Results

By type

          2022-11-17 05:01:12,187 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-11-17 05:01:13,941 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-11-17 05:01:14.667  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Nov 17, 2022 5:01:16 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Nov 17, 2022 5:01:16 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Nov 17, 2022 5:01:16 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Nov 17, 2022 5:01:17 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-11-17 05:01:17.896 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-11-17 05:01:18.215  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-11-17 05:01:18.406  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-11-17 05:01:19.677 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-11-17 05:01:19.682 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
2022-11-17 05:01:19.685 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-11-17 05:01:19.703 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-11-17 05:01:19.767 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2022-11-17 05:01:19.771 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
	{GET [/docs]}: redirectToUi(HttpServletRequest)
2022-11-17 05:01:19.923 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-11-17 05:01:20.777 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Nov 17, 2022 5:01:21 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-11-17 05:01:21.997  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 10.913 seconds (JVM running for 12.894)
Nov 17, 2022 5:01:42 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-11-17 05:02:03.403  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-17 05:02:03.414 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-17 05:02:03.456 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-11-17 05:02:03.462 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-17 05:02:03.487  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-11-17 05:02:03.494  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-17 05:02:03.495  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-17 05:02:03.498 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-17 05:02:03.498 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-17 05:02:03.502 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-17 05:02:03.514 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-17 05:02:03.518 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-17 05:02:03.563 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-17 05:02:03.570 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-17 05:02:03.571 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-17 05:02:03.576 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-17 05:02:04.147  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-17 05:02:04.151  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-17 05:02:04.153 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-17 05:02:04.155 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-17 05:02:04.169  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-17 05:02:04.174  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-17 05:02:04.175 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-17 05:02:04.175 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-17 05:02:04.179 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-17 05:02:04.201 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-17 05:02:04.201 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-17 05:02:04.202 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-17 05:02:04.211 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-17 05:02:04.212 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-17 05:02:04.213 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-17 05:02:04.215 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-17 05:02:04.252 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 670913901201721536346771166226018252366119910527
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Nov 17 04:57:48 UTC 2022
           Final Date: Tue Nov 16 04:57:47 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [bf:12:41:11:0e:2e:45:0b:b5:8f:69:e7:39:31:23:29:21:ba:50:fb],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: bacb842642f314a799f71a54baa7f236df3adaf0
                       f830a397ec3db2e4ffb937a9d92a5a14099d481b
                       81c88c7bb59099413d140d9b3da5c56d6d86ced9
                       a2b1b417da38977f871eaf01165c7ba1b637dd9d
                       66227d2cd9df146e360c40e7a8628d1092c45c56
                       253fa710b69c61a1acb857d0ef96edfd4fa7aee0
                       26c566c3ab2baf7f73fb848d8a276e88b998057c
                       bc86020e546f495b21f59ff8c09b78251e089d56
                       327ebd09cf3dd297485e5560caba4c4520311560
                       42b2b36c708710c668461551dd59c23a9dc77144
                       3fe7c203258cdd2247fa4202fdf5c0d39795b160
                       25a69058b170d9c70675a63301bcb23cc0882de3
                       278834dd123bb33755171e2374679c66fab9a3b7
                       0680b898faf441a295aec00bcebc5070631504fc
                       be199fcbbbbb4c9a5b3f09bdcdd3e951e3b2c6dd
                       8074f299292488ebf4675145fab8dfded5e03611
                       63733a5fcd9f1d41a14c3f0ae81d044403246182
                       2bd0c7abd2a1e2cce239b7fe87db7147b45c32b1
                       6073a2f72a0a74bb8b98df1f6089fcd0b326b790
                       993f6c97
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ae:69:90:7c:e5:36:a7:25:70:b5:bf:2b:27:eb:f7:01:8d:4c:48:6d],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-11-17 06:24:06.742  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-17 06:24:06.747 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-17 06:24:06.751 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-17 06:24:06.756 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-17 06:24:06.756  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-17 06:24:06.758  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-17 06:24:06.759  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-17 06:24:06.759 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-17 06:24:06.760 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-17 06:24:06.764 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-17 06:24:06.771 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-17 06:24:06.773 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-17 06:24:06.774 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-17 06:24:06.775 