Results

By type

          2022-11-22 04:55:19,832 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-11-22 04:55:21,321 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-11-22 04:55:22.084  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Nov 22, 2022 4:55:24 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Nov 22, 2022 4:55:24 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Nov 22, 2022 4:55:24 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Nov 22, 2022 4:55:24 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-11-22 04:55:24.774 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-11-22 04:55:25.060  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-11-22 04:55:25.239  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-11-22 04:55:26.110 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-11-22 04:55:26.113 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
2022-11-22 04:55:26.114 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-11-22 04:55:26.118 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-11-22 04:55:26.161 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2022-11-22 04:55:26.164 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/docs]}: redirectToUi(HttpServletRequest)
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
2022-11-22 04:55:26.286 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-11-22 04:55:27.031 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Nov 22, 2022 4:55:27 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-11-22 04:55:28.143  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 9.27 seconds (JVM running for 11.222)
Nov 22, 2022 4:55:49 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-11-22 04:56:05.423  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-22 04:56:05.438 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-22 04:56:05.487 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-11-22 04:56:05.492 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-22 04:56:05.519  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-11-22 04:56:05.521  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-22 04:56:05.522  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-22 04:56:05.523 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-22 04:56:05.524 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-22 04:56:05.528 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-22 04:56:05.539 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-22 04:56:05.542 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-22 04:56:05.599 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-22 04:56:05.607 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-22 04:56:05.608 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-22 04:56:05.611 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-22 04:56:06.374  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-22 04:56:06.377  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-22 04:56:06.378 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-22 04:56:06.380 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-22 04:56:06.397  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-22 04:56:06.399  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-22 04:56:06.400 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-22 04:56:06.401 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-22 04:56:06.402 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-22 04:56:06.431 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-22 04:56:06.431 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-22 04:56:06.432 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-22 04:56:06.438 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-22 04:56:06.439 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-22 04:56:06.439 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-22 04:56:06.441 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-22 04:56:06.477 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 162136760455011105700588164684054374259098149903
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Nov 22 04:53:04 UTC 2022
           Final Date: Sun Nov 21 04:53:03 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [8c:63:f0:bf:ba:5b:68:85:56:d7:64:e7:52:1e:50:02:11:17:4b:7f],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a6f7cc0b4c5e9ccd87e9905a7dc8b52a62117fcb
                       d1698c95cbf5cc73b47f887c31d29ed7e30d94db
                       4c75668d33647314b4f5a5c2b9eb277507838164
                       ab96730345300adac1a5722372735bde20239558
                       8639e4a788b605284ffdfd690348aa4b923b5d1f
                       c337c1b1c23786bd7725cdc83151850d172f36d9
                       7d0c309b8722bdafafdcd8a9bede0dd84e8b57cc
                       ae20b73b68545859e6c7139fda4768b7b639c571
                       ad964baba88f8f84359a94cae4aafc5ca95c447d
                       8345136251f8ac81ea0f863c017c6f4af18c8b47
                       087257c1c40a010315f0ff3fa8e86252dd23e58f
                       556bfa3bb6b8441824a5cb58d6b663a1b950104b
                       301de672913eea94e2ac75f50dce83612ce1f0b4
                       5403a762b51a20fb1da438d4cd1a33651cde9629
                       993c77cf8c1334e4b95941a2e15c5aa851992a7f
                       fdf62e1fe89f47c5de8e1c062256ac94c8e72ea3
                       ec56465b89396d3a281079360df1693db281585d
                       014c487593382658be1b96a2c6f5886e47e0c21e
                       1411fdcf057b6110b3e00f11b813bcf8bbd9fe56
                       efdb4e09
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [20:11:65:d2:e6:03:0e:f1:ef:19:57:ec:c9:49:00:8a:19:ac:2d:ff],[56:66:d1:a4]
        modulus: f21e3d001f2a00cd2adad458420bf2a69f96458ff0495a63c43191fb8b03bc2b8a7c7c8c4714526e40a4a1423bd91cbb5a26b67f0e8fe7537b603f97f432e5b686898c56efb42d3c5f3277bdb121d60862d3c9a1a25a53f008658845d7be6814ca0bcb6f3c5ee9f251184b83a7acefc2030958ff7dc38622598af5bf84ead985074f32c5e2236a5847c4ef9b32760a61afd637c4b9b2f3259752f97c76ef7a6d47b8f4c70ed538b8a634f35b33c88ad065d6f6a3d70726e2f4633befca48c1060f64a8df918f35cae05f5c18b87d461d5451fdb677660a0feebfca7e369da7fd2a49bfa5d0d7498dba75637b4d5a483b17680d309464daca7a76f83b6f8be867
public exponent: 10001

] 
