       2542c537d2feb48a9b0e53fddd7d9a936e51aec0
                       02ab37313630e4dd4fd1d4208d3641a97ea76cbf
                       079a4fd1b19a8d48091eba3590d663376c3804bd
                       1c7eecea00544e430183d728496d2653da4790c1
                       22d582ed5e9ea94324317fca8acae39f3d7ab043
                       c3281f2e9034bfe3e87df9ec4793a65cfdede841
                       51511063f6fe86d6c15941ccf765d7b8a15647a1
                       b66b1b16
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [14:21:52:0b:5e:3f:68:87:30:43:e5:0d:86:1f:ad:17:55:0a:22:b7],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-11-08 06:14:43.694  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-08 06:14:43.698 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-08 06:14:43.700 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-08 06:14:43.701 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-08 06:14:43.702  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-08 06:14:43.703  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-08 06:14:43.704  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-08 06:14:43.705 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-08 06:14:43.706 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-08 06:14:43.706 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-08 06:14:43.714 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-08 06:14:43.715 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-08 06:14:43.716 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-08 06:14:43.717 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-08 06:14:43.885  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-08 06:14:43.886  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-08 06:14:43.886 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-08 06:14:43.886 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-08 06:14:43.889  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-08 06:14:43.889  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-08 06:14:43.890 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-08 06:14:43.890 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-08 06:14:43.891 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-08 06:14:43.892 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-08 06:14:43.892 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-08 06:14:43.892 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-08 06:14:43.893 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-08 06:14:43.893 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-08 06:14:43.894 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-08 06:14:43.895 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-08 06:14:43.898 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 694778186143002816618083879067426339015281333440
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Nov 08 04:58:43 UTC 2022
           Final Date: Sun Nov 07 04:58:42 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [91:72:4e:12:f6:82:a2:de:98:38:7d:f6:88:f1:f3:46:ec:36:c1:03],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 004e96ebaee43ff931b741894bf13a40b30e2e84
                       b9199f1f594b6da20dbec47c7007b07e9a96d04a
                       e13fe69449dd0187005eff828bf81964002230e2
                       4423bdf1b1e758571080a315be57d5019af10fa1
                       6f2b91e13708c40ac2b4b0a4270445606f2cc7a5
                       9d43ed52bc2fb827bb0b711c73dcc28252ecd688
                       bd9da5d014a37bcaac1fdc7ababcd2deabc1b9d3
                       4b5878c16507147ce7213729e8ebc97afb4314e7
                       823135a14044a98a084dea47d10decb775d00ce2
                       9d4495929f42602189cb5e5858bba26b5d5e4caf
                       e4f09e82381de946d3c75d0db2d6ccb4b0e116d6
                       ecb999cfb1b3d8920db58b457a246c138a3680ac
                       2542c537d2feb48a9b0e53fddd7d9a936e51aec0
                       02ab37313630e4dd4fd1d4208d3641a97ea76cbf
                       079a4fd1b19a8d48091eba3590d663376c3804bd
                       1c7eecea00544e430183d728496d2653da4790c1
                       22d582ed5e9ea94324317fca8acae39f3d7ab043
                       c3281f2e9034bfe3e87df9ec4793a65cfdede841
                       51511063f6fe86d6c15941ccf765d7b8a15647a1
                       b66b1b16