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-17 06:24:07.029  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-17 06:24:07.030  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-17 06:24:07.031 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-17 06:24:07.031 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-17 06:24:07.035  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-17 06:24:07.036  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-17 06:24:07.036 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-17 06:24:07.037 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-17 06:24:07.037 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-17 06:24:07.038 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-17 06:24:07.039 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-17 06:24:07.039 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-17 06:24:07.040 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-17 06:24:07.040 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-17 06:24:07.041 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-17 06:24:07.042 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-17 06:24:07.047 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 670913901201721536346771166226018252366119910527
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Nov 17 04:57:48 UTC 2022
           Final Date: Tue Nov 16 04:57:47 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [bf:12:41:11:0e:2e:45:0b:b5:8f:69:e7:39:31:23:29:21:ba:50:fb],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: bacb842642f314a799f71a54baa7f236df3adaf0
                       f830a397ec3db2e4ffb937a9d92a5a14099d481b
                       81c88c7bb59099413d140d9b3da5c56d6d86ced9
                       a2b1b417da38977f871eaf01165c7ba1b637dd9d
                       66227d2cd9df146e360c40e7a8628d1092c45c56
                       253fa710b69c61a1acb857d0ef96edfd4fa7aee0
                       26c566c3ab2baf7f73fb848d8a276e88b998057c
                       bc86020e546f495b21f59ff8c09b78251e089d56
                       327ebd09cf3dd297485e5560caba4c4520311560
                       42b2b36c708710c668461551dd59c23a9dc77144
                       3fe7c203258cdd2247fa4202fdf5c0d39795b160
                       25a69058b170d9c70675a63301bcb23cc0882de3
                       278834dd123bb33755171e2374679c66fab9a3b7
                       0680b898faf441a295aec00bcebc5070631504fc
                       be199fcbbbbb4c9a5b3f09bdcdd3e951e3b2c6dd
                       8074f299292488ebf4675145fab8dfded5e03611
                       63733a5fcd9f1d41a14c3f0ae81d044403246182
                       2bd0c7abd2a1e2cce239b7fe87db7147b45c32b1
                       6073a2f72a0a74bb8b98df1f6089fcd0b326b790
                       993f6c97
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [de:d1:2c:50:38:7e:ac:dc:70:b1:54:d0:33:98:0b:34:7e:ce:8a:8c],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-11-17 06:25:52.619  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-17 06:25:52.621 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-17 06:25:52.625 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-11-17 06:25:52.627 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-17 06:25:52.628  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-11-17 06:25:52.629  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-17 06:25:52.629  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-17 06:25:52.630 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-17 06:25:52.630 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-17 06:25:52.639 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-17 06:25:52.647 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-17 06:25:52.648 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-17 06:25:52.649 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-17 06:25:52.649 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-17 06:25:52.828  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-17 06:25:52.830  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-17 06:25:52.831 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-17 06:25:52.831 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-17 06:25:52.833  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-17 06:25:52.834  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-17 06:25:52.835 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-17 06:25:52.835 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-17 06:25:52.836 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-17 06:25:52.837 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-17 06:25:52.837 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-17 06:25:52.837 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-17 06:25:52.838 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-17 06:25:52.838 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-17 06:25:52.838 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-17 06:25:52.839 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-17 06:25:52.846 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 670913901201721536346771166226018252366119910527
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Nov 17 04:57:48 UTC 2022
           Final Date: Tue Nov 16 04:57:47 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [bf:12:41:11:0e:2e:45:0b:b5:8f:69:e7:39:31:23:29:21:ba:50:fb],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: bacb842642f314a799f71a54baa7f236df3adaf0
                       f830a397ec3db2e4ffb937a9d92a5a14099d481b
                       81c88c7bb59099413d140d9b3da5c56d6d86ced9
                       a2b1b417da38977f871eaf01165c7ba1b637dd9d
                       66227d2cd9df146e360c40e7a8628d1092c45c56
                       253fa710b69c61a1acb857d0ef96edfd4fa7aee0
                       26c566c3ab2baf7f73fb848d8a276e88b998057c
                       bc86020e546f495b21f59ff8c09b78251e089d56
                       327ebd09cf3dd297485e5560caba4c4520311560
                       42b2b36c708710c668461551dd59c23a9dc77144
                       3fe7c203258cdd2247fa4202fdf5c0d39795b160
                       25a69058b170d9c70675a63301bcb23cc0882de3
                       278834dd123bb33755171e2374679c66fab9a3b7
                       0680b898faf441a295aec00bcebc5070631504fc
                       be199fcbbbbb4c9a5b3f09bdcdd3e951e3b2c6dd
                       8074f299292488ebf4675145fab8dfded5e03611
                       63733a5fcd9f1d41a14c3f0ae81d044403246182
                       2bd0c7abd2a1e2cce239b7fe87db7147b45c32b1
                       6073a2f72a0a74bb8b98df1f6089fcd0b326b790
                       993f6c97
