Results

By type

          2022-11-18 05:01:12,253 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-11-18 05:01:13,546 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-11-18 05:01:14.230  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Nov 18, 2022 5:01:16 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Nov 18, 2022 5:01:16 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Nov 18, 2022 5:01:16 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Nov 18, 2022 5:01:16 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-11-18 05:01:16.650 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-11-18 05:01:16.935  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-11-18 05:01:17.098  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-11-18 05:01:17.753 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-11-18 05:01:17.756 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
2022-11-18 05:01:17.757 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-11-18 05:01:17.761 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-11-18 05:01:17.796 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2022-11-18 05:01:17.800 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
	{GET [/docs]}: redirectToUi(HttpServletRequest)
2022-11-18 05:01:17.914 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-11-18 05:01:18.487 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Nov 18, 2022 5:01:19 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-11-18 05:01:19.314  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 7.933 seconds (JVM running for 9.65)
Nov 18, 2022 5:01:45 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-11-18 05:02:04.223  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-18 05:02:04.231 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-18 05:02:04.266 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-11-18 05:02:04.269 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-18 05:02:04.284  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-11-18 05:02:04.286  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-18 05:02:04.287  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-18 05:02:04.288 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-18 05:02:04.288 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-18 05:02:04.292 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-18 05:02:04.300 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-18 05:02:04.303 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-18 05:02:04.352 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-18 05:02:04.357 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-18 05:02:04.357 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-18 05:02:04.360 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-18 05:02:05.135  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-18 05:02:05.137  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-18 05:02:05.138 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-18 05:02:05.139 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-18 05:02:05.147  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-18 05:02:05.148  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-18 05:02:05.149 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-18 05:02:05.149 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-18 05:02:05.149 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-18 05:02:05.165 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-18 05:02:05.165 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-18 05:02:05.166 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-18 05:02:05.171 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-18 05:02:05.172 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-18 05:02:05.172 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-18 05:02:05.173 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-18 05:02:05.204 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 97911601099806791574591128761214879510810573038
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Nov 18 04:57:30 UTC 2022
           Final Date: Wed Nov 17 04:57:29 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [4e:b2:d5:69:a9:ec:df:ef:ed:77:d5:ea:e0:f1:cd:25:70:1d:de:f6],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3ea2a7794aae6dfde6251e1e87bd5acd7c2ca3f0
                       bc57c1f1fe8ea14f7550858bcbf4812b6d79c53f
                       dd99a5e531f770dc88d640597c190cb21741e8cf
                       8af25c72acd81b0256f1378dcd91b1bda41b3770
                       323f54927e199204158bb49bacfb8212c0f4519b
                       16d86c4f53eed2b081d425d85ea82809dfeec56f
                       7ddcc8c24578c226e237d790252818893219f2c7
                       bfb6d3af75a4efb64a958297bd9d08cd4b881d33
                       9d455de43dbde9babf1a47e70a70faab3aa2d51e
                       ea875405b7fecc69bc802903f733ffd4db2d734e
                       9e0b6fe4f8d9a15a24e58c71d1333f1fa4542ab1
                       f8bf9eb641fd8c7e127d0625e63748c05f94db15
                       04a68366b4b40d82dbfdb3cba33db11b9512a9c5
                       26417f8eeaa1e7d2e2ba4fb75e97de88ec2ecbe2
                       a90d469331f17cc7818c926818a316604beec065
                       6a50187e2daf4c6c448d62e1a5e7e7b2090a7891
                       7518bcfe7cde9c979271a5b2e1145ffcb7f6d319
                       031053226f2128bef7df2fbf7dcbf03e2051b40f
                       8a9279ea153d0c78788ff328cedf1bee185b6ba9
                       51438af4