2022-11-22 06:20:48.772  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-22 06:20:48.778 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-22 06:20:48.782 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-22 06:20:48.784 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-22 06:20:48.784  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-22 06:20:48.785  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-22 06:20:48.786  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-22 06:20:48.787 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-22 06:20:48.787 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-22 06:20:48.788 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-22 06:20:48.795 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-22 06:20:48.797 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-22 06:20:48.798 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-22 06:20:48.798 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-22 06:20:49.066  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-22 06:20:49.067  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-22 06:20:49.068 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-22 06:20:49.068 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-22 06:20:49.071  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-22 06:20:49.071  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-22 06:20:49.072 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-22 06:20:49.072 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-22 06:20:49.072 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-22 06:20:49.073 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-22 06:20:49.074 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-22 06:20:49.074 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-22 06:20:49.075 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-22 06:20:49.075 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-22 06:20:49.076 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-22 06:20:49.076 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-22 06:20:49.080 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 162136760455011105700588164684054374259098149903
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Nov 22 04:53:04 UTC 2022
           Final Date: Sun Nov 21 04:53:03 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [8c:63:f0:bf:ba:5b:68:85:56:d7:64:e7:52:1e:50:02:11:17:4b:7f],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a6f7cc0b4c5e9ccd87e9905a7dc8b52a62117fcb
                       d1698c95cbf5cc73b47f887c31d29ed7e30d94db
                       4c75668d33647314b4f5a5c2b9eb277507838164
                       ab96730345300adac1a5722372735bde20239558
                       8639e4a788b605284ffdfd690348aa4b923b5d1f
                       c337c1b1c23786bd7725cdc83151850d172f36d9
                       7d0c309b8722bdafafdcd8a9bede0dd84e8b57cc
                       ae20b73b68545859e6c7139fda4768b7b639c571
                       ad964baba88f8f84359a94cae4aafc5ca95c447d
                       8345136251f8ac81ea0f863c017c6f4af18c8b47
                       087257c1c40a010315f0ff3fa8e86252dd23e58f
                       556bfa3bb6b8441824a5cb58d6b663a1b950104b
                       301de672913eea94e2ac75f50dce83612ce1f0b4
                       5403a762b51a20fb1da438d4cd1a33651cde9629
                       993c77cf8c1334e4b95941a2e15c5aa851992a7f
                       fdf62e1fe89f47c5de8e1c062256ac94c8e72ea3
                       ec56465b89396d3a281079360df1693db281585d
                       014c487593382658be1b96a2c6f5886e47e0c21e
                       1411fdcf057b6110b3e00f11b813bcf8bbd9fe56
                       efdb4e09
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [f1:64:8d:02:d6:75:b0:28:b0:38:00:e4:f8:43:1a:a6:36:4d:51:fb],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-11-22 06:22:36.740  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-22 06:22:36.743 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-22 06:22:36.747 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-11-22 06:22:36.749 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-22 06:22:36.750  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-11-22 06:22:36.751  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-22 06:22:36.752  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-22 06:22:36.752 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-22 06:22:36.753 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-22 06:22:36.754 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-22 06:22:36.759 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-22 06:22:36.761 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-22 06:22:36.761 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-22 06:22:36.762 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-22 06:22:36.940  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-22 06:22:36.942  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-22 06:22:36.943 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-22 06:22:36.943 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-22 06:22:36.947  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-22 06:22:36.947  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-22 06:22:36.948 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-22 06:22:36.948 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-22 06:22:36.948 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-22 06:22:36.950 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-22 06:22:36.950 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-22 06:22:36.951 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-22 06:22:36.952 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-22 06:22:36.953 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-22 06:22:36.953 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-22 06:22:36.954 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-22 06:22:36.959 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 162136760455011105700588164684054374259098149903
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Nov 22 04:53:04 UTC 2022
           Final Date: Sun Nov 21 04:53:03 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [8c:63:f0:bf:ba:5b:68:85:56:d7:64:e7:52:1e:50:02:11:17:4b:7f],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a6f7cc0b4c5e9ccd87e9905a7dc8b52a62117fcb
                       d1698c95cbf5cc73b47f887c31d29ed7e30d94db
                       4c75668d33647314b4f5a5c2b9eb277507838164
                       ab96730345300adac1a5722372735bde20239558
                       8639e4a788b605284ffdfd690348aa4b923b5d1f
                       c337c1b1c23786bd7725cdc83151850d172f36d9
                       7d0c309b8722bdafafdcd8a9bede0dd84e8b57cc