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [72:6e:5d:db:36:3d:41:b0:3f:b2:19:fa:02:5a:77:c9:d4:de:6d:93],[56:66:d1:a4]
        modulus: c8e15c01f6624db3d968fb3701c5b851ab0b94cf5234d78bb772e11c7de9496dae553948efe252678844668d255d66d584440f8f3c9af276ca2c8f73a85ea9710ecb671c1d48c24096dd42bb949be4997d95a31e1229b4612dbbb22d400852a672018f547bc04eec72e01fbc23fe26d2f6865dd00751f2d11f93cbc3d460bc38fac8850eaae35621297f4f7a080b44b0f41b82951ac8cbf964584ea9e7e2910db7539f331a3665461172358ec83ce14d54c9cc5fc29298b7335101b479e1b71921ca51cd82aca712ab8c62023874d8e457f0f5b1c88337cd1a42e14e0a5c76fc2961073082e50418ec4ba9d380422e979e287c21d195cef9557fde3aad2c794d
public exponent: 10001

] 
2022-11-17 06:27:30.521  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-17 06:27:30.532 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-17 06:27:30.534 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-11-17 06:27:30.536 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-17 06:27:30.536  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-11-17 06:27:30.537  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-17 06:27:30.537  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-17 06:27:30.537 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-17 06:27:30.538 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-17 06:27:30.538 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-17 06:27:30.555 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-17 06:27:30.557 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-17 06:27:30.557 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-17 06:27:30.558 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-17 06:27:30.861  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-17 06:27:30.862  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-17 06:27:30.862 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-17 06:27:30.863 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-17 06:27:30.901  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-17 06:27:30.902  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-17 06:27:30.903 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-17 06:27:30.903 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-17 06:27:30.903 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-17 06:27:30.904 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-17 06:27:30.904 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-17 06:27:30.905 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-17 06:27:30.906 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-17 06:27:30.906 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-17 06:27:30.906 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-17 06:27:30.907 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-17 06:27:30.911 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 670913901201721536346771166226018252366119910527
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Nov 17 04:57:48 UTC 2022
           Final Date: Tue Nov 16 04:57:47 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [bf:12:41:11:0e:2e:45:0b:b5:8f:69:e7:39:31:23:29:21:ba:50:fb],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: bacb842642f314a799f71a54baa7f236df3adaf0
                       f830a397ec3db2e4ffb937a9d92a5a14099d481b
                       81c88c7bb59099413d140d9b3da5c56d6d86ced9
                       a2b1b417da38977f871eaf01165c7ba1b637dd9d
                       66227d2cd9df146e360c40e7a8628d1092c45c56
                       253fa710b69c61a1acb857d0ef96edfd4fa7aee0
                       26c566c3ab2baf7f73fb848d8a276e88b998057c
                       bc86020e546f495b21f59ff8c09b78251e089d56
                       327ebd09cf3dd297485e5560caba4c4520311560
                       42b2b36c708710c668461551dd59c23a9dc77144
                       3fe7c203258cdd2247fa4202fdf5c0d39795b160
                       25a69058b170d9c70675a63301bcb23cc0882de3
                       278834dd123bb33755171e2374679c66fab9a3b7
                       0680b898faf441a295aec00bcebc5070631504fc
                       be199fcbbbbb4c9a5b3f09bdcdd3e951e3b2c6dd
                       8074f299292488ebf4675145fab8dfded5e03611
                       63733a5fcd9f1d41a14c3f0ae81d044403246182
                       2bd0c7abd2a1e2cce239b7fe87db7147b45c32b1
                       6073a2f72a0a74bb8b98df1f6089fcd0b326b790
                       993f6c97
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [93:fc:24:81:05:b0:7c:af:3b:20:f5:61:00:05:64:7a:0a:f0:77:a9],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-11-17 06:29:49.611  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-17 06:29:49.617 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-17 06:29:49.621 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-17 06:29:49.622 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-17 06:29:49.624  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-17 06:29:49.624  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-17 06:29:49.625  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-17 06:29:49.626 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-17 06:29:49.626 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-17 06:29:49.626 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-17 06:29:49.631 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-17 06:29:49.633 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-17 06:29:49.634 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-17 06:29:49.634 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-17 06:29:49.838  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-17 06:29:49.840  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-17 06:29:49.840 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-17 06:29:49.840 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-17 06:29:49.842  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-17 06:29:49.842  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-17 06:29:49.843 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-17 06:29:49.843 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-17 06:29:49.843 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-17 06:29:49.844 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-17 06:29:49.846 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-17 06:29:49.846 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-17 06:29:49.848 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-17 06:29:49.848 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-17 06:29:49.848 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-17 06:29:49.853 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-17 06:29:49.862 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 670913901201721536346771166226018252366119910527