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ff:3a:58:4d:b5:ff:d0:9d:93:7f:20:09:de:8e:0c:6f:08:40:b2:8f],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-11-18 06:20:59.356  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-18 06:20:59.359 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-18 06:20:59.361 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-18 06:20:59.362 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-18 06:20:59.363  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-18 06:20:59.363  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-18 06:20:59.364  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-18 06:20:59.364 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-18 06:20:59.365 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-18 06:20:59.365 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-18 06:20:59.370 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-18 06:20:59.371 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-18 06:20:59.371 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-18 06:20:59.371 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-18 06:20:59.551  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-18 06:20:59.552  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-18 06:20:59.553 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-18 06:20:59.553 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-18 06:20:59.556  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-18 06:20:59.556  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-18 06:20:59.557 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-18 06:20:59.557 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-18 06:20:59.558 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-18 06:20:59.559 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-18 06:20:59.560 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-18 06:20:59.560 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-18 06:20:59.561 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-18 06:20:59.562 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-18 06:20:59.562 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-18 06:20:59.563 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-18 06:20:59.567 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 97911601099806791574591128761214879510810573038
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Nov 18 04:57:30 UTC 2022
           Final Date: Wed Nov 17 04:57:29 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [4e:b2:d5:69:a9:ec:df:ef:ed:77:d5:ea:e0:f1:cd:25:70:1d:de:f6],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3ea2a7794aae6dfde6251e1e87bd5acd7c2ca3f0
                       bc57c1f1fe8ea14f7550858bcbf4812b6d79c53f
                       dd99a5e531f770dc88d640597c190cb21741e8cf
                       8af25c72acd81b0256f1378dcd91b1bda41b3770
                       323f54927e199204158bb49bacfb8212c0f4519b
                       16d86c4f53eed2b081d425d85ea82809dfeec56f
                       7ddcc8c24578c226e237d790252818893219f2c7
                       bfb6d3af75a4efb64a958297bd9d08cd4b881d33
                       9d455de43dbde9babf1a47e70a70faab3aa2d51e
                       ea875405b7fecc69bc802903f733ffd4db2d734e
                       9e0b6fe4f8d9a15a24e58c71d1333f1fa4542ab1
                       f8bf9eb641fd8c7e127d0625e63748c05f94db15
                       04a68366b4b40d82dbfdb3cba33db11b9512a9c5
                       26417f8eeaa1e7d2e2ba4fb75e97de88ec2ecbe2
                       a90d469331f17cc7818c926818a316604beec065
                       6a50187e2daf4c6c448d62e1a5e7e7b2090a7891
                       7518bcfe7cde9c979271a5b2e1145ffcb7f6d319
                       031053226f2128bef7df2fbf7dcbf03e2051b40f
                       8a9279ea153d0c78788ff328cedf1bee185b6ba9
                       51438af4
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [fd:02:86:c2:6e:b4:35:8f:38:eb:63:c4:a6:c5:d6:77:2d:f1:e7:a1],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-11-18 06:22:43.086  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-18 06:22:43.087 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-18 06:22:43.089 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-11-18 06:22:43.090 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-18 06:22:43.090  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-11-18 06:22:43.091  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-18 06:22:43.092  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-18 06:22:43.092 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-18 06:22:43.093 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-18 06:22:43.094 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-18 06:22:43.098 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-18 06:22:43.099 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-18 06:22:43.099 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-18 06:22:43.099 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-18 06:22:43.293  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-18 06:22:43.294  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-18 06:22:43.294 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-18 06:22:43.295 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-18 06:22:43.297  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-18 06:22:43.297  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-18 06:22:43.298 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-18 06:22:43.298 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-18 06:22:43.299 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-18 06:22:43.300 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-18 06:22:43.300 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-18 06:22:43.300 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-18 06:22:43.301 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-18 06:22:43.302 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-18 06:22:43.302 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-18 06:22:43.303 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-18 06:22:43.306 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 97911601099806791574591128761214879510810573038
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Nov 18 04:57:30 UTC 2022
           Final Date: Wed Nov 17 04:57:29 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [4e:b2:d5:69:a9:ec:df:ef:ed:77:d5:ea:e0:f1:cd:25:70:1d:de:f6],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3ea2a7794aae6dfde6251e1e87bd5acd7c2ca3f0
                       bc57c1f1fe8ea14f7550858bcbf4812b6d79c53f
                       dd99a5e531f770dc88d640597c190cb21741e8cf
                       8af25c72acd81b0256f1378dcd91b1bda41b3770
                       323f54927e199204158bb49bacfb8212c0f4519b
                       16d86c4f53eed2b081d425d85ea82809dfeec56f
                       7ddcc8c24578c226e237d790252818893219f2c7
                       bfb6d3af75a4efb64a958297bd9d08cd4b881d33
                       9d455de43dbde9babf1a47e70a70faab3aa2d51e
                       ea875405b7fecc69bc802903f733ffd4db2d734e
                       9e0b6fe4f8d9a15a24e58c71d1333f1fa4542ab1
                       f8bf9eb641fd8c7e127d0625e63748c05f94db15