                       ae20b73b68545859e6c7139fda4768b7b639c571
                       ad964baba88f8f84359a94cae4aafc5ca95c447d
                       8345136251f8ac81ea0f863c017c6f4af18c8b47
                       087257c1c40a010315f0ff3fa8e86252dd23e58f
                       556bfa3bb6b8441824a5cb58d6b663a1b950104b
                       301de672913eea94e2ac75f50dce83612ce1f0b4
                       5403a762b51a20fb1da438d4cd1a33651cde9629
                       993c77cf8c1334e4b95941a2e15c5aa851992a7f
                       fdf62e1fe89f47c5de8e1c062256ac94c8e72ea3
                       ec56465b89396d3a281079360df1693db281585d
                       014c487593382658be1b96a2c6f5886e47e0c21e
                       1411fdcf057b6110b3e00f11b813bcf8bbd9fe56
                       efdb4e09
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [9a:70:18:6d:f9:a1:41:7c:5e:6e:c6:f4:7e:6c:d3:99:97:a0:50:77],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-11-22 06:24:16.770  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-22 06:24:16.772 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-22 06:24:16.774 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-11-22 06:24:16.775 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-22 06:24:16.781  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-11-22 06:24:16.787  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-22 06:24:16.790  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-22 06:24:16.791 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-22 06:24:16.792 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-22 06:24:16.792 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-22 06:24:16.797 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-22 06:24:16.798 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-22 06:24:16.799 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-22 06:24:16.800 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-22 06:24:16.946  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-22 06:24:16.947  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-22 06:24:16.948 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-22 06:24:16.949 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-22 06:24:16.956  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-22 06:24:16.956  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-22 06:24:16.957 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-22 06:24:16.958 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-22 06:24:16.958 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-22 06:24:16.959 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-22 06:24:16.959 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-22 06:24:16.960 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-22 06:24:16.961 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-22 06:24:16.961 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-22 06:24:16.961 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-22 06:24:16.962 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-22 06:24:16.966 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 162136760455011105700588164684054374259098149903
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Nov 22 04:53:04 UTC 2022
           Final Date: Sun Nov 21 04:53:03 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [8c:63:f0:bf:ba:5b:68:85:56:d7:64:e7:52:1e:50:02:11:17:4b:7f],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a6f7cc0b4c5e9ccd87e9905a7dc8b52a62117fcb
                       d1698c95cbf5cc73b47f887c31d29ed7e30d94db
                       4c75668d33647314b4f5a5c2b9eb277507838164
                       ab96730345300adac1a5722372735bde20239558
                       8639e4a788b605284ffdfd690348aa4b923b5d1f
                       c337c1b1c23786bd7725cdc83151850d172f36d9
                       7d0c309b8722bdafafdcd8a9bede0dd84e8b57cc
                       ae20b73b68545859e6c7139fda4768b7b639c571
                       ad964baba88f8f84359a94cae4aafc5ca95c447d
                       8345136251f8ac81ea0f863c017c6f4af18c8b47
                       087257c1c40a010315f0ff3fa8e86252dd23e58f
                       556bfa3bb6b8441824a5cb58d6b663a1b950104b
                       301de672913eea94e2ac75f50dce83612ce1f0b4
                       5403a762b51a20fb1da438d4cd1a33651cde9629
                       993c77cf8c1334e4b95941a2e15c5aa851992a7f
                       fdf62e1fe89f47c5de8e1c062256ac94c8e72ea3
                       ec56465b89396d3a281079360df1693db281585d
                       014c487593382658be1b96a2c6f5886e47e0c21e
                       1411fdcf057b6110b3e00f11b813bcf8bbd9fe56
                       efdb4e09
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [3b:61:9c:fe:50:50:7c:dd:78:5b:c3:d9:d9:28:55:3f:e1:c9:96:f9],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-11-22 06:27:04.317  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-22 06:27:04.319 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-22 06:27:04.320 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-22 06:27:04.321 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-22 06:27:04.321  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-22 06:27:04.322  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-22 06:27:04.322  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-22 06:27:04.323 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-22 06:27:04.323 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-22 06:27:04.323 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-22 06:27:04.327 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-22 06:27:04.328 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-22 06:27:04.328 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-22 06:27:04.329 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-22 06:27:04.737  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-22 06:27:04.738  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-22 06:27:04.739 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-22 06:27:04.739 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-22 06:27:04.740  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-22 06:27:04.740  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-22 06:27:04.741 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-22 06:27:04.741 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-22 06:27:04.741 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-22 06:27:04.742 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-22 06:27:04.743 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-22 06:27:04.743 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-22 06:27:04.744 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-22 06:27:04.744 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-22 06:27:04.744 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-22 06:27:04.745 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-22 06:27:04.749 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 162136760455011105700588164684054374259098149903