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Nov 17 04:57:48 UTC 2022
           Final Date: Tue Nov 16 04:57:47 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [bf:12:41:11:0e:2e:45:0b:b5:8f:69:e7:39:31:23:29:21:ba:50:fb],[56:66:d1:a4]
        modulus: f6faec2a6d4250cd5ca57527231fc5f6ad459f99690a4c8cfe133188a986b20b686ea6cbd3f069e5acdbacb9bffca5b4e48462aaef3241e102f2abc6d3f81376a766147f23b9b9bbdcf095e234374e87e263e3e2ee6f9da2f54b571c30f5a38b9fb453d32f69b55a88d40cbad793af844d9379d62463f81991f8f25dd898a052773f2a729ee36252dd16508498ccb3abfd609200b9b1d9ac5b0ec81657848c403f3bfa47dc0a3906532a9f19903481b719e962aa3f752e6542993b9a7c6a3d7fce85fd7c50152513081507c015ad46ddbf9c4b3f6fdb0aa66fdae9517b9c7decd417593be98633b130c4d44ce2306447e5ce192de1978c123625e19a7d7bc7f62af309925f0f9d423ce08e037cb5839657a4463cc426bf189c81a0f255db33e7865b653b31db045eda389de5825dc645651a525ea572f48b993ba89aa2579ca7cca4417de194d09052694ba1585d80f3660287727e989adf8a0d48d298608e862fda4b52ef9963156e7d231f09249811f502896abd7d84715e58a016d4c8c7b7
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: bacb842642f314a799f71a54baa7f236df3adaf0
                       f830a397ec3db2e4ffb937a9d92a5a14099d481b
                       81c88c7bb59099413d140d9b3da5c56d6d86ced9
                       a2b1b417da38977f871eaf01165c7ba1b637dd9d
                       66227d2cd9df146e360c40e7a8628d1092c45c56
                       253fa710b69c61a1acb857d0ef96edfd4fa7aee0
                       26c566c3ab2baf7f73fb848d8a276e88b998057c
                       bc86020e546f495b21f59ff8c09b78251e089d56
                       327ebd09cf3dd297485e5560caba4c4520311560
                       42b2b36c708710c668461551dd59c23a9dc77144
                       3fe7c203258cdd2247fa4202fdf5c0d39795b160
                       25a69058b170d9c70675a63301bcb23cc0882de3
                       278834dd123bb33755171e2374679c66fab9a3b7
                       0680b898faf441a295aec00bcebc5070631504fc
                       be199fcbbbbb4c9a5b3f09bdcdd3e951e3b2c6dd
                       8074f299292488ebf4675145fab8dfded5e03611
                       63733a5fcd9f1d41a14c3f0ae81d044403246182
                       2bd0c7abd2a1e2cce239b7fe87db7147b45c32b1
                       6073a2f72a0a74bb8b98df1f6089fcd0b326b790
                       993f6c97
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [a2:e4:de:05:94:86:8b:70:d9:47:9d:39:84:96:a8:a3:87:74:20:90],[56:66:d1:a4]
        modulus: 9b81ee83d296be910daffc929e2772d9cf853754abf86d76dc7c0f7510173160e81925d70043386ec52cbc0ae7c1f52da07a2a846dae4347056542d4bdac7a53025cb7dadaefadcbc3ab068ce63be631e6d350d4034bee5346c0a94bf7afa909b032b4fa86cbe1ee66b8a3c8fd86cc4150c0c99793c4ef86f6ca53fcf9746d332e6ddc307f568ddb2245cd79eb43ee50263af2b94d9ee0cbc59f7b56090bd008e0e4f68c27dd4fb091dcf19535dcf60042d4a1e5053cdefac102506cf4aeb25bf091b6e38ed483b4b3c0c9236b5b382b6648dabb972ea12bca3edefe9616de6248aa28d3dbac36b75a9b4c85ae58638309955cf3103beaac0fe421164f291227
public exponent: 10001

] 
2022-11-17 06:35:54.550  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-17 06:35:54.567 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-17 06:35:54.572 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-17 06:35:54.574 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-17 06:35:54.575  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-17 06:35:54.575  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-17 06:35:54.576  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-17 06:35:54.576 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-17 06:35:54.577 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-17 06:35:54.577 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-17 06:35:54.586 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-17 06:35:54.587 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-17 06:35:54.588 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-17 06:35:54.589 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-17 06:35:54.800  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-17 06:35:54.801  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-17 06:35:54.802 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-17 06:35:54.803 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-17 06:35:54.804  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-17 06:35:54.805  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-17 06:35:54.805 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-17 06:35:54.806 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-17 06:35:54.807 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-17 06:35:54.809 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-17 06:35:54.810 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-17 06:35:54.810 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-17 06:35:54.812 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-17 06:35:54.812 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-17 06:35:54.813 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-17 06:35:54.814 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-17 06:35:54.829 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 670913901201721536346771166226018252366119910527
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Nov 17 04:57:48 UTC 2022
           Final Date: Tue Nov 16 04:57:47 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [bf:12:41:11:0e:2e:45:0b:b5:8f:69:e7:39:31:23:29:21:ba:50:fb],[56:66:d1:a4]
        modulus: f6faec2a6d4250cd5ca57527231fc5f6ad459f99690a4c8cfe133188a986b20b686ea6cbd3f069e5acdbacb9bffca5b4e48462aaef3241e102f2abc6d3f81376a766147f23b9b9bbdcf095e234374e87e263e3e2ee6f9da2f54b571c30f5a38b9fb453d32f69b55a88d40cbad793af844d9379d62463f81991f8f25dd898a052773f2a729ee36252dd16508498ccb3abfd609200b9b1d9ac5b0ec81657848c403f3bfa47dc0a3906532a9f19903481b719e962aa3f752e6542993b9a7c6a3d7fce85fd7c50152513081507c015ad46ddbf9c4b3f6fdb0aa66fdae9517b9c7decd417593be98633b130c4d44ce2306447e5ce192de1978c123625e19a7d7bc7f62af309925f0f9d423ce08e037cb5839657a4463cc426bf189c81a0f255db33e7865b653b31db045eda389de5825dc645651a525ea572f48b993ba89aa2579ca7cca4417de194d09052694ba1585d80f3660287727e989adf8a0d48d298608e862fda4b52ef9963156e7d231f09249811f502896abd7d84715e58a016d4c8c7b7
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: bacb842642f314a799f71a54baa7f236df3adaf0
                       f830a397ec3db2e4ffb937a9d92a5a14099d481b
                       81c88c7bb59099413d140d9b3da5c56d6d86ced9
                       a2b1b417da38977f871eaf01165c7ba1b637dd9d