                       04a68366b4b40d82dbfdb3cba33db11b9512a9c5
                       26417f8eeaa1e7d2e2ba4fb75e97de88ec2ecbe2
                       a90d469331f17cc7818c926818a316604beec065
                       6a50187e2daf4c6c448d62e1a5e7e7b2090a7891
                       7518bcfe7cde9c979271a5b2e1145ffcb7f6d319
                       031053226f2128bef7df2fbf7dcbf03e2051b40f
                       8a9279ea153d0c78788ff328cedf1bee185b6ba9
                       51438af4
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ab:b1:cb:11:c3:f6:aa:a0:17:90:16:eb:0e:18:9a:00:59:b6:ce:84],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-11-18 06:24:39.376  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-18 06:24:39.378 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-18 06:24:39.380 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-11-18 06:24:39.381 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-18 06:24:39.381  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-11-18 06:24:39.382  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-18 06:24:39.382  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-18 06:24:39.383 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-18 06:24:39.383 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-18 06:24:39.383 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-18 06:24:39.387 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-18 06:24:39.388 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-18 06:24:39.388 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-18 06:24:39.388 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-18 06:24:39.583  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-18 06:24:39.583  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-18 06:24:39.584 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-18 06:24:39.584 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-18 06:24:39.586  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-18 06:24:39.587  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-18 06:24:39.588 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-18 06:24:39.589 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-18 06:24:39.589 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-18 06:24:39.590 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-18 06:24:39.590 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-18 06:24:39.591 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-18 06:24:39.592 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-18 06:24:39.592 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-18 06:24:39.592 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-18 06:24:39.593 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-18 06:24:39.597 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 97911601099806791574591128761214879510810573038
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Nov 18 04:57:30 UTC 2022
           Final Date: Wed Nov 17 04:57:29 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [4e:b2:d5:69:a9:ec:df:ef:ed:77:d5:ea:e0:f1:cd:25:70:1d:de:f6],[56:66:d1:a4]
        modulus: e26dc9f7772cab9922a6a0d736a04f8a4df13043d7998211b8200bc132a3b56e96a27783a8ed7435255d65591cfac5d6e0dab2a073c6ed2249929ba707175e5a56c5e2f004866cae788ff5160f12314bd55f5e9d17f84d43398a0a98e3a1e3dbaaa3defd73571c8c451031b78986e6c730f9fc31b02f8a93880b4769b2b44531e419b90a4e0ccd3cd2f67f26bc34500c63b90eaa12fcd4680d0fbdce8dc83893d1c097776fcfafa169a06822ce2ab03e4220325d1e6c8f757bd45278284a9730d18bb965feb3a7913934fab84a550d5d0254699ffc5bd77a1bc53e7493927243afbc73019462f1b836bddabc64a51e337e3b241876e7ab686f1d202c38d27305ced43ee84cb9792416833ee0f12ce7ca9ed84190187a56020e1384248a9e4763f609163068fd365feb2268bee13e4fb69855a6588261933ddec5bb3ee382d9db121d7d5dbdbc06114f355802aadb8ab04338ef83a2bdfcbd4eb15404ab6615edf10813150dd70716053cdb5344ec865481a6b7d973b9670f6d471be4a7632ad7
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3ea2a7794aae6dfde6251e1e87bd5acd7c2ca3f0
                       bc57c1f1fe8ea14f7550858bcbf4812b6d79c53f
                       dd99a5e531f770dc88d640597c190cb21741e8cf
                       8af25c72acd81b0256f1378dcd91b1bda41b3770
                       323f54927e199204158bb49bacfb8212c0f4519b
                       16d86c4f53eed2b081d425d85ea82809dfeec56f
                       7ddcc8c24578c226e237d790252818893219f2c7
                       bfb6d3af75a4efb64a958297bd9d08cd4b881d33
                       9d455de43dbde9babf1a47e70a70faab3aa2d51e
                       ea875405b7fecc69bc802903f733ffd4db2d734e
                       9e0b6fe4f8d9a15a24e58c71d1333f1fa4542ab1
                       f8bf9eb641fd8c7e127d0625e63748c05f94db15
                       04a68366b4b40d82dbfdb3cba33db11b9512a9c5
                       26417f8eeaa1e7d2e2ba4fb75e97de88ec2ecbe2
                       a90d469331f17cc7818c926818a316604beec065
                       6a50187e2daf4c6c448d62e1a5e7e7b2090a7891
                       7518bcfe7cde9c979271a5b2e1145ffcb7f6d319
                       031053226f2128bef7df2fbf7dcbf03e2051b40f
                       8a9279ea153d0c78788ff328cedf1bee185b6ba9
                       51438af4
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [df:10:84:2e:6c:e1:88:2b:89:39:d2:7c:33:53:1a:18:13:0f:65:41],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-11-18 06:27:10.302  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-18 06:27:10.304 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-18 06:27:10.305 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-18 06:27:10.306 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-18 06:27:10.307  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-18 06:27:10.308  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-18 06:27:10.308  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-18 06:27:10.309 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-18 06:27:10.309 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-18 06:27:10.310 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-18 06:27:10.314 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-18 06:27:10.315 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-18 06:27:10.315 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-18 06:27:10.316 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-18 06:27:10.572  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-18 06:27:10.573  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-18 