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Nov 22 04:53:04 UTC 2022
           Final Date: Sun Nov 21 04:53:03 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [8c:63:f0:bf:ba:5b:68:85:56:d7:64:e7:52:1e:50:02:11:17:4b:7f],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a6f7cc0b4c5e9ccd87e9905a7dc8b52a62117fcb
                       d1698c95cbf5cc73b47f887c31d29ed7e30d94db
                       4c75668d33647314b4f5a5c2b9eb277507838164
                       ab96730345300adac1a5722372735bde20239558
                       8639e4a788b605284ffdfd690348aa4b923b5d1f
                       c337c1b1c23786bd7725cdc83151850d172f36d9
                       7d0c309b8722bdafafdcd8a9bede0dd84e8b57cc
                       ae20b73b68545859e6c7139fda4768b7b639c571
                       ad964baba88f8f84359a94cae4aafc5ca95c447d
                       8345136251f8ac81ea0f863c017c6f4af18c8b47
                       087257c1c40a010315f0ff3fa8e86252dd23e58f
                       556bfa3bb6b8441824a5cb58d6b663a1b950104b
                       301de672913eea94e2ac75f50dce83612ce1f0b4
                       5403a762b51a20fb1da438d4cd1a33651cde9629
                       993c77cf8c1334e4b95941a2e15c5aa851992a7f
                       fdf62e1fe89f47c5de8e1c062256ac94c8e72ea3
                       ec56465b89396d3a281079360df1693db281585d
                       014c487593382658be1b96a2c6f5886e47e0c21e
                       1411fdcf057b6110b3e00f11b813bcf8bbd9fe56
                       efdb4e09
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [05:f3:cd:84:de:a3:c3:a7:d2:eb:6c:bb:b0:b4:fc:fa:75:1a:dd:ef],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-11-22 06:34:07.147  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-22 06:34:07.150 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-22 06:34:07.154 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-22 06:34:07.155 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-22 06:34:07.155  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-22 06:34:07.156  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-22 06:34:07.156  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-22 06:34:07.157 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-22 06:34:07.157 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-22 06:34:07.159 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-22 06:34:07.166 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-22 06:34:07.167 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-22 06:34:07.167 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-22 06:34:07.167 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-22 06:34:07.361  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-22 06:34:07.362  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-22 06:34:07.362 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-22 06:34:07.363 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-22 06:34:07.364  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-22 06:34:07.365  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-22 06:34:07.365 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-22 06:34:07.366 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-22 06:34:07.366 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-22 06:34:07.367 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-22 06:34:07.367 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-22 06:34:07.367 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-22 06:34:07.368 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-22 06:34:07.368 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-22 06:34:07.369 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-22 06:34:07.369 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-22 06:34:07.373 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 162136760455011105700588164684054374259098149903
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Nov 22 04:53:04 UTC 2022
           Final Date: Sun Nov 21 04:53:03 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [8c:63:f0:bf:ba:5b:68:85:56:d7:64:e7:52:1e:50:02:11:17:4b:7f],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a6f7cc0b4c5e9ccd87e9905a7dc8b52a62117fcb
                       d1698c95cbf5cc73b47f887c31d29ed7e30d94db
                       4c75668d33647314b4f5a5c2b9eb277507838164
                       ab96730345300adac1a5722372735bde20239558
                       8639e4a788b605284ffdfd690348aa4b923b5d1f
                       c337c1b1c23786bd7725cdc83151850d172f36d9
                       7d0c309b8722bdafafdcd8a9bede0dd84e8b57cc
                       ae20b73b68545859e6c7139fda4768b7b639c571
                       ad964baba88f8f84359a94cae4aafc5ca95c447d
                       8345136251f8ac81ea0f863c017c6f4af18c8b47
                       087257c1c40a010315f0ff3fa8e86252dd23e58f
                       556bfa3bb6b8441824a5cb58d6b663a1b950104b
                       301de672913eea94e2ac75f50dce83612ce1f0b4
                       5403a762b51a20fb1da438d4cd1a33651cde9629
                       993c77cf8c1334e4b95941a2e15c5aa851992a7f
                       fdf62e1fe89f47c5de8e1c062256ac94c8e72ea3
                       ec56465b89396d3a281079360df1693db281585d
                       014c487593382658be1b96a2c6f5886e47e0c21e
                       1411fdcf057b6110b3e00f11b813bcf8bbd9fe56
                       efdb4e09