                       66227d2cd9df146e360c40e7a8628d1092c45c56
                       253fa710b69c61a1acb857d0ef96edfd4fa7aee0
                       26c566c3ab2baf7f73fb848d8a276e88b998057c
                       bc86020e546f495b21f59ff8c09b78251e089d56
                       327ebd09cf3dd297485e5560caba4c4520311560
                       42b2b36c708710c668461551dd59c23a9dc77144
                       3fe7c203258cdd2247fa4202fdf5c0d39795b160
                       25a69058b170d9c70675a63301bcb23cc0882de3
                       278834dd123bb33755171e2374679c66fab9a3b7
                       0680b898faf441a295aec00bcebc5070631504fc
                       be199fcbbbbb4c9a5b3f09bdcdd3e951e3b2c6dd
                       8074f299292488ebf4675145fab8dfded5e03611
                       63733a5fcd9f1d41a14c3f0ae81d044403246182
                       2bd0c7abd2a1e2cce239b7fe87db7147b45c32b1
                       6073a2f72a0a74bb8b98df1f6089fcd0b326b790
                       993f6c97
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [d3:0f:bd:2f:2c:da:2f:38:e1:cb:c0:60:2a:dd:93:fc:18:40:c5:cd],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-11-17 06:40:46.584  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-17 06:40:46.586 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-17 06:40:46.593 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-17 06:40:46.595 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-17 06:40:46.597  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-17 06:40:46.597  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-17 06:40:46.598  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-17 06:40:46.598 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-17 06:40:46.598 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-17 06:40:46.599 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-17 06:40:46.625 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-17 06:40:46.629 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-17 06:40:46.630 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-17 06:40:46.630 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-17 06:40:46.801  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-17 06:40:46.802  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-17 06:40:46.802 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-17 06:40:46.802 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-17 06:40:46.805  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-17 06:40:46.805  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-17 06:40:46.806 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-17 06:40:46.808 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-17 06:40:46.808 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-17 06:40:46.810 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-17 06:40:46.810 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-17 06:40:46.820 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-17 06:40:46.822 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-17 06:40:46.823 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-17 06:40:46.824 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-17 06:40:46.826 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-17 06:40:46.833 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 670913901201721536346771166226018252366119910527
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Nov 17 04:57:48 UTC 2022
           Final Date: Tue Nov 16 04:57:47 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [bf:12:41:11:0e:2e:45:0b:b5:8f:69:e7:39:31:23:29:21:ba:50:fb],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: bacb842642f314a799f71a54baa7f236df3adaf0
                       f830a397ec3db2e4ffb937a9d92a5a14099d481b
                       81c88c7bb59099413d140d9b3da5c56d6d86ced9
                       a2b1b417da38977f871eaf01165c7ba1b637dd9d
                       66227d2cd9df146e360c40e7a8628d1092c45c56
                       253fa710b69c61a1acb857d0ef96edfd4fa7aee0
                       26c566c3ab2baf7f73fb848d8a276e88b998057c
                       bc86020e546f495b21f59ff8c09b78251e089d56
                       327ebd09cf3dd297485e5560caba4c4520311560
                       42b2b36c708710c668461551dd59c23a9dc77144
                       3fe7c203258cdd2247fa4202fdf5c0d39795b160
                       25a69058b170d9c70675a63301bcb23cc0882de3
                       278834dd123bb33755171e2374679c66fab9a3b7
                       0680b898faf441a295aec00bcebc5070631504fc
                       be199fcbbbbb4c9a5b3f09bdcdd3e951e3b2c6dd
                       8074f299292488ebf4675145fab8dfded5e03611
                       63733a5fcd9f1d41a14c3f0ae81d044403246182
                       2bd0c7abd2a1e2cce239b7fe87db7147b45c32b1
                       6073a2f72a0a74bb8b98df1f6089fcd0b326b790
                       993f6c97
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [df:f1:a8:10:b9:e2:36:2d:e1:38:a3:12:28:cf:28:81:79:1b:c8:a7],[56:66:d1:a4]
        modulus: d6dcb86ba7a2bf15b8a4f050522696b6d8a3b02732722983c805f62ab7cb10eff3ce5d4af9690f4a9ff408d1b987816c66797aa728e3bbe305a43d68474c0eced48a1c050824ec71e4da9bffea3835faff4a627a3a0aa879f8e7adbc95c024399ed40365ae74bcfa022b8b3319f328d0c6128dad47ccfafa8c5f350bbf7e9839a4c9d06d2483e5e96444d434c38bc89bd2d114ba6168a6689de83345ba3fed275cc70b311db8a22a51951b4755e62c69fa9dcd6dcba4e1e0a50dac5b78cb815255337953504faaeeb416f1eec922d24c162f4ac4681ff09a953716909849e8944e23402cae6ac90063698c59263a8ed6276b46ecc5b1db2b32f41f3186ea410d
public exponent: 10001

] 
2022-11-17 06:47:46.006  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-17 06:47:46.010 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-17 06:47:46.014 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-11-17 06:47:46.017 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-17 06:47:46.018  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-11-17 06:47:46.019  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-17 06:47:46.019  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-17 06:47:46.019 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-17 06:47:46.020 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-17 06:47:46.021 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-17 06:47:46.026 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-17 06:47:46.028 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-17 06:47:46.028 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-17 06:47:46.029 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-17 06:47:46.203  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-17 