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [34:ce:c5:95:15:e2:07:91:02:6d:e0:b7:7d:61:1e:a3:22:46:ce:6f],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-11-08 06:19:42.193  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-08 06:19:42.195 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-08 06:19:42.197 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-08 06:19:42.197 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-08 06:19:42.198  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-08 06:19:42.199  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-08 06:19:42.199  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-08 06:19:42.200 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-08 06:19:42.200 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-08 06:19:42.201 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-08 06:19:42.206 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-08 06:19:42.207 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-08 06:19:42.207 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-08 06:19:42.208 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-08 06:19:42.385  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-08 06:19:42.386  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-08 06:19:42.387 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-08 06:19:42.387 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-08 06:19:42.389  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-08 06:19:42.389  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-08 06:19:42.390 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-08 06:19:42.391 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-08 06:19:42.391 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-08 06:19:42.392 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-08 06:19:42.392 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-08 06:19:42.393 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-08 06:19:42.394 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-08 06:19:42.394 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-08 06:19:42.395 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-08 06:19:42.395 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-08 06:19:42.398 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 694778186143002816618083879067426339015281333440
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Nov 08 04:58:43 UTC 2022
           Final Date: Sun Nov 07 04:58:42 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [91:72:4e:12:f6:82:a2:de:98:38:7d:f6:88:f1:f3:46:ec:36:c1:03],[56:66:d1:a4]
        modulus: e739f486236fc2b96784f227890511fda450332fd0582caedd9a7301e0c1134eb58235c3166ffa481170b8ddf691c2e3baee74f15436fbfc3cc66c84319cd8d274cb1d1b5bc92ea45e20020b556dd029ec683f9f8765cfa3e9d660f4c588e7234e202aae9b6c846ff6907ec3ea84ef077e5579b08260dd432d7aeb34308c8b4ec9474bacde1befb9d1232c458e4f72966abe27cfe703333d6787d0b4f6fdd17dcad44f4b9ebb4d18452432cc0e7e58ea3f7bea71cf16a9c4db0c021f0efa9c560b8e1c8b97bba7a30f9731fab34ad1c995d7819ad9f115b521a34016d63ebb04cde3642216ca9749cfa1a37a3b5e97377e3f3b9c651decbd7539f0e35b2dd4b988f642a383dd45979d501b0606928809cce68601219f035a0b40acc3797bb5097a8c77ae5354918b1342b3759a92c761c94b5fc5268e15d1f42827ed82b82d18e1afedaf460ad223794681388c262706c11e01e91121026dc4e9e016d2c6dae54e7a850163ad5b98dfc08e5326c501feb0578d2f98195d4531ea4344ca7d2e59
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 004e96ebaee43ff931b741894bf13a40b30e2e84
                       b9199f1f594b6da20dbec47c7007b07e9a96d04a
                       e13fe69449dd0187005eff828bf81964002230e2
                       4423bdf1b1e758571080a315be57d5019af10fa1
                       6f2b91e13708c40ac2b4b0a4270445606f2cc7a5
                       9d43ed52bc2fb827bb0b711c73dcc28252ecd688
                       bd9da5d014a37bcaac1fdc7ababcd2deabc1b9d3
                       4b5878c16507147ce7213729e8ebc97afb4314e7
                       823135a14044a98a084dea47d10decb775d00ce2
                       9d4495929f42602189cb5e5858bba26b5d5e4caf
                       e4f09e82381de946d3c75d0db2d6ccb4b0e116d6
                       ecb999cfb1b3d8920db58b457a246c138a3680ac
                       2542c537d2feb48a9b0e53fddd7d9a936e51aec0
                       02ab37313630e4dd4fd1d4208d3641a97ea76cbf
                       079a4fd1b19a8d48091eba3590d663376c3804bd
                       1c7eecea00544e430183d728496d2653da4790c1
                       22d582ed5e9ea94324317fca8acae39f3d7ab043
                       c3281f2e9034bfe3e87df9ec4793a65cfdede841
                       51511063f6fe86d6c15941ccf765d7b8a15647a1
                       b66b1b16
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [dd:44:6b:20:97:1a:fa:b5:0b:40:4d:4a:9f:10:26:64:98:47:21:ba],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-11-08 06:24:03.606  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-08 06:24:03.610 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-08 06:24:03.614 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-08 06:24:03.615 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-08 06:24:03.615  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-08 06:24:03.616  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-08 06:24:03.616  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-08 06:24:03.617 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-08 06:24:03.618 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-08 06:24:03.618 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-08 06:24:03.625 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-08 06:24:03.626 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-08 06:24:03.627 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-08 06:24:03.627 