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [2b:c9:8c:b4:a9:06:b4:78:0e:55:6a:bd:74:81:8a:78:da:2e:8c:e4],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-11-22 06:39:10.023  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-22 06:39:10.031 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-22 06:39:10.032 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-22 06:39:10.033 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-22 06:39:10.033  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-22 06:39:10.034  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-22 06:39:10.034  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-22 06:39:10.034 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-22 06:39:10.035 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-22 06:39:10.035 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-22 06:39:10.041 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-22 06:39:10.045 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-22 06:39:10.045 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-22 06:39:10.045 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-22 06:39:10.200  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-22 06:39:10.200  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-22 06:39:10.201 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-22 06:39:10.201 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-22 06:39:10.203  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-22 06:39:10.203  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-22 06:39:10.204 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-22 06:39:10.204 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-22 06:39:10.204 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-22 06:39:10.205 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-22 06:39:10.206 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-22 06:39:10.206 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-22 06:39:10.207 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-22 06:39:10.207 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-22 06:39:10.208 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-22 06:39:10.208 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-22 06:39:10.211 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 162136760455011105700588164684054374259098149903
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Nov 22 04:53:04 UTC 2022
           Final Date: Sun Nov 21 04:53:03 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [8c:63:f0:bf:ba:5b:68:85:56:d7:64:e7:52:1e:50:02:11:17:4b:7f],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a6f7cc0b4c5e9ccd87e9905a7dc8b52a62117fcb
                       d1698c95cbf5cc73b47f887c31d29ed7e30d94db
                       4c75668d33647314b4f5a5c2b9eb277507838164
                       ab96730345300adac1a5722372735bde20239558
                       8639e4a788b605284ffdfd690348aa4b923b5d1f
                       c337c1b1c23786bd7725cdc83151850d172f36d9
                       7d0c309b8722bdafafdcd8a9bede0dd84e8b57cc
                       ae20b73b68545859e6c7139fda4768b7b639c571
                       ad964baba88f8f84359a94cae4aafc5ca95c447d
                       8345136251f8ac81ea0f863c017c6f4af18c8b47
                       087257c1c40a010315f0ff3fa8e86252dd23e58f
                       556bfa3bb6b8441824a5cb58d6b663a1b950104b
                       301de672913eea94e2ac75f50dce83612ce1f0b4
                       5403a762b51a20fb1da438d4cd1a33651cde9629
                       993c77cf8c1334e4b95941a2e15c5aa851992a7f
                       fdf62e1fe89f47c5de8e1c062256ac94c8e72ea3
                       ec56465b89396d3a281079360df1693db281585d
                       014c487593382658be1b96a2c6f5886e47e0c21e
                       1411fdcf057b6110b3e00f11b813bcf8bbd9fe56
                       efdb4e09
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [3a:15:c6:d0:89:65:ab:ea:b4:09:06:af:5f:d8:07:15:33:16:9b:ff],[56:66:d1:a4]
        modulus: f47f8d5831d3bf0afcae1908b3e692e1815f59dabf738326c09ee0e9df8ecadb8d184445f4c42938b5edb6a87e70a13d4df10c8c512d950f887bc84a066eec3302557e052392b961dd1d656fd38a36d18ff32ddced1c0cb6737c8ad5f3e6591ca3b623900f76cac94dddc63d13d01cbef0db64018f45886388110889e74e0518b176e088a67e2faccced19d23286092e1ab32c115dc8959486af1e5b5be4b9c2f99656cb96838aa1dd7466d5c2b73bf7ba300fba0684563174a37764264b220624b8f5c50fcd82cdf4a3cfc3bcbb886c481f9c054d1ed3a147089d5f1199aec6b86fb1aaf35faf4377254041901b8d351586497b30e0425b6110687277c8e76d
public exponent: 10001

] 
2022-11-22 06:45:09.656  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-22 06:45:09.659 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-22 06:45:09.661 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-11-22 06:45:09.662 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-22 06:45:09.663  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-11-22 06:45:09.664  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-22 06:45:09.664  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-22 06:45:09.664 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-22 06:45:09.665 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-22 06:45:09.665 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-22 06:45:09.669 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-22 06:45:09.670 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-22 06:45:09.670 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-22 06:45:09.671 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-22 06:45:09.826  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-22 06:45:09.827  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-22 06:45:09.827 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-22 06:45:09.827 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-22 06:45:09.829  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-22 06:45:09.829  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-22 06:45:09.830 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-22 06:45:09.830 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-22 06:45:09.830 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-22 06:45:09.831 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-22 06:45:09.831 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-22 06:45:09.832 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-22 06:45:09.832 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-22 06:45:09.833 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-22 06:45:09.833 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-22 06:45:09.834 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-22 06:45:09.837 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 162136760455011105700588164684054374259098149903
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Nov 22 04:53:04 UTC 2022
           Final Date: Sun Nov 21 04:53:03 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [8c:63:f0:bf:ba:5b:68:85:56:d7:64:e7:52:1e:50:02:11:17:4b:7f],[56:66:d1:a4]
