Results

By type

          2022-12-08 15:18:40,327 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-12-08 15:18:43,355 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-12-08 15:18:45.187  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Dec 08, 2022 3:18:50 PM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Dec 08, 2022 3:18:50 PM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Dec 08, 2022 3:18:50 PM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Dec 08, 2022 3:18:50 PM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-12-08 15:18:51.937 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-12-08 15:18:52.570  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-12-08 15:18:52.884  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-12-08 15:18:54.475 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-12-08 15:18:54.487 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
2022-12-08 15:18:54.491 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-12-08 15:18:54.506 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-12-08 15:18:54.598 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2022-12-08 15:18:54.606 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
	{GET [/docs]}: redirectToUi(HttpServletRequest)
2022-12-08 15:18:54.876 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-12-08 15:18:56.593 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Dec 08, 2022 3:18:58 PM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-12-08 15:18:59.093  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 20.988 seconds (JVM running for 25.003)
Dec 08, 2022 3:19:08 PM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-12-08 17:00:55.053  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-08 17:00:55.071 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-08 17:00:55.155 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-12-08 17:00:55.162 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-08 17:00:55.206  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-12-08 17:00:55.217  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-08 17:00:55.220  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-08 17:00:55.224 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-08 17:00:55.225 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-08 17:00:55.234 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-08 17:00:55.255 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-08 17:00:55.263 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-08 17:00:55.701 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-08 17:00:55.714 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-08 17:00:55.715 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-08 17:00:55.721 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-08 17:00:56.289  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-08 17:00:56.293  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-08 17:00:56.294 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-08 17:00:56.297 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-08 17:00:56.318  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-08 17:00:56.321  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-08 17:00:56.322 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-08 17:00:56.323 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-08 17:00:56.324 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-08 17:00:56.360 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-08 17:00:56.361 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-08 17:00:56.361 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-08 17:00:56.373 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-08 17:00:56.375 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-08 17:00:56.375 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-08 17:00:56.378 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-08 17:00:56.426 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 51172506973174966761330907408246848553707397839
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Dec 08 15:10:43 UTC 2022
           Final Date: Tue Dec 07 15:10:42 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [32:24:01:4d:e9:08:8a:3e:e6:eb:99:60:e5:c6:d5:a4:e6:89:2d:fe],[56:66:d1:a4]
        modulus: 98e3933ce6230e23998b45be9641be91e677eaf00cea32193613ae91e62a2765933b54c781535402bbf7b735512a6c4f4234982e5d64f9f7da7ebb47c4d304be6bc6249741e6b9ceb15b9a9525233c0e15cfc4ff38716ab915c327ec93210173412833f3ffcde9c52e85daeb2ec0e620a8eee4fb8cda0290a0d21b107948f58696bfd8589ad84c4b2237d0539af9a4dfad4db75f755d53c79b93efe8661add6f4efd9a1fddd4f47dcd09f37e7954474b852c4a96eb43ab630d465e8291396e62b85ec579201ef72d0967f40d53449c52cbda8bda84026988a5f890e8a7ecb86ce85867c2036c34de71b4da6b3f7daceaf1fec555bad273485dd4bda8c53cd25b3680161e54f4556f6286cb731fee4df28c1a0a4bf6026bf71ec9972352dd9711ba2f85ad5e6af4f009f2f20628bc252a44d53e340f4a38d3e853f40e88d9d3bdf6a65ee5d6be97a95ffbd84ebb344cb8d9740713981e2f03946e033d702692a63eaa9fa6f26579fee0dcc7b5f2ee2b2153be95692d716537c1fe575c615be571
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5b5accf98a28fe58742a417120b7372d01a51a85
                       96ee78d2403941751f3143488b270fa3b6857007
                       a4381bdd50f89a4bb905457b6f71c96599bb0505
                       cfae07e94049b5cfd618b19b73bc6278b5a95112
                       c0fcd3ff6094cb885550c3f3c60c469800878e3d
                       bde021ac8279480852ab4862d1613dc4d0f22723
                       b0038204404d6ec1332a38ca0340cd96eb98bf80
                       519768eb4f169901107c0b7a6ece8990511c5b90
                       723a698511638de60699059fe0b5887d9079ee7b
                       86abce7546e439cad677e5977997a9b94cdcb7a9
                       e402baef062221bcff52e084f00da41a38a3ed07
                       c689748e812014cc622875831ed19ddebedfb133
                       dce8d39684ce9e6e30b084749b167d721459cf57
                       002ad2517c79a7aeaeaa3b45d430996f38ee4925
                       b35f76dcd670d932728d7577f11220bde9d9d2c7