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-08 06:24:03.809  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-08 06:24:03.810  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-08 06:24:03.810 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-08 06:24:03.810 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-08 06:24:03.812  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-08 06:24:03.816  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-08 06:24:03.817 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-08 06:24:03.817 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-08 06:24:03.818 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-08 06:24:03.818 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-08 06:24:03.819 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-08 06:24:03.819 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-08 06:24:03.820 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-08 06:24:03.820 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-08 06:24:03.821 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-08 06:24:03.821 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-08 06:24:03.826 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 694778186143002816618083879067426339015281333440
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Nov 08 04:58:43 UTC 2022
           Final Date: Sun Nov 07 04:58:42 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [91:72:4e:12:f6:82:a2:de:98:38:7d:f6:88:f1:f3:46:ec:36:c1:03],[56:66:d1:a4]
        modulus: e739f486236fc2b96784f227890511fda450332fd0582caedd9a7301e0c1134eb58235c3166ffa481170b8ddf691c2e3baee74f15436fbfc3cc66c84319cd8d274cb1d1b5bc92ea45e20020b556dd029ec683f9f8765cfa3e9d660f4c588e7234e202aae9b6c846ff6907ec3ea84ef077e5579b08260dd432d7aeb34308c8b4ec9474bacde1befb9d1232c458e4f72966abe27cfe703333d6787d0b4f6fdd17dcad44f4b9ebb4d18452432cc0e7e58ea3f7bea71cf16a9c4db0c021f0efa9c560b8e1c8b97bba7a30f9731fab34ad1c995d7819ad9f115b521a34016d63ebb04cde3642216ca9749cfa1a37a3b5e97377e3f3b9c651decbd7539f0e35b2dd4b988f642a383dd45979d501b0606928809cce68601219f035a0b40acc3797bb5097a8c77ae5354918b1342b3759a92c761c94b5fc5268e15d1f42827ed82b82d18e1afedaf460ad223794681388c262706c11e01e91121026dc4e9e016d2c6dae54e7a850163ad5b98dfc08e5326c501feb0578d2f98195d4531ea4344ca7d2e59
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 004e96ebaee43ff931b741894bf13a40b30e2e84
                       b9199f1f594b6da20dbec47c7007b07e9a96d04a
                       e13fe69449dd0187005eff828bf81964002230e2
                       4423bdf1b1e758571080a315be57d5019af10fa1
                       6f2b91e13708c40ac2b4b0a4270445606f2cc7a5
                       9d43ed52bc2fb827bb0b711c73dcc28252ecd688
                       bd9da5d014a37bcaac1fdc7ababcd2deabc1b9d3
                       4b5878c16507147ce7213729e8ebc97afb4314e7
                       823135a14044a98a084dea47d10decb775d00ce2
                       9d4495929f42602189cb5e5858bba26b5d5e4caf
                       e4f09e82381de946d3c75d0db2d6ccb4b0e116d6
                       ecb999cfb1b3d8920db58b457a246c138a3680ac
                       2542c537d2feb48a9b0e53fddd7d9a936e51aec0
                       02ab37313630e4dd4fd1d4208d3641a97ea76cbf
                       079a4fd1b19a8d48091eba3590d663376c3804bd
                       1c7eecea00544e430183d728496d2653da4790c1
                       22d582ed5e9ea94324317fca8acae39f3d7ab043
                       c3281f2e9034bfe3e87df9ec4793a65cfdede841
                       51511063f6fe86d6c15941ccf765d7b8a15647a1
                       b66b1b16
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [86:90:f8:f7:82:b3:16:77:34:9d:25:02:bb:3e:5a:71:80:ee:8e:1e],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-11-08 06:30:22.705  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-08 06:30:22.714 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-08 06:30:22.718 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-11-08 06:30:22.720 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-08 06:30:22.721  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-11-08 06:30:22.722  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-08 06:30:22.722  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-08 06:30:22.722 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-08 06:30:22.723 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-08 06:30:22.723 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-08 06:30:22.727 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-08 06:30:22.728 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-08 06:30:22.729 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-08 06:30:22.729 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-08 06:30:22.946  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-08 06:30:22.947  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-08 06:30:22.948 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-08 06:30:22.948 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-08 06:30:22.950  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-08 