        modulus: cfae8403055a7c216cae10df7213c092cc68b44afab0398a0a673947715db8382f27aa086b2a1b87f96c38bb023d288de53953d71e80aa20803a3ebbf42d2d0d7708a1442ec7b7138d82c45643905df211dbdc3f364a6bb0ee6278849771efd6ddaf01e6b80229ddadbfcc46e2018111fd88fa1d4a98d8310b63d58bd98f50fc8b73420e8b62fce5ee267bd6193f0471133b54292b0b867d5b29a74eee59174f2ed3720423fe91e0d398285998949d5c0468f8ffc673182aacb1203d67e2de767c560597b85ca88f9b982507843db888f2c5f4c390036d264d3d060b1066141777890f98f94002abd48a12c6e79221911062c49675a5d5081bc15fc41fabdc685041ad885205632a870312607901be83627dc443571a1aab626d6ddcde86ff009bdf4c6e3de3ac1ed4db51d66407712dddc6949b27b5bbe1b017c2f84e82f6ad720d2d25862e311f0bf9588e377af46ac3623ef10c01f4394980a3225cac2f18947bb8ba676d006a2f33646cade50e16bb2bf74652f5b3c432dd9aa900fdb4a1
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a6f7cc0b4c5e9ccd87e9905a7dc8b52a62117fcb
                       d1698c95cbf5cc73b47f887c31d29ed7e30d94db
                       4c75668d33647314b4f5a5c2b9eb277507838164
                       ab96730345300adac1a5722372735bde20239558
                       8639e4a788b605284ffdfd690348aa4b923b5d1f
                       c337c1b1c23786bd7725cdc83151850d172f36d9
                       7d0c309b8722bdafafdcd8a9bede0dd84e8b57cc
                       ae20b73b68545859e6c7139fda4768b7b639c571
                       ad964baba88f8f84359a94cae4aafc5ca95c447d
                       8345136251f8ac81ea0f863c017c6f4af18c8b47
                       087257c1c40a010315f0ff3fa8e86252dd23e58f
                       556bfa3bb6b8441824a5cb58d6b663a1b950104b
                       301de672913eea94e2ac75f50dce83612ce1f0b4
                       5403a762b51a20fb1da438d4cd1a33651cde9629
                       993c77cf8c1334e4b95941a2e15c5aa851992a7f
                       fdf62e1fe89f47c5de8e1c062256ac94c8e72ea3
                       ec56465b89396d3a281079360df1693db281585d
                       014c487593382658be1b96a2c6f5886e47e0c21e
                       1411fdcf057b6110b3e00f11b813bcf8bbd9fe56
                       efdb4e09
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [21:fb:c5:2a:88:b9:ea:fa:15:da:9a:fb:7c:92:93:0c:13:43:77:6a],[56:66:d1:a4]
        modulus: b76c958cc7fdf0ade9e3c8f0b3995a678d4852d20320c91700151916579a01c5b62eefb086ae0a0c07b9998750a1cc6362894bb0ef5f8e65e331698d37f0cc188d05ddaf58513be752caa8c15fb284a8c3c8899f64bea80c113c466ada896d6d4f07ed4ea46920c6eaeffccc8c02ce1cdb53c3a9147e63a3356305d127255e82a830e374af755fef7f235f1023f086959a46b1cec092cbcb4714003747cc6083c0545e0b213af20c51a1dbecde1c099ae1651505b9c4bcbf5d37946b4ec3c330665be91dfff78fa79436f9afcc0bea565608e8daa78b8d76f75b682cf8d612c9820aff843ef7e457fa087e96c5f2e8eb5d0bf7f54d8f879d21c4fab7536dbf1f
public exponent: 10001

] 
2022-11-22 06:51:10.944  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-22 06:51:10.947 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-22 06:51:10.950 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-11-22 06:51:10.951 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-22 06:51:10.951  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-11-22 06:51:10.952  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-22 06:51:10.952  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-22 06:51:10.952 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-22 06:51:10.954 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-22 06:51:10.954 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-22 06:51:10.958 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-22 06:51:10.959 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-22 06:51:10.959 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-22 06:51:10.960 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-22 06:51:11.157  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-22 06:51:11.158  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-22 06:51:11.158 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-22 06:51:11.158 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-22 06:51:11.160  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-22 06:51:11.160  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-22 06:51:11.161 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-22 06:51:11.161 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-22 06:51:11.161 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-22 06:51:11.162 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-22 06:51:11.162 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-22 06:51:11.163 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-22 06:51:11.163 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-22 06:51:11.164 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-22 06:51:11.164 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-22 06:51:11.164 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-22 06:51:11.168 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 162136760455011105700588164684054374259098149903
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Nov 22 04:53:04 UTC 2022
           Final Date: Sun Nov 21 04:53:03 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [8c:63:f0:bf:ba:5b:68:85:56:d7:64:e7:52:1e:50:02:11:17:4b:7f],[56:66:d1:a4]
        modulus: cfae8403055a7c216cae10df7213c092cc68b44afab0398a0a673947715db8382f27aa086b2a1b87f96c38bb023d288de53953d71e80aa20803a3ebbf42d2d0d7708a1442ec7b7138d82c45643905df211dbdc3f364a6bb0ee6278849771efd6ddaf01e6b80229ddadbfcc46e2018111fd88fa1d4a98d8310b63d58bd98f50fc8b73420e8b62fce5ee267bd6193f0471133b54292b0b867d5b29a74eee59174f2ed3720423fe91e0d398285998949d5c0468f8ffc673182aacb1203d67e2de767c560597b85ca88f9b982507843db888f2c5f4c390036d264d3d060b1066141777890f98f94002abd48a12c6e79221911062c49675a5d5081bc15fc41fabdc685041ad885205632a870312607901be83627dc443571a1aab626d6ddcde86ff009bdf4c6e3de3ac1ed4db51d66407712dddc6949b27b5bbe1b017c2f84e82f6ad720d2d25862e311f0bf9588e377af46ac3623ef10c01f4394980a3225cac2f18947bb8ba676d006a2f33646cade50e16bb2bf74652f5b3c432dd9aa900fdb4a1
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a6f7cc0b4c5e9ccd87e9905a7dc8b52a62117fcb
                       d1698c95cbf5cc73b47f887c31d29ed7e30d94db
                       4c75668d33647314b4f5a5c2b9eb277507838164
                       ab96730345300adac1a5722372735bde20239558
                       8639e4a788b605284ffdfd690348aa4b923b5d1f
                       c337c1b1c23786bd7725cdc83151850d172f36d9
                       7d0c309b8722bdafafdcd8a9bede0dd84e8b57cc
                       ae20b73b68545859e6c7139fda4768b7b639c571
                       ad964baba88f8f84359a94cae4aafc5ca95c447d