06:47:46.204  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-17 06:47:46.204 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-17 06:47:46.204 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-17 06:47:46.206  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-17 06:47:46.206  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-17 06:47:46.207 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-17 06:47:46.207 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-17 06:47:46.207 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-17 06:47:46.208 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-17 06:47:46.209 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-17 06:47:46.209 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-17 06:47:46.209 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-17 06:47:46.210 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-17 06:47:46.210 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-17 06:47:46.210 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-17 06:47:46.213 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 670913901201721536346771166226018252366119910527
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Nov 17 04:57:48 UTC 2022
           Final Date: Tue Nov 16 04:57:47 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [bf:12:41:11:0e:2e:45:0b:b5:8f:69:e7:39:31:23:29:21:ba:50:fb],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: bacb842642f314a799f71a54baa7f236df3adaf0
                       f830a397ec3db2e4ffb937a9d92a5a14099d481b
                       81c88c7bb59099413d140d9b3da5c56d6d86ced9
                       a2b1b417da38977f871eaf01165c7ba1b637dd9d
                       66227d2cd9df146e360c40e7a8628d1092c45c56
                       253fa710b69c61a1acb857d0ef96edfd4fa7aee0
                       26c566c3ab2baf7f73fb848d8a276e88b998057c
                       bc86020e546f495b21f59ff8c09b78251e089d56
                       327ebd09cf3dd297485e5560caba4c4520311560
                       42b2b36c708710c668461551dd59c23a9dc77144
                       3fe7c203258cdd2247fa4202fdf5c0d39795b160
                       25a69058b170d9c70675a63301bcb23cc0882de3
                       278834dd123bb33755171e2374679c66fab9a3b7
                       0680b898faf441a295aec00bcebc5070631504fc
                       be199fcbbbbb4c9a5b3f09bdcdd3e951e3b2c6dd
                       8074f299292488ebf4675145fab8dfded5e03611
                       63733a5fcd9f1d41a14c3f0ae81d044403246182
                       2bd0c7abd2a1e2cce239b7fe87db7147b45c32b1
                       6073a2f72a0a74bb8b98df1f6089fcd0b326b790
                       993f6c97
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [c2:e7:95:32:7e:45:75:f4:ca:26:f1:7e:68:d1:29:c0:0b:66:10:07],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-11-17 06:53:30.443  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-17 06:53:30.446 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-17 06:53:30.454 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-11-17 06:53:30.455 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-17 06:53:30.457  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-11-17 06:53:30.459  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-17 06:53:30.459  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-17 06:53:30.461 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-17 06:53:30.461 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-17 06:53:30.461 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-17 06:53:30.466 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-17 06:53:30.467 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-17 06:53:30.468 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-17 06:53:30.468 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-17 06:53:30.735  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-17 06:53:30.736  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-17 06:53:30.736 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-17 06:53:30.737 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-17 06:53:30.738  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-17 06:53:30.739  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-17 06:53:30.740 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-17 06:53:30.740 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-17 06:53:30.740 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-17 06:53:30.746 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-17 06:53:30.749 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-17 06:53:30.750 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-17 06:53:30.751 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-17 06:53:30.751 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-17 06:53:30.751 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-17 06:53:30.752 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-17 06:53:30.755 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 670913901201721536346771166226018252366119910527
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Nov 17 04:57:48 UTC 2022
           Final Date: Tue Nov 16 04:57:47 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [bf:12:41:11:0e:2e:45:0b:b5:8f:69:e7:39:31:23:29:21:ba:50:fb],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: bacb842642f314a799f71a54baa7f236df3adaf0
                       f830a397ec3db2e4ffb937a9d92a5a14099d481b
                       81c88c7bb59099413d140d9b3da5c56d6d86ced9
                       a2b1b417da38977f871eaf01165c7ba1b637dd9d
                       66227d2cd9df146e360c40e7a8628d1092c45c56
                       253fa710b69c61a1acb857d0ef96edfd4fa7aee0
                       26c566c3ab2baf7f73fb848d8a276e88b998057c
                       bc86020e546f495b21f59ff8c09b78251e089d56
                       327ebd09cf3dd297485e5560caba4c4520311560
                       42b2b36c708710c668461551dd59c23a9dc77144
                       3fe7c203258cdd2247fa4202fdf5c0d39795b160
                       25a69058b170d9c70675a63301bcb23cc0882de3
                       278834dd123bb33755171e2374679c66fab9a3b7
                       0680b898faf441a295aec00bcebc5070631504fc
                       be199fcbbbbb4c9a5b3f09bdcdd3e951e3b2c6dd
                       8074f299292488ebf4675145fab8dfded5e03611
                       63733a5fcd9f1d41a14c3f0ae81d044403246182
                       2bd0c7abd2a1e2cce239b7fe87db7147b45c32b1
                       6073a2f72a0a74bb8b98df1f6089fcd0b326b790
                       993f6c97
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ce:ca:aa:a2:52:c1:e8:4b:6d:4c:37:4b:c4:af:0d:3e:8e:64:78:f6],[56:66:d1:a4]