06:30:22.951  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-08 06:30:22.951 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-08 06:30:22.952 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-08 06:30:22.952 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-08 06:30:22.954 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-08 06:30:22.954 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-08 06:30:22.955 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-08 06:30:22.956 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-08 06:30:22.956 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-08 06:30:22.957 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-08 06:30:22.958 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-08 06:30:22.964 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 694778186143002816618083879067426339015281333440
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Nov 08 04:58:43 UTC 2022
           Final Date: Sun Nov 07 04:58:42 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [91:72:4e:12:f6:82:a2:de:98:38:7d:f6:88:f1:f3:46:ec:36:c1:03],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 004e96ebaee43ff931b741894bf13a40b30e2e84
                       b9199f1f594b6da20dbec47c7007b07e9a96d04a
                       e13fe69449dd0187005eff828bf81964002230e2
                       4423bdf1b1e758571080a315be57d5019af10fa1
                       6f2b91e13708c40ac2b4b0a4270445606f2cc7a5
                       9d43ed52bc2fb827bb0b711c73dcc28252ecd688
                       bd9da5d014a37bcaac1fdc7ababcd2deabc1b9d3
                       4b5878c16507147ce7213729e8ebc97afb4314e7
                       823135a14044a98a084dea47d10decb775d00ce2
                       9d4495929f42602189cb5e5858bba26b5d5e4caf
                       e4f09e82381de946d3c75d0db2d6ccb4b0e116d6
                       ecb999cfb1b3d8920db58b457a246c138a3680ac
                       2542c537d2feb48a9b0e53fddd7d9a936e51aec0
                       02ab37313630e4dd4fd1d4208d3641a97ea76cbf
                       079a4fd1b19a8d48091eba3590d663376c3804bd
                       1c7eecea00544e430183d728496d2653da4790c1
                       22d582ed5e9ea94324317fca8acae39f3d7ab043
                       c3281f2e9034bfe3e87df9ec4793a65cfdede841
                       51511063f6fe86d6c15941ccf765d7b8a15647a1
                       b66b1b16
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [e7:5b:69:ea:3d:f1:9f:70:9d:19:7d:15:27:e7:45:0e:17:0c:39:dc],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-11-08 06:34:54.739  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-08 06:34:54.741 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-08 06:34:54.742 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-11-08 06:34:54.743 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-08 06:34:54.743  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-11-08 06:34:54.744  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-08 06:34:54.745  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-08 06:34:54.745 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-08 06:34:54.746 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-08 06:34:54.746 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-08 06:34:54.749 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-08 06:34:54.751 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-08 06:34:54.751 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-08 06:34:54.751 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-08 06:34:54.870  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-08 06:34:54.871  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-08 06:34:54.871 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-08 06:34:54.871 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-08 06:34:54.873  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-08 06:34:54.873  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-08 06:34:54.873 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-08 06:34:54.873 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-08 06:34:54.874 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-08 06:34:54.874 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-08 06:34:54.875 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-08 06:34:54.875 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-08 06:34:54.876 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-08 06:34:54.876 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-08 06:34:54.876 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-08 06:34:54.877 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-08 06:34:54.879 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 694778186143002816618083879067426339015281333440
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Nov 08 04:58:43 UTC 2022
           Final Date: Sun Nov 07 04:58:42 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [91:72:4e:12:f6:82:a2:de:98:38:7d:f6:88:f1:f3:46:ec:36:c1:03],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 004e96ebaee43ff931b741894bf13a40b30e2e84