                       8345136251f8ac81ea0f863c017c6f4af18c8b47
                       087257c1c40a010315f0ff3fa8e86252dd23e58f
                       556bfa3bb6b8441824a5cb58d6b663a1b950104b
                       301de672913eea94e2ac75f50dce83612ce1f0b4
                       5403a762b51a20fb1da438d4cd1a33651cde9629
                       993c77cf8c1334e4b95941a2e15c5aa851992a7f
                       fdf62e1fe89f47c5de8e1c062256ac94c8e72ea3
                       ec56465b89396d3a281079360df1693db281585d
                       014c487593382658be1b96a2c6f5886e47e0c21e
                       1411fdcf057b6110b3e00f11b813bcf8bbd9fe56
                       efdb4e09
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [0d:57:7a:77:96:65:5f:0a:8a:f2:d1:e1:6a:f1:62:51:f7:9d:48:1d],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-11-22 06:51:30.441  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-22 06:51:30.442 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-22 06:51:30.444 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-11-22 06:51:30.444 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-22 06:51:30.445  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-11-22 06:51:30.445  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-22 06:51:30.446  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-22 06:51:30.446 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-22 06:51:30.447 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-22 06:51:30.447 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-22 06:51:30.450 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-22 06:51:30.451 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-22 06:51:30.451 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-22 06:51:30.452 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-22 06:51:30.562  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-22 06:51:30.563  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-22 06:51:30.563 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-22 06:51:30.564 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-22 06:51:30.567  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-22 06:51:30.568  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-22 06:51:30.568 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-22 06:51:30.569 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-22 06:51:30.569 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-22 06:51:30.570 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-22 06:51:30.571 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-22 06:51:30.572 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-22 06:51:30.573 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-22 06:51:30.573 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-22 06:51:30.574 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-22 06:51:30.574 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-22 06:51:30.577 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 162136760455011105700588164684054374259098149903
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Nov 22 04:53:04 UTC 2022
           Final Date: Sun Nov 21 04:53:03 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [8c:63:f0:bf:ba:5b:68:85:56:d7:64:e7:52:1e:50:02:11:17:4b:7f],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a6f7cc0b4c5e9ccd87e9905a7dc8b52a62117fcb
                       d1698c95cbf5cc73b47f887c31d29ed7e30d94db
                       4c75668d33647314b4f5a5c2b9eb277507838164
                       ab96730345300adac1a5722372735bde20239558
                       8639e4a788b605284ffdfd690348aa4b923b5d1f
                       c337c1b1c23786bd7725cdc83151850d172f36d9
                       7d0c309b8722bdafafdcd8a9bede0dd84e8b57cc
                       ae20b73b68545859e6c7139fda4768b7b639c571
                       ad964baba88f8f84359a94cae4aafc5ca95c447d
                       8345136251f8ac81ea0f863c017c6f4af18c8b47
                       087257c1c40a010315f0ff3fa8e86252dd23e58f
                       556bfa3bb6b8441824a5cb58d6b663a1b950104b
                       301de672913eea94e2ac75f50dce83612ce1f0b4
                       5403a762b51a20fb1da438d4cd1a33651cde9629
                       993c77cf8c1334e4b95941a2e15c5aa851992a7f
                       fdf62e1fe89f47c5de8e1c062256ac94c8e72ea3
                       ec56465b89396d3a281079360df1693db281585d
                       014c487593382658be1b96a2c6f5886e47e0c21e
                       1411fdcf057b6110b3e00f11b813bcf8bbd9fe56
                       efdb4e09
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [e1:a5:cf:11:4d:f6:46:24:39:9a:ab:cb:9d:f0:8a:c5:aa:4c:ee:06],[56:66:d1:a4]
        modulus: ec21a7e646cf44c779cfba5e8269894d3535746181d6bfcb734f713c74767c829fcb84b55e5d91272ef7d0c5f6d608ef17bec72f5a31ba90582730f618eee794df49c0c7b2b2374da268a744437c28b7cc58ca13776ca9000d7f59f93db8f27f402ebf3e2c044862fb304dda1aaeb82570e5ff8875ab39be3ab68eff3102f238d1b75db2aedc1f6aa190ea1f9964c9a677ad995834d2c09944239bcdda261d5050f4429ee0965af79fc5c94cd9fa0bfc8b1c104971ac14172ee50edbea4ee61b5136678f1ce362719f1606005a8a7ba540b5087a7fb63fff4516cf93adbf7a0f0a9e6df251974341b587f716cb118157e19f5b2bc03de4a3165d6244b3535a73
public exponent: 10001

] 
2022-11-22 07:15:36.392  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-22 07:15:36.395 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-22 07:15:36.397 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-11-22 07:15:36.398 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-22 07:15:36.399  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-11-22 07:15:36.399  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-22 07:15:36.400  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-22 07:15:36.400 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-22 07:15:36.401 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-22 07:15:36.401 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-22 07:15:36.406 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-22 07:15:36.407 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-22 07:15:36.408 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-22 07:15:36.408 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-22 07:15:36.570  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-22 07:15:36.571  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-22 07:15:36.571 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-22 07:15:36.571 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-22 07:15:36.573  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-22 07:15:36.573  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-22 07:15:36.573 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-22 07:15:36.574 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-22 07:15:36.574 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-22 07:15:36.575 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-22 07:15:36.575 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-22 07:15:36.575 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-22 07:15:36.576 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-22 07:15:36.576 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-22 07:15:36.576 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-22 07:15:36.577 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-22 07:15:36.581 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 162136760455011105700588164684054374259098149903