                       ba71cae432fe344f14619e4b9b383b02d6d33224
                       f7a708f2bcd52c768a11482c3aaef9a5a6db9faf
                       51bd527f0a075da113dae25af604dc437944f0d3
                       395b3ad143cfabcb7dbd203aa02c9f009c2e2df0
                       ad152dad
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [f1:d7:a3:53:99:ad:64:df:5a:38:41:41:c2:df:e6:62:42:3c:14:5e],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-12-08 17:02:43.223  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-08 17:02:43.226 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-08 17:02:43.229 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-12-08 17:02:43.231 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-08 17:02:43.232  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-12-08 17:02:43.233  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-08 17:02:43.233  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-08 17:02:43.234 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-08 17:02:43.235 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-08 17:02:43.235 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-08 17:02:43.244 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-08 17:02:43.246 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-08 17:02:43.246 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-08 17:02:43.247 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-08 17:02:43.426  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-08 17:02:43.428  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-08 17:02:43.431 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-08 17:02:43.432 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-08 17:02:43.439  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-08 17:02:43.441  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-08 17:02:43.442 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-08 17:02:43.442 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-08 17:02:43.443 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-08 17:02:43.445 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-08 17:02:43.446 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-08 17:02:43.446 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-08 17:02:43.460 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-08 17:02:43.461 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-08 17:02:43.462 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-08 17:02:43.465 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-08 17:02:43.478 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 51172506973174966761330907408246848553707397839
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Dec 08 15:10:43 UTC 2022
           Final Date: Tue Dec 07 15:10:42 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [32:24:01:4d:e9:08:8a:3e:e6:eb:99:60:e5:c6:d5:a4:e6:89:2d:fe],[56:66:d1:a4]
        modulus: 98e3933ce6230e23998b45be9641be91e677eaf00cea32193613ae91e62a2765933b54c781535402bbf7b735512a6c4f4234982e5d64f9f7da7ebb47c4d304be6bc6249741e6b9ceb15b9a9525233c0e15cfc4ff38716ab915c327ec93210173412833f3ffcde9c52e85daeb2ec0e620a8eee4fb8cda0290a0d21b107948f58696bfd8589ad84c4b2237d0539af9a4dfad4db75f755d53c79b93efe8661add6f4efd9a1fddd4f47dcd09f37e7954474b852c4a96eb43ab630d465e8291396e62b85ec579201ef72d0967f40d53449c52cbda8bda84026988a5f890e8a7ecb86ce85867c2036c34de71b4da6b3f7daceaf1fec555bad273485dd4bda8c53cd25b3680161e54f4556f6286cb731fee4df28c1a0a4bf6026bf71ec9972352dd9711ba2f85ad5e6af4f009f2f20628bc252a44d53e340f4a38d3e853f40e88d9d3bdf6a65ee5d6be97a95ffbd84ebb344cb8d9740713981e2f03946e033d702692a63eaa9fa6f26579fee0dcc7b5f2ee2b2153be95692d716537c1fe575c615be571
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5b5accf98a28fe58742a417120b7372d01a51a85
                       96ee78d2403941751f3143488b270fa3b6857007
                       a4381bdd50f89a4bb905457b6f71c96599bb0505
                       cfae07e94049b5cfd618b19b73bc6278b5a95112
                       c0fcd3ff6094cb885550c3f3c60c469800878e3d
                       bde021ac8279480852ab4862d1613dc4d0f22723
                       b0038204404d6ec1332a38ca0340cd96eb98bf80
                       519768eb4f169901107c0b7a6ece8990511c5b90
                       723a698511638de60699059fe0b5887d9079ee7b
                       86abce7546e439cad677e5977997a9b94cdcb7a9
                       e402baef062221bcff52e084f00da41a38a3ed07
                       c689748e812014cc622875831ed19ddebedfb133
                       dce8d39684ce9e6e30b084749b167d721459cf57
                       002ad2517c79a7aeaeaa3b45d430996f38ee4925
                       b35f76dcd670d932728d7577f11220bde9d9d2c7
                       ba71cae432fe344f14619e4b9b383b02d6d33224
                       f7a708f2bcd52c768a11482c3aaef9a5a6db9faf
                       51bd527f0a075da113dae25af604dc437944f0d3
                       395b3ad143cfabcb7dbd203aa02c9f009c2e2df0
                       ad152dad
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [eb:19:65:07:88:60:c7:b1:24:15:ef:ab:24:18:b0:9c:db:2b:a2:1d],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-12-08 17:04:23.262  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-08 17:04:23.266 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-08 17:04:23.270 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-12-08 17:04:23.273 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-08 17:04:23.275  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-12-08 17:04:23.281  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-08 17:04:23.282  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-08 17:04:23.284 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-08 17:04:23.285 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-08 17:04:23.287 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-08 17:04:23.300 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-08 17:04:23.302 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-08 