                       b9199f1f594b6da20dbec47c7007b07e9a96d04a
                       e13fe69449dd0187005eff828bf81964002230e2
                       4423bdf1b1e758571080a315be57d5019af10fa1
                       6f2b91e13708c40ac2b4b0a4270445606f2cc7a5
                       9d43ed52bc2fb827bb0b711c73dcc28252ecd688
                       bd9da5d014a37bcaac1fdc7ababcd2deabc1b9d3
                       4b5878c16507147ce7213729e8ebc97afb4314e7
                       823135a14044a98a084dea47d10decb775d00ce2
                       9d4495929f42602189cb5e5858bba26b5d5e4caf
                       e4f09e82381de946d3c75d0db2d6ccb4b0e116d6
                       ecb999cfb1b3d8920db58b457a246c138a3680ac
                       2542c537d2feb48a9b0e53fddd7d9a936e51aec0
                       02ab37313630e4dd4fd1d4208d3641a97ea76cbf
                       079a4fd1b19a8d48091eba3590d663376c3804bd
                       1c7eecea00544e430183d728496d2653da4790c1
                       22d582ed5e9ea94324317fca8acae39f3d7ab043
                       c3281f2e9034bfe3e87df9ec4793a65cfdede841
                       51511063f6fe86d6c15941ccf765d7b8a15647a1
                       b66b1b16
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [a2:e4:fd:1e:17:54:d5:0a:56:9e:0b:32:ad:58:7f:56:a8:39:51:2e],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-11-08 06:35:09.959  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-08 06:35:09.961 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-08 06:35:09.963 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-11-08 06:35:09.963 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-08 06:35:09.964  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-11-08 06:35:09.964  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-08 06:35:09.965  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-08 06:35:09.965 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-08 06:35:09.966 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-08 06:35:09.966 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-08 06:35:09.970 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-08 06:35:09.970 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-08 06:35:09.971 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-08 06:35:09.971 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-08 06:35:10.093  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-08 06:35:10.094  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-08 06:35:10.095 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-08 06:35:10.095 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-08 06:35:10.097  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-08 06:35:10.098  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-08 06:35:10.098 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-08 06:35:10.098 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-08 06:35:10.099 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-08 06:35:10.099 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-08 06:35:10.100 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-08 06:35:10.100 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-08 06:35:10.101 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-08 06:35:10.101 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-08 06:35:10.101 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-08 06:35:10.102 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-08 06:35:10.105 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 694778186143002816618083879067426339015281333440
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Nov 08 04:58:43 UTC 2022
           Final Date: Sun Nov 07 04:58:42 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [91:72:4e:12:f6:82:a2:de:98:38:7d:f6:88:f1:f3:46:ec:36:c1:03],[56:66:d1:a4]
        modulus: e739f486236fc2b96784f227890511fda450332fd0582caedd9a7301e0c1134eb58235c3166ffa481170b8ddf691c2e3baee74f15436fbfc3cc66c84319cd8d274cb1d1b5bc92ea45e20020b556dd029ec683f9f8765cfa3e9d660f4c588e7234e202aae9b6c846ff6907ec3ea84ef077e5579b08260dd432d7aeb34308c8b4ec9474bacde1befb9d1232c458e4f72966abe27cfe703333d6787d0b4f6fdd17dcad44f4b9ebb4d18452432cc0e7e58ea3f7bea71cf16a9c4db0c021f0efa9c560b8e1c8b97bba7a30f9731fab34ad1c995d7819ad9f115b521a34016d63ebb04cde3642216ca9749cfa1a37a3b5e97377e3f3b9c651decbd7539f0e35b2dd4b988f642a383dd45979d501b0606928809cce68601219f035a0b40acc3797bb5097a8c77ae5354918b1342b3759a92c761c94b5fc5268e15d1f42827ed82b82d18e1afedaf460ad223794681388c262706c11e01e91121026dc4e9e016d2c6dae54e7a850163ad5b98dfc08e5326c501feb0578d2f98195d4531ea4344ca7d2e59
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 004e96ebaee43ff931b741894bf13a40b30e2e84
                       b9199f1f594b6da20dbec47c7007b07e9a96d04a
                       e13fe69449dd0187005eff828bf81964002230e2
                       4423bdf1b1e758571080a315be57d5019af10fa1
                       6f2b91e13708c40ac2b4b0a4270445606f2cc7a5
                       9d43ed52bc2fb827bb0b711c73dcc28252ecd688