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Nov 22 04:53:04 UTC 2022
           Final Date: Sun Nov 21 04:53:03 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [8c:63:f0:bf:ba:5b:68:85:56:d7:64:e7:52:1e:50:02:11:17:4b:7f],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a6f7cc0b4c5e9ccd87e9905a7dc8b52a62117fcb
                       d1698c95cbf5cc73b47f887c31d29ed7e30d94db
                       4c75668d33647314b4f5a5c2b9eb277507838164
                       ab96730345300adac1a5722372735bde20239558
                       8639e4a788b605284ffdfd690348aa4b923b5d1f
                       c337c1b1c23786bd7725cdc83151850d172f36d9
                       7d0c309b8722bdafafdcd8a9bede0dd84e8b57cc
                       ae20b73b68545859e6c7139fda4768b7b639c571
                       ad964baba88f8f84359a94cae4aafc5ca95c447d
                       8345136251f8ac81ea0f863c017c6f4af18c8b47
                       087257c1c40a010315f0ff3fa8e86252dd23e58f
                       556bfa3bb6b8441824a5cb58d6b663a1b950104b
                       301de672913eea94e2ac75f50dce83612ce1f0b4
                       5403a762b51a20fb1da438d4cd1a33651cde9629
                       993c77cf8c1334e4b95941a2e15c5aa851992a7f
                       fdf62e1fe89f47c5de8e1c062256ac94c8e72ea3
                       ec56465b89396d3a281079360df1693db281585d
                       014c487593382658be1b96a2c6f5886e47e0c21e
                       1411fdcf057b6110b3e00f11b813bcf8bbd9fe56
                       efdb4e09
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [2c:78:87:f2:aa:90:a5:26:75:2f:6e:a8:8c:73:09:f1:82:0a:10:20],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-11-22 07:15:43.593  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-22 07:15:43.594 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-22 07:15:43.595 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-11-22 07:15:43.595 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-22 07:15:43.597  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-11-22 07:15:43.597  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-22 07:15:43.598  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-22 07:15:43.598 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-22 07:15:43.598 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-22 07:15:43.599 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-22 07:15:43.602 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-22 07:15:43.603 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-22 07:15:43.603 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-22 07:15:43.603 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-22 07:15:43.703  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-22 07:15:43.704  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-22 07:15:43.705 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-22 07:15:43.707 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-22 07:15:43.710  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-22 07:15:43.710  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-22 07:15:43.711 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-22 07:15:43.711 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-22 07:15:43.711 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-22 07:15:43.712 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-22 07:15:43.712 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-22 07:15:43.712 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-22 07:15:43.713 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-22 07:15:43.713 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-22 07:15:43.713 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-22 07:15:43.714 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-22 07:15:43.717 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 162136760455011105700588164684054374259098149903
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Nov 22 04:53:04 UTC 2022
           Final Date: Sun Nov 21 04:53:03 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [8c:63:f0:bf:ba:5b:68:85:56:d7:64:e7:52:1e:50:02:11:17:4b:7f],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a6f7cc0b4c5e9ccd87e9905a7dc8b52a62117fcb
                       d1698c95cbf5cc73b47f887c31d29ed7e30d94db
                       4c75668d33647314b4f5a5c2b9eb277507838164
                       ab96730345300adac1a5722372735bde20239558
                       8639e4a788b605284ffdfd690348aa4b923b5d1f
                       c337c1b1c23786bd7725cdc83151850d172f36d9
                       7d0c309b8722bdafafdcd8a9bede0dd84e8b57cc
                       ae20b73b68545859e6c7139fda4768b7b639c571
                       ad964baba88f8f84359a94cae4aafc5ca95c447d
                       8345136251f8ac81ea0f863c017c6f4af18c8b47
                       087257c1c40a010315f0ff3fa8e86252dd23e58f
                       556bfa3bb6b8441824a5cb58d6b663a1b950104b
                       301de672913eea94e2ac75f50dce83612ce1f0b4
                       5403a762b51a20fb1da438d4cd1a33651cde9629
                       993c77cf8c1334e4b95941a2e15c5aa851992a7f
                       fdf62e1fe89f47c5de8e1c062256ac94c8e72ea3
                       ec56465b89396d3a281079360df1693db281585d
                       014c487593382658be1b96a2c6f5886e47e0c21e
                       1411fdcf057b6110b3e00f11b813bcf8bbd9fe56
                       efdb4e09
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [30:61:3c:54:f0:c2:41:ad:87:04:5b:1a:17:98:e3:35:b0:d5:a3:d5],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

]