06:27:10.573 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-18 06:27:10.574 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-18 06:27:10.576  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-18 06:27:10.576  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-18 06:27:10.577 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-18 06:27:10.578 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-18 06:27:10.578 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-18 06:27:10.579 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-18 06:27:10.580 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-18 06:27:10.580 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-18 06:27:10.581 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-18 06:27:10.581 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-18 06:27:10.581 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-18 06:27:10.582 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-18 06:27:10.585 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 97911601099806791574591128761214879510810573038
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Nov 18 04:57:30 UTC 2022
           Final Date: Wed Nov 17 04:57:29 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [4e:b2:d5:69:a9:ec:df:ef:ed:77:d5:ea:e0:f1:cd:25:70:1d:de:f6],[56:66:d1:a4]
        modulus: e26dc9f7772cab9922a6a0d736a04f8a4df13043d7998211b8200bc132a3b56e96a27783a8ed7435255d65591cfac5d6e0dab2a073c6ed2249929ba707175e5a56c5e2f004866cae788ff5160f12314bd55f5e9d17f84d43398a0a98e3a1e3dbaaa3defd73571c8c451031b78986e6c730f9fc31b02f8a93880b4769b2b44531e419b90a4e0ccd3cd2f67f26bc34500c63b90eaa12fcd4680d0fbdce8dc83893d1c097776fcfafa169a06822ce2ab03e4220325d1e6c8f757bd45278284a9730d18bb965feb3a7913934fab84a550d5d0254699ffc5bd77a1bc53e7493927243afbc73019462f1b836bddabc64a51e337e3b241876e7ab686f1d202c38d27305ced43ee84cb9792416833ee0f12ce7ca9ed84190187a56020e1384248a9e4763f609163068fd365feb2268bee13e4fb69855a6588261933ddec5bb3ee382d9db121d7d5dbdbc06114f355802aadb8ab04338ef83a2bdfcbd4eb15404ab6615edf10813150dd70716053cdb5344ec865481a6b7d973b9670f6d471be4a7632ad7
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3ea2a7794aae6dfde6251e1e87bd5acd7c2ca3f0
                       bc57c1f1fe8ea14f7550858bcbf4812b6d79c53f
                       dd99a5e531f770dc88d640597c190cb21741e8cf
                       8af25c72acd81b0256f1378dcd91b1bda41b3770
                       323f54927e199204158bb49bacfb8212c0f4519b
                       16d86c4f53eed2b081d425d85ea82809dfeec56f
                       7ddcc8c24578c226e237d790252818893219f2c7
                       bfb6d3af75a4efb64a958297bd9d08cd4b881d33
                       9d455de43dbde9babf1a47e70a70faab3aa2d51e
                       ea875405b7fecc69bc802903f733ffd4db2d734e
                       9e0b6fe4f8d9a15a24e58c71d1333f1fa4542ab1
                       f8bf9eb641fd8c7e127d0625e63748c05f94db15
                       04a68366b4b40d82dbfdb3cba33db11b9512a9c5
                       26417f8eeaa1e7d2e2ba4fb75e97de88ec2ecbe2
                       a90d469331f17cc7818c926818a316604beec065
                       6a50187e2daf4c6c448d62e1a5e7e7b2090a7891
                       7518bcfe7cde9c979271a5b2e1145ffcb7f6d319
                       031053226f2128bef7df2fbf7dcbf03e2051b40f
                       8a9279ea153d0c78788ff328cedf1bee185b6ba9
                       51438af4
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [54:3b:30:1e:52:8b:50:03:1d:15:47:8e:3a:8a:76:14:09:62:65:fe],[56:66:d1:a4]
        modulus: a7e193f433373f49d974cecf7e76458773ba54f2cae9b9b42664d36518151a229b7f4cbbd32eb531554e2f0300b55bf933240236726146935d12acf1c90804c2ab29fc9fd0b18263332da74b1982e9d3d6038640cf622dda555e9086c9fea0c112d92e027dcf3c4d0125fd84907fe4275dbd55feb78cf451504c832d010ee31bc0e33837c40e968e3f6ba56e2b8a4a03f751ab60c3df7ee6a3cb0afb598a3b8008cca569add62421f3e2a882a0ec6d253d25dd32d66f5b18d73abe9ee03fe42dfdcea779e612685085e9a61a8919885cdb1e988e87617e076d62262e7e36bac39125cdcfc263cda8dc281492a17cf7ec671045818c7075999768509bd34c5415
public exponent: 10001

] 
2022-11-18 06:33:44.488  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-18 06:33:44.493 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-18 06:33:44.495 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-18 06:33:44.500 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-18 06:33:44.501  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-18 06:33:44.501  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-18 06:33:44.502  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-18 06:33:44.502 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-18 06:33:44.503 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-18 06:33:44.503 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-18 06:33:44.509 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-18 06:33:44.509 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-18 06:33:44.510 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-18 06:33:44.510 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-18 06:33:44.728  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-18 06:33:44.729  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-18 06:33:44.729 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-18 06:33:44.729 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-18 06:33:44.731  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-18 06:33:44.731  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-18 06:33:44.732 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-18 06:33:44.732 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-18 06:33:44.732 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-18 06:33:44.733 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-18 06:33:44.734 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-18 06:33:44.734 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-18 06:33:44.735 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-18 06:33:44.735 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-18 06:33:44.735 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-18 06:33:44.736 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-18 06:33:44.740 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 97911601099806791574591128761214879510810573038
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Nov 18 04:57:30 UTC 2022