                       bd9da5d014a37bcaac1fdc7ababcd2deabc1b9d3
                       4b5878c16507147ce7213729e8ebc97afb4314e7
                       823135a14044a98a084dea47d10decb775d00ce2
                       9d4495929f42602189cb5e5858bba26b5d5e4caf
                       e4f09e82381de946d3c75d0db2d6ccb4b0e116d6
                       ecb999cfb1b3d8920db58b457a246c138a3680ac
                       2542c537d2feb48a9b0e53fddd7d9a936e51aec0
                       02ab37313630e4dd4fd1d4208d3641a97ea76cbf
                       079a4fd1b19a8d48091eba3590d663376c3804bd
                       1c7eecea00544e430183d728496d2653da4790c1
                       22d582ed5e9ea94324317fca8acae39f3d7ab043
                       c3281f2e9034bfe3e87df9ec4793a65cfdede841
                       51511063f6fe86d6c15941ccf765d7b8a15647a1
                       b66b1b16
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [42:0f:24:57:70:17:ee:19:3f:9e:38:9a:9f:45:8b:89:bb:88:2f:fb],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-11-08 06:54:15.734  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-08 06:54:15.738 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-08 06:54:15.742 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-11-08 06:54:15.743 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-08 06:54:15.743  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-11-08 06:54:15.744  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-08 06:54:15.745  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-08 06:54:15.745 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-08 06:54:15.746 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-08 06:54:15.746 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-08 06:54:15.751 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-08 06:54:15.752 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-08 06:54:15.752 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-08 06:54:15.753 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-08 06:54:15.907  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-08 06:54:15.908  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-08 06:54:15.908 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-08 06:54:15.908 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-08 06:54:15.910  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-08 06:54:15.910  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-08 06:54:15.910 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-08 06:54:15.911 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-08 06:54:15.911 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-08 06:54:15.911 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-08 06:54:15.912 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-08 06:54:15.912 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-08 06:54:15.913 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-08 06:54:15.913 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-08 06:54:15.913 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-08 06:54:15.914 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-08 06:54:15.917 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 694778186143002816618083879067426339015281333440
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Nov 08 04:58:43 UTC 2022
           Final Date: Sun Nov 07 04:58:42 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [91:72:4e:12:f6:82:a2:de:98:38:7d:f6:88:f1:f3:46:ec:36:c1:03],[56:66:d1:a4]
        modulus: e739f486236fc2b96784f227890511fda450332fd0582caedd9a7301e0c1134eb58235c3166ffa481170b8ddf691c2e3baee74f15436fbfc3cc66c84319cd8d274cb1d1b5bc92ea45e20020b556dd029ec683f9f8765cfa3e9d660f4c588e7234e202aae9b6c846ff6907ec3ea84ef077e5579b08260dd432d7aeb34308c8b4ec9474bacde1befb9d1232c458e4f72966abe27cfe703333d6787d0b4f6fdd17dcad44f4b9ebb4d18452432cc0e7e58ea3f7bea71cf16a9c4db0c021f0efa9c560b8e1c8b97bba7a30f9731fab34ad1c995d7819ad9f115b521a34016d63ebb04cde3642216ca9749cfa1a37a3b5e97377e3f3b9c651decbd7539f0e35b2dd4b988f642a383dd45979d501b0606928809cce68601219f035a0b40acc3797bb5097a8c77ae5354918b1342b3759a92c761c94b5fc5268e15d1f42827ed82b82d18e1afedaf460ad223794681388c262706c11e01e91121026dc4e9e016d2c6dae54e7a850163ad5b98dfc08e5326c501feb0578d2f98195d4531ea4344ca7d2e59
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 004e96ebaee43ff931b741894bf13a40b30e2e84
                       b9199f1f594b6da20dbec47c7007b07e9a96d04a
                       e13fe69449dd0187005eff828bf81964002230e2
                       4423bdf1b1e758571080a315be57d5019af10fa1
                       6f2b91e13708c40ac2b4b0a4270445606f2cc7a5
                       9d43ed52bc2fb827bb0b711c73dcc28252ecd688
                       bd9da5d014a37bcaac1fdc7ababcd2deabc1b9d3
                       4b5878c16507147ce7213729e8ebc97afb4314e7
                       823135a14044a98a084dea47d10decb775d00ce2
                       9d4495929f42602189cb5e5858bba26b5d5e4caf
                       e4f09e82381de946d3c75d0db2d6ccb4b0e116d6
                       ecb999cfb1b3d8920db58b457a246c138a3680ac