        modulus: bf7b7244313bff2248339a6806d1331f0bd7fdec2c9f84c3eeb71acd09b2bb2a42a9c250a2766f3a523f98b26a5c7b7afca11cf8eb20a0820f9d2b6b2528a144e0260ee7987fac30a56ba96e2777366648f998339390522a4822141d7e58b00833aa10b488d13ae06d188d87d52b000cdfe24a22cd1a778b2c2e17653becf6bb896bd7b698530bcb819b66d23966d033c7a3a966e5dc53b9c2ac9dae5325a18165e0490bc8e751b9808a770da1cb4592481af9c04feaa57809d16ab107b1db69a43638e3a52faa009507ce2eb317286578543c258d86175f6679ad6c6221e171dd59d15a60232dde21f72d7564e0d43e25f12fcfbdaaec10e60952088664f405
public exponent: 10001

] 
2022-11-17 06:53:47.364  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-17 06:53:47.365 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-17 06:53:47.367 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-11-17 06:53:47.368 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-17 06:53:47.368  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-11-17 06:53:47.368  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-17 06:53:47.368  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-17 06:53:47.369 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-17 06:53:47.369 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-17 06:53:47.369 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-17 06:53:47.373 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-17 06:53:47.381 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-17 06:53:47.382 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-17 06:53:47.382 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-17 06:53:47.512  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-17 06:53:47.513  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-17 06:53:47.514 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-17 06:53:47.514 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-17 06:53:47.516  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-17 06:53:47.518  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-17 06:53:47.522 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-17 06:53:47.523 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-17 06:53:47.524 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-17 06:53:47.525 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-17 06:53:47.526 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-17 06:53:47.526 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-17 06:53:47.527 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-17 06:53:47.528 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-17 06:53:47.528 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-17 06:53:47.529 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-17 06:53:47.535 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 670913901201721536346771166226018252366119910527
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Nov 17 04:57:48 UTC 2022
           Final Date: Tue Nov 16 04:57:47 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [bf:12:41:11:0e:2e:45:0b:b5:8f:69:e7:39:31:23:29:21:ba:50:fb],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: bacb842642f314a799f71a54baa7f236df3adaf0
                       f830a397ec3db2e4ffb937a9d92a5a14099d481b
                       81c88c7bb59099413d140d9b3da5c56d6d86ced9
                       a2b1b417da38977f871eaf01165c7ba1b637dd9d
                       66227d2cd9df146e360c40e7a8628d1092c45c56
                       253fa710b69c61a1acb857d0ef96edfd4fa7aee0
                       26c566c3ab2baf7f73fb848d8a276e88b998057c
                       bc86020e546f495b21f59ff8c09b78251e089d56
                       327ebd09cf3dd297485e5560caba4c4520311560
                       42b2b36c708710c668461551dd59c23a9dc77144
                       3fe7c203258cdd2247fa4202fdf5c0d39795b160
                       25a69058b170d9c70675a63301bcb23cc0882de3
                       278834dd123bb33755171e2374679c66fab9a3b7
                       0680b898faf441a295aec00bcebc5070631504fc
                       be199fcbbbbb4c9a5b3f09bdcdd3e951e3b2c6dd
                       8074f299292488ebf4675145fab8dfded5e03611
                       63733a5fcd9f1d41a14c3f0ae81d044403246182
                       2bd0c7abd2a1e2cce239b7fe87db7147b45c32b1
                       6073a2f72a0a74bb8b98df1f6089fcd0b326b790
                       993f6c97
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [38:a1:82:f8:b3:9b:a0:b0:66:e9:91:8d:be:35:d6:c2:a5:1e:8c:5f],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-11-17 07:17:13.883  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-17 07:17:13.886 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-17 07:17:13.888 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-11-17 07:17:13.890 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-17 07:17:13.890  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-11-17 07:17:13.890  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-17 07:17:13.891  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-17 07:17:13.891 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-17 07:17:13.891 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-17 07:17:13.892 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-17 07:17:13.896 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-17 07:17:13.897 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-17 07:17:13.897 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-17 07:17:13.898 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-17 07:17:14.045  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-17 07:17:14.045  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-17 07:17:14.046 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-17 07:17:14.046 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-17 07:17:14.047  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-17 07:17:14.047  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-17 07:17:14.047 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-17 07:17:14.047 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-17 07:17:14.047 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-17 07:17:14.048 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-17 07:17:14.048 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-17 07:17:14.048 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-17 07:17:14.048 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-17 07:17:14.049 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-17 07:17:14.049 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-17 07:17:14.049 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-17 07:17:14.052 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 670913901201721536346771166226018252366119910527