           Final Date: Wed Nov 17 04:57:29 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [4e:b2:d5:69:a9:ec:df:ef:ed:77:d5:ea:e0:f1:cd:25:70:1d:de:f6],[56:66:d1:a4]
        modulus: e26dc9f7772cab9922a6a0d736a04f8a4df13043d7998211b8200bc132a3b56e96a27783a8ed7435255d65591cfac5d6e0dab2a073c6ed2249929ba707175e5a56c5e2f004866cae788ff5160f12314bd55f5e9d17f84d43398a0a98e3a1e3dbaaa3defd73571c8c451031b78986e6c730f9fc31b02f8a93880b4769b2b44531e419b90a4e0ccd3cd2f67f26bc34500c63b90eaa12fcd4680d0fbdce8dc83893d1c097776fcfafa169a06822ce2ab03e4220325d1e6c8f757bd45278284a9730d18bb965feb3a7913934fab84a550d5d0254699ffc5bd77a1bc53e7493927243afbc73019462f1b836bddabc64a51e337e3b241876e7ab686f1d202c38d27305ced43ee84cb9792416833ee0f12ce7ca9ed84190187a56020e1384248a9e4763f609163068fd365feb2268bee13e4fb69855a6588261933ddec5bb3ee382d9db121d7d5dbdbc06114f355802aadb8ab04338ef83a2bdfcbd4eb15404ab6615edf10813150dd70716053cdb5344ec865481a6b7d973b9670f6d471be4a7632ad7
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3ea2a7794aae6dfde6251e1e87bd5acd7c2ca3f0
                       bc57c1f1fe8ea14f7550858bcbf4812b6d79c53f
                       dd99a5e531f770dc88d640597c190cb21741e8cf
                       8af25c72acd81b0256f1378dcd91b1bda41b3770
                       323f54927e199204158bb49bacfb8212c0f4519b
                       16d86c4f53eed2b081d425d85ea82809dfeec56f
                       7ddcc8c24578c226e237d790252818893219f2c7
                       bfb6d3af75a4efb64a958297bd9d08cd4b881d33
                       9d455de43dbde9babf1a47e70a70faab3aa2d51e
                       ea875405b7fecc69bc802903f733ffd4db2d734e
                       9e0b6fe4f8d9a15a24e58c71d1333f1fa4542ab1
                       f8bf9eb641fd8c7e127d0625e63748c05f94db15
                       04a68366b4b40d82dbfdb3cba33db11b9512a9c5
                       26417f8eeaa1e7d2e2ba4fb75e97de88ec2ecbe2
                       a90d469331f17cc7818c926818a316604beec065
                       6a50187e2daf4c6c448d62e1a5e7e7b2090a7891
                       7518bcfe7cde9c979271a5b2e1145ffcb7f6d319
                       031053226f2128bef7df2fbf7dcbf03e2051b40f
                       8a9279ea153d0c78788ff328cedf1bee185b6ba9
                       51438af4
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [4f:93:c0:00:5d:31:7e:8d:25:b6:f2:54:33:9e:51:43:77:b3:9d:09],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-11-18 06:39:24.857  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-18 06:39:24.860 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-18 06:39:24.862 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-18 06:39:24.863 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-18 06:39:24.864  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-18 06:39:24.865  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-18 06:39:24.865  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-18 06:39:24.866 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-18 06:39:24.866 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-18 06:39:24.867 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-18 06:39:24.871 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-18 06:39:24.872 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-18 06:39:24.872 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-18 06:39:24.873 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-18 06:39:25.066  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-18 06:39:25.067  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-18 06:39:25.067 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-18 06:39:25.067 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-18 06:39:25.069  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-18 06:39:25.070  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-18 06:39:25.070 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-18 06:39:25.071 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-18 06:39:25.071 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-18 06:39:25.072 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-18 06:39:25.073 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-18 06:39:25.073 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-18 06:39:25.074 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-18 06:39:25.075 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-18 06:39:25.075 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-18 06:39:25.076 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-18 06:39:25.081 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 97911601099806791574591128761214879510810573038
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Nov 18 04:57:30 UTC 2022
           Final Date: Wed Nov 17 04:57:29 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [4e:b2:d5:69:a9:ec:df:ef:ed:77:d5:ea:e0:f1:cd:25:70:1d:de:f6],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3ea2a7794aae6dfde6251e1e87bd5acd7c2ca3f0
                       bc57c1f1fe8ea14f7550858bcbf4812b6d79c53f
                       dd99a5e531f770dc88d640597c190cb21741e8cf
                       8af25c72acd81b0256f1378dcd91b1bda41b3770
                       323f54927e199204158bb49bacfb8212c0f4519b
                       16d86c4f53eed2b081d425d85ea82809dfeec56f
                       7ddcc8c24578c226e237d790252818893219f2c7
                       bfb6d3af75a4efb64a958297bd9d08cd4b881d33
                       9d455de43dbde9babf1a47e70a70faab3aa2d51e
                       ea875405b7fecc69bc802903f733ffd4db2d734e
                       9e0b6fe4f8d9a15a24e58c71d1333f1fa4542ab1
                       f8bf9eb641fd8c7e127d0625e63748c05f94db15
                       04a68366b4b40d82dbfdb3cba33db11b9512a9c5
                       26417f8eeaa1e7d2e2ba4fb75e97de88ec2ecbe2
                       a90d469331f17cc7818c926818a316604beec065
                       6a50187e2daf4c6c448d62e1a5e7e7b2090a7891
                       7518bcfe7cde9c979271a5b2e1145ffcb7f6d319
                       031053226f2128bef7df2fbf7dcbf03e2051b40f
                       8a9279ea153d0c78788ff328cedf1bee185b6ba9
                       51438af4