                       2542c537d2feb48a9b0e53fddd7d9a936e51aec0
                       02ab37313630e4dd4fd1d4208d3641a97ea76cbf
                       079a4fd1b19a8d48091eba3590d663376c3804bd
                       1c7eecea00544e430183d728496d2653da4790c1
                       22d582ed5e9ea94324317fca8acae39f3d7ab043
                       c3281f2e9034bfe3e87df9ec4793a65cfdede841
                       51511063f6fe86d6c15941ccf765d7b8a15647a1
                       b66b1b16
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [0d:5c:f4:cc:a1:fd:5d:7f:f6:b4:c0:72:49:dd:95:d4:4b:b8:72:83],[56:66:d1:a4]
        modulus: d8b23e65736a3ac823e234847178f917262e3262ba5748d6847671f45680bb89fde9acb7f84e5ea6dbde734c03aa94fe763a99a2cf6952d6d40c3c25161b78e55c3cd3dd61f5ad16c28e26d05514d24cfd96d1781f3d45f87185d99bd23b948dfa5acdb8da07d5ae28bd873e635c25ed341449103eb4e6fdbb23e9d6ae24f59fbad966f5f29c9650a229677a2fcc83890bb28444055e2f90a9741df1edcbf9380506182274fc2bc69e64d3031b0dc128f0e8c38ce383806b2c1d94d3ace6f878dd7bdca603cc554d2ff7838c8e2edbda3edec01fdd0a35b397b84341648ca42a6d44300585fd829b93c97404c13d8aa8ef776cff2eba699dd86d47ff8c608d9d
public exponent: 10001

] 
2022-11-08 06:54:32.789  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-08 06:54:32.790 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-08 06:54:32.791 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-11-08 06:54:32.792 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-08 06:54:32.792  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-11-08 06:54:32.793  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-08 06:54:32.793  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-08 06:54:32.794 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-08 06:54:32.794 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-08 06:54:32.794 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-08 06:54:32.798 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-08 06:54:32.798 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-08 06:54:32.799 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-08 06:54:32.799 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-08 06:54:32.912  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-08 06:54:32.912  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-08 06:54:32.912 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-08 06:54:32.913 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-08 06:54:32.914  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-08 06:54:32.914  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-08 06:54:32.914 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-08 06:54:32.915 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-08 06:54:32.915 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-08 06:54:32.915 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-08 06:54:32.915 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-08 06:54:32.916 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-08 06:54:32.917 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-08 06:54:32.917 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-08 06:54:32.918 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-08 06:54:32.918 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-08 06:54:32.920 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 694778186143002816618083879067426339015281333440
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Nov 08 04:58:43 UTC 2022
           Final Date: Sun Nov 07 04:58:42 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [91:72:4e:12:f6:82:a2:de:98:38:7d:f6:88:f1:f3:46:ec:36:c1:03],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 004e96ebaee43ff931b741894bf13a40b30e2e84
                       b9199f1f594b6da20dbec47c7007b07e9a96d04a
                       e13fe69449dd0187005eff828bf81964002230e2
                       4423bdf1b1e758571080a315be57d5019af10fa1
                       6f2b91e13708c40ac2b4b0a4270445606f2cc7a5
                       9d43ed52bc2fb827bb0b711c73dcc28252ecd688
                       bd9da5d014a37bcaac1fdc7ababcd2deabc1b9d3
                       4b5878c16507147ce7213729e8ebc97afb4314e7
                       823135a14044a98a084dea47d10decb775d00ce2
                       9d4495929f42602189cb5e5858bba26b5d5e4caf
                       e4f09e82381de946d3c75d0db2d6ccb4b0e116d6
                       ecb999cfb1b3d8920db58b457a246c138a3680ac
                       2542c537d2feb48a9b0e53fddd7d9a936e51aec0
                       02ab37313630e4dd4fd1d4208d3641a97ea76cbf
                       079a4fd1b19a8d48091eba3590d663376c3804bd
                       1c7eecea00544e430183d728496d2653da4790c1
                       22d582ed5e9ea94324317fca8acae39f3d7ab043
                       c3281f2e9034bfe3e87df9ec4793a65cfdede841
                       51511063f6fe86d6c15941ccf765d7b8a15647a1
                       b66b1b16
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [7a:62:67:f3:37:6b:d8:3c:de:fc:f7:c3:27:7e:04:9f:bd:7a:7c:64],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

]