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Nov 17 04:57:48 UTC 2022
           Final Date: Tue Nov 16 04:57:47 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [bf:12:41:11:0e:2e:45:0b:b5:8f:69:e7:39:31:23:29:21:ba:50:fb],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: bacb842642f314a799f71a54baa7f236df3adaf0
                       f830a397ec3db2e4ffb937a9d92a5a14099d481b
                       81c88c7bb59099413d140d9b3da5c56d6d86ced9
                       a2b1b417da38977f871eaf01165c7ba1b637dd9d
                       66227d2cd9df146e360c40e7a8628d1092c45c56
                       253fa710b69c61a1acb857d0ef96edfd4fa7aee0
                       26c566c3ab2baf7f73fb848d8a276e88b998057c
                       bc86020e546f495b21f59ff8c09b78251e089d56
                       327ebd09cf3dd297485e5560caba4c4520311560
                       42b2b36c708710c668461551dd59c23a9dc77144
                       3fe7c203258cdd2247fa4202fdf5c0d39795b160
                       25a69058b170d9c70675a63301bcb23cc0882de3
                       278834dd123bb33755171e2374679c66fab9a3b7
                       0680b898faf441a295aec00bcebc5070631504fc
                       be199fcbbbbb4c9a5b3f09bdcdd3e951e3b2c6dd
                       8074f299292488ebf4675145fab8dfded5e03611
                       63733a5fcd9f1d41a14c3f0ae81d044403246182
                       2bd0c7abd2a1e2cce239b7fe87db7147b45c32b1
                       6073a2f72a0a74bb8b98df1f6089fcd0b326b790
                       993f6c97
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [36:f5:3f:9e:f3:cb:bf:1a:a5:cf:31:8e:24:42:5c:ca:5f:f3:de:a7],[56:66:d1:a4]
        modulus: bd329c9f2459adde620f8a4cb4d9dd9da5b16929e955445dbf0ad4d7724a403136c5ccb05b5e3be599854d519b2a6ed4f8fa8a0af034ac9d321ee3bb5e2291ace6d72b6109e813fb3635bb52f5d28d28b062520f6d5297f45952e513bc367ea9601c8555d0b67054b56daa627ea14a76d8a1e65de8cfae79d979dcda4cb357d53e5eb71cf3de0122e443ea3e22af811778a57471abbaea6c385d1478b559b68883d15a48fe192e5ff306aabc990006ecafdd3ded2c49efc0dff5982d689d2d208336ea7716a340d84ba70d1d3f99378e6db88956bd00f9dfd7aa5f8e702e40947bf73d59e480d5e43f756961aebb9050db6731c6f3a82402d93fbd54996ee2f7
public exponent: 10001

] 
2022-11-17 07:17:32.663  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-17 07:17:32.664 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-17 07:17:32.666 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-11-17 07:17:32.667 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-17 07:17:32.668  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-11-17 07:17:32.668  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-17 07:17:32.668  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-17 07:17:32.668 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-17 07:17:32.669 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-17 07:17:32.669 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-17 07:17:32.677 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-17 07:17:32.683 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-17 07:17:32.684 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-17 07:17:32.684 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-17 07:17:32.800  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-17 07:17:32.801  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-17 07:17:32.801 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-17 07:17:32.801 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-17 07:17:32.804  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-17 07:17:32.814  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-17 07:17:32.814 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-17 07:17:32.815 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-17 07:17:32.815 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-17 07:17:32.816 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-17 07:17:32.817 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-17 07:17:32.817 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-17 07:17:32.821 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-17 07:17:32.822 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-17 07:17:32.823 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-17 07:17:32.824 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-17 07:17:32.829 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 670913901201721536346771166226018252366119910527
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Nov 17 04:57:48 UTC 2022
           Final Date: Tue Nov 16 04:57:47 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [bf:12:41:11:0e:2e:45:0b:b5:8f:69:e7:39:31:23:29:21:ba:50:fb],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: bacb842642f314a799f71a54baa7f236df3adaf0
                       f830a397ec3db2e4ffb937a9d92a5a14099d481b
                       81c88c7bb59099413d140d9b3da5c56d6d86ced9
                       a2b1b417da38977f871eaf01165c7ba1b637dd9d
                       66227d2cd9df146e360c40e7a8628d1092c45c56
                       253fa710b69c61a1acb857d0ef96edfd4fa7aee0
                       26c566c3ab2baf7f73fb848d8a276e88b998057c
                       bc86020e546f495b21f59ff8c09b78251e089d56
                       327ebd09cf3dd297485e5560caba4c4520311560
                       42b2b36c708710c668461551dd59c23a9dc77144
                       3fe7c203258cdd2247fa4202fdf5c0d39795b160
                       25a69058b170d9c70675a63301bcb23cc0882de3
                       278834dd123bb33755171e2374679c66fab9a3b7
                       0680b898faf441a295aec00bcebc5070631504fc
                       be199fcbbbbb4c9a5b3f09bdcdd3e951e3b2c6dd
                       8074f299292488ebf4675145fab8dfded5e03611
                       63733a5fcd9f1d41a14c3f0ae81d044403246182
                       2bd0c7abd2a1e2cce239b7fe87db7147b45c32b1
                       6073a2f72a0a74bb8b98df1f6089fcd0b326b790
                       993f6c97
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [85:9f:83:ff:fc:d6:7a:ca:47:5c:10:ab:69:ac:e1:df:b6:88:64:c7],[56:66:d1:a4]
        modulus: 9b4a960f08d5d759b4a1c81b82ec715879ba5ed698d9972ace5a22f671b40325cfaa194de7baa1313d6f663d40c328967bb2bb43083c88643c637e78e2fac2555fd4cd88632f009af20848ad434bdb59d3a67ff0538b86158a1a8ced3d34ffec3f6ef073ba31a26981be836021e1bdc70850e24dc60d22a3a2162db498e640e52c721e6e8e190dc9a20deb21d592edf06e7a989c8d162027fce9eabb1895dc04a208e034d760fafd5a57e144fc43160db60a6bbcb7d93ad16e76f7716460420ab7d979eb07e3e50cffaf96fca0e219812fd2aab4dfaac76b91fe3652c4c398fe01c981b0adb6ca70b6551719cdc6f8a56703a43fc073553cec9a1044ea9f35b3
public exponent: 10001

]