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [42:56:72:f0:49:a0:5e:73:18:22:ae:4d:b6:94:2f:89:b9:30:d2:78],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-11-18 06:46:33.388  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-18 06:46:33.391 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-18 06:46:33.393 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-11-18 06:46:33.394 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-18 06:46:33.394  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-11-18 06:46:33.395  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-18 06:46:33.395  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-18 06:46:33.396 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-18 06:46:33.396 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-18 06:46:33.396 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-18 06:46:33.400 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-18 06:46:33.401 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-18 06:46:33.401 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-18 06:46:33.402 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-18 06:46:33.588  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-18 06:46:33.589  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-18 06:46:33.589 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-18 06:46:33.589 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-18 06:46:33.591  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-18 06:46:33.591  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-18 06:46:33.591 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-18 06:46:33.592 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-18 06:46:33.592 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-18 06:46:33.593 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-18 06:46:33.593 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-18 06:46:33.593 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-18 06:46:33.594 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-18 06:46:33.594 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-18 06:46:33.594 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-18 06:46:33.595 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-18 06:46:33.598 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 97911601099806791574591128761214879510810573038
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Nov 18 04:57:30 UTC 2022
           Final Date: Wed Nov 17 04:57:29 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [4e:b2:d5:69:a9:ec:df:ef:ed:77:d5:ea:e0:f1:cd:25:70:1d:de:f6],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3ea2a7794aae6dfde6251e1e87bd5acd7c2ca3f0
                       bc57c1f1fe8ea14f7550858bcbf4812b6d79c53f
                       dd99a5e531f770dc88d640597c190cb21741e8cf
                       8af25c72acd81b0256f1378dcd91b1bda41b3770
                       323f54927e199204158bb49bacfb8212c0f4519b
                       16d86c4f53eed2b081d425d85ea82809dfeec56f
                       7ddcc8c24578c226e237d790252818893219f2c7
                       bfb6d3af75a4efb64a958297bd9d08cd4b881d33
                       9d455de43dbde9babf1a47e70a70faab3aa2d51e
                       ea875405b7fecc69bc802903f733ffd4db2d734e
                       9e0b6fe4f8d9a15a24e58c71d1333f1fa4542ab1
                       f8bf9eb641fd8c7e127d0625e63748c05f94db15
                       04a68366b4b40d82dbfdb3cba33db11b9512a9c5
                       26417f8eeaa1e7d2e2ba4fb75e97de88ec2ecbe2
                       a90d469331f17cc7818c926818a316604beec065
                       6a50187e2daf4c6c448d62e1a5e7e7b2090a7891
                       7518bcfe7cde9c979271a5b2e1145ffcb7f6d319
                       031053226f2128bef7df2fbf7dcbf03e2051b40f
                       8a9279ea153d0c78788ff328cedf1bee185b6ba9
                       51438af4
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ab:5c:47:d5:4f:bf:eb:f7:86:49:21:60:b3:d8:95:57:6e:8e:53:f4],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-11-18 06:52:46.083  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-18 06:52:46.085 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-18 06:52:46.088 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-11-18 06:52:46.089 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-18 06:52:46.089  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-11-18 06:52:46.090  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-18 06:52:46.090  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-18 06:52:46.091 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-18 06:52:46.091 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-18 06:52:46.092 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-18 06:52:46.095 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-18 06:52:46.096 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-18 06:52:46.097 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-18 06:52:46.097 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-18 06:52:46.274  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-18 06:52:46.275  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-18 06:52:46.275 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-18 06:52:46.276 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-18 06:52:46.277  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-18 06:52:46.277  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-18 06:52:46.278 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-18 06:52:46.278 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-18 06:52:46.279 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-18 06:52:46.279 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-18 06:52:46.280 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-18 06:52:46.280 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-18 06:52:46.281 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-18 06:52:46.281 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-18 06:52:46.282 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-18 06:52:46.283 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-18 06:52:46.286 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 97911601099806791574591128761214879510810573038
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Nov 18 04:57:30 UTC 2022
           Final Date: Wed Nov 17 04:57:29 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [4e:b2:d5:69:a9:ec:df:ef:ed:77:d5:ea:e0:f1:cd:25:70:1d:de:f6],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3ea2a7794aae6dfde6251e1e87bd5acd7c2ca3f0
                       bc57c1f1fe8ea14f7550858bcbf4812b6d79c53f
                       dd99a5e531f770dc88d640597c190cb21741e8cf
                       8af25c72acd81b0256f1378dcd91b1bda41b3770
                       323f54927e199204158bb49bacfb8212c0f4519b
                       16d86c4f53eed2b081d425d85ea82809dfeec56f
                       7ddcc8c24578c226e237d790252818893219f2c7
                       bfb6d3af75a4efb64a958297bd9d08cd4b881d33
                       9d455de43dbde9babf1a47e70a70faab3aa2d51e
                       ea875405b7fecc69bc802903f733ffd4db2d734e
                       9e0b6fe4f8d9a15a24e58c71d1333f1fa4542ab1
                       f8bf9eb641fd8c7e127d0625e63748c05f94db15
                       04a68366b4b40d82dbfdb3cba33db11b9512a9c5
                       26417f8eeaa1e7d2e2ba4fb75e97de88ec2ecbe2
                       a90d469331f17cc7818c926818a316604beec065
                       6a50187e2daf4c6c448d62e1a5e7e7b2090a7891
                       7518bcfe7cde9c979271a5b2e1145ffcb7f6d319
                       031053226f2128bef7df2fbf7dcbf03e2051b40f
                       8a9279ea153d0c78788ff328cedf1bee185b6ba9
                       51438af4
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [57:b1:84:ce:43:96:a5:13:d6:0b:bb:4a:72:ca:14:c7:be:98:a1:35],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-11-18 06:53:06.258  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-18 06:53:06.259 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-18 06:53:06.260 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-11-18 06:53:06.261 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-18 06:53:06.261  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-11-18 06:53:06.261  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-18 06:53:06.264  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-18 06:53:06.265 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-18 06:53:06.266 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-18 06:53:06.266 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-18 06:53:06.275 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-18 06:53:06.276 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-18 06:53:06.276 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-18 06:53:06.276 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-18 06:53:06.462  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-18 06:53:06.462  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-18 06:53:06.463 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-18 06:53:06.463 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-18 06:53:06.464  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-18 06:53:06.464  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-18 06:53:06.465 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-18 06:53:06.465 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-18 06:53:06.465 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-18 06:53:06.466 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-18 06:53:06.466 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-18 06:53:06.466 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-18 06:53:06.467 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-18 06:53:06.467 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-18 06:53:06.467 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-18 06:53:06.468 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-18 06:53:06.471 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 97911601099806791574591128761214879510810573038
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Nov 18 04:57:30 UTC 2022
           Final Date: Wed Nov 17 04:57:29 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [4e:b2:d5:69:a9:ec:df:ef:ed:77:d5:ea:e0:f1:cd:25:70:1d:de:f6],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3ea2a7794aae6dfde6251e1e87bd5acd7c2ca3f0
                       bc57c1f1fe8ea14f7550858bcbf4812b6d79c53f
                       dd99a5e531f770dc88d640597c190cb21741e8cf
                       8af25c72acd81b0256f1378dcd91b1bda41b3770
                       323f54927e199204158bb49bacfb8212c0f4519b
                       16d86c4f53eed2b081d425d85ea82809dfeec56f
                       7ddcc8c24578c226e237d790252818893219f2c7
                       bfb6d3af75a4efb64a958297bd9d08cd4b881d33
                       9d455de43dbde9babf1a47e70a70faab3aa2d51e
                       ea875405b7fecc69bc802903f733ffd4db2d734e
                       9e0b6fe4f8d9a15a24e58c71d1333f1fa4542ab1
                       f8bf9eb641fd8c7e127d0625e63748c05f94db15
                       04a68366b4b40d82dbfdb3cba33db11b9512a9c5
                       26417f8eeaa1e7d2e2ba4fb75e97de88ec2ecbe2
                       a90d469331f17cc7818c926818a316604beec065
                       6a50187e2daf4c6c448d62e1a5e7e7b2090a7891
                       7518bcfe7cde9c979271a5b2e1145ffcb7f6d319
                       031053226f2128bef7df2fbf7dcbf03e2051b40f
                       8a9279ea153d0c78788ff328cedf1bee185b6ba9
                       51438af4
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [67:3e:84:61:1d:9f:c2:66:87:7b:3e:3b:02:58:e2:30:67:2e:1e:0e],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-11-18 07:17:10.073  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-18 07:17:10.076 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-18 07:17:10.078 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-11-18 07:17:10.079 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-18 07:17:10.079  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-11-18 07:17:10.080  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-18 07:17:10.080  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-18 07:17:10.081 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-18 07:17:10.081 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-18 07:17:10.082 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-18 07:17:10.089 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-18 07:17:10.091 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-18 07:17:10.091 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-18 07:17:10.092 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-18 07:17:10.302  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-18 07:17:10.303  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-18 07:17:10.303 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-18 07:17:10.304 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-18 07:17:10.305  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-18 07:17:10.306  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-18 07:17:10.306 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-18 07:17:10.307 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-18 07:17:10.307 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-18 07:17:10.309 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-18 07:17:10.311 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-18 07:17:10.311 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-18 07:17:10.312 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-18 07:17:10.312 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-18 07:17:10.313 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-18 07:17:10.313 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-18 07:17:10.317 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 97911601099806791574591128761214879510810573038
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Nov 18 04:57:30 UTC 2022
           Final Date: Wed Nov 17 04:57:29 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [4e:b2:d5:69:a9:ec:df:ef:ed:77:d5:ea:e0:f1:cd:25:70:1d:de:f6],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3ea2a7794aae6dfde6251e1e87bd5acd7c2ca3f0
                       bc57c1f1fe8ea14f7550858bcbf4812b6d79c53f
                       dd99a5e531f770dc88d640597c190cb21741e8cf
                       8af25c72acd81b0256f1378dcd91b1bda41b3770
                       323f54927e199204158bb49bacfb8212c0f4519b
                       16d86c4f53eed2b081d425d85ea82809dfeec56f
                       7ddcc8c24578c226e237d790252818893219f2c7
                       bfb6d3af75a4efb64a958297bd9d08cd4b881d33
                       9d455de43dbde9babf1a47e70a70faab3aa2d51e
                       ea875405b7fecc69bc802903f733ffd4db2d734e
                       9e0b6fe4f8d9a15a24e58c71d1333f1fa4542ab1
                       f8bf9eb641fd8c7e127d0625e63748c05f94db15
                       04a68366b4b40d82dbfdb3cba33db11b9512a9c5
                       26417f8eeaa1e7d2e2ba4fb75e97de88ec2ecbe2
                       a90d469331f17cc7818c926818a316604beec065
                       6a50187e2daf4c6c448d62e1a5e7e7b2090a7891
                       7518bcfe7cde9c979271a5b2e1145ffcb7f6d319
                       031053226f2128bef7df2fbf7dcbf03e2051b40f
                       8a9279ea153d0c78788ff328cedf1bee185b6ba9
                       51438af4
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [f6:3a:67:7a:7f:92:ef:22:bc:25:7b:91:9a:07:95:89:f5:a5:ca:7d],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-11-18 07:17:15.426  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-18 07:17:15.427 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-18 07:17:15.428 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-11-18 07:17:15.429 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-18 07:17:15.429  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-11-18 07:17:15.430  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-18 07:17:15.430  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-18 07:17:15.430 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-18 07:17:15.430 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-18 07:17:15.431 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-18 07:17:15.434 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-18 07:17:15.434 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-18 07:17:15.435 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-18 07:17:15.435 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-18 07:17:15.541  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-18 07:17:15.542  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-18 07:17:15.542 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-18 07:17:15.542 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-18 07:17:15.543  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-18 07:17:15.543  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-18 07:17:15.544 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-18 07:17:15.544 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-18 07:17:15.544 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-18 07:17:15.545 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-18 07:17:15.545 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-18 07:17:15.545 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-18 07:17:15.546 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-18 07:17:15.547 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-18 07:17:15.547 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-18 07:17:15.547 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-18 07:17:15.550 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 97911601099806791574591128761214879510810573038
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Nov 18 04:57:30 UTC 2022
           Final Date: Wed Nov 17 04:57:29 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [4e:b2:d5:69:a9:ec:df:ef:ed:77:d5:ea:e0:f1:cd:25:70:1d:de:f6],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3ea2a7794aae6dfde6251e1e87bd5acd7c2ca3f0
                       bc57c1f1fe8ea14f7550858bcbf4812b6d79c53f
                       dd99a5e531f770dc88d640597c190cb21741e8cf
                       8af25c72acd81b0256f1378dcd91b1bda41b3770
                       323f54927e199204158bb49bacfb8212c0f4519b
                       16d86c4f53eed2b081d425d85ea82809dfeec56f
                       7ddcc8c24578c226e237d790252818893219f2c7
                       bfb6d3af75a4efb64a958297bd9d08cd4b881d33
                       9d455de43dbde9babf1a47e70a70faab3aa2d51e
                       ea875405b7fecc69bc802903f733ffd4db2d734e
                       9e0b6fe4f8d9a15a24e58c71d1333f1fa4542ab1
                       f8bf9eb641fd8c7e127d0625e63748c05f94db15
                       04a68366b4b40d82dbfdb3cba33db11b9512a9c5
                       26417f8eeaa1e7d2e2ba4fb75e97de88ec2ecbe2
                       a90d469331f17cc7818c926818a316604beec065
                       6a50187e2daf4c6c448d62e1a5e7e7b2090a7891
                       7518bcfe7cde9c979271a5b2e1145ffcb7f6d319
                       031053226f2128bef7df2fbf7dcbf03e2051b40f
                       8a9279ea153d0c78788ff328cedf1bee185b6ba9
                       51438af4
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [cb:1e:74:db:05:91:22:bb:72:74:2a:9d:61:e0:5b:37:71:74:16:da],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

]