17:04:23.303 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-08 17:04:23.305 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-08 17:04:23.463  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-08 17:04:23.464  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-08 17:04:23.465 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-08 17:04:23.465 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-08 17:04:23.468  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-08 17:04:23.468  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-08 17:04:23.469 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-08 17:04:23.470 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-08 17:04:23.470 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-08 17:04:23.485 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-08 17:04:23.486 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-08 17:04:23.487 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-08 17:04:23.488 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-08 17:04:23.489 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-08 17:04:23.489 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-08 17:04:23.491 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-08 17:04:23.502 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 51172506973174966761330907408246848553707397839
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Dec 08 15:10:43 UTC 2022
           Final Date: Tue Dec 07 15:10:42 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [32:24:01:4d:e9:08:8a:3e:e6:eb:99:60:e5:c6:d5:a4:e6:89:2d:fe],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5b5accf98a28fe58742a417120b7372d01a51a85
                       96ee78d2403941751f3143488b270fa3b6857007
                       a4381bdd50f89a4bb905457b6f71c96599bb0505
                       cfae07e94049b5cfd618b19b73bc6278b5a95112
                       c0fcd3ff6094cb885550c3f3c60c469800878e3d
                       bde021ac8279480852ab4862d1613dc4d0f22723
                       b0038204404d6ec1332a38ca0340cd96eb98bf80
                       519768eb4f169901107c0b7a6ece8990511c5b90
                       723a698511638de60699059fe0b5887d9079ee7b
                       86abce7546e439cad677e5977997a9b94cdcb7a9
                       e402baef062221bcff52e084f00da41a38a3ed07
                       c689748e812014cc622875831ed19ddebedfb133
                       dce8d39684ce9e6e30b084749b167d721459cf57
                       002ad2517c79a7aeaeaa3b45d430996f38ee4925
                       b35f76dcd670d932728d7577f11220bde9d9d2c7
                       ba71cae432fe344f14619e4b9b383b02d6d33224
                       f7a708f2bcd52c768a11482c3aaef9a5a6db9faf
                       51bd527f0a075da113dae25af604dc437944f0d3
                       395b3ad143cfabcb7dbd203aa02c9f009c2e2df0
                       ad152dad
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [58:42:3d:99:a0:64:a8:25:00:f3:d0:37:c6:42:45:38:90:a7:79:82],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-12-08 17:07:44.256  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-08 17:07:44.258 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-08 17:07:44.264 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-12-08 17:07:44.266 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-08 17:07:44.266  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-12-08 17:07:44.285  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-08 17:07:44.287  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-08 17:07:44.288 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-08 17:07:44.288 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-08 17:07:44.302 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-08 17:07:44.318 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-08 17:07:44.320 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-08 17:07:44.320 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-08 17:07:44.321 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-08 17:07:44.526  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-08 17:07:44.527  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-08 17:07:44.528 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-08 17:07:44.528 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-08 17:07:44.530  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-08 17:07:44.533  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-08 17:07:44.536 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-08 17:07:44.537 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-08 17:07:44.547 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-08 17:07:44.555 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-08 17:07:44.560 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-08 17:07:44.561 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-08 17:07:44.562 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-08 17:07:44.563 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-08 17:07:44.565 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-08 17:07:44.568 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-08 17:07:44.574 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 51172506973174966761330907408246848553707397839
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Dec 08 15:10:43 UTC 2022
           Final Date: Tue Dec 07 15:10:42 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [32:24:01:4d:e9:08:8a:3e:e6:eb:99:60:e5:c6:d5:a4:e6:89:2d:fe],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5b5accf98a28fe58742a417120b7372d01a51a85
                       96ee78d2403941751f3143488b270fa3b6857007
                       a4381bdd50f89a4bb905457b6f71c96599bb0505
                       cfae07e94049b5cfd618b19b73bc6278b5a95112
                       c0fcd3ff6094cb885550c3f3c60c469800878e3d
                       bde021ac8279480852ab4862d1613dc4d0f22723
                       b0038204404d6ec1332a38ca0340cd96eb98bf80
                       519768eb4f169901107c0b7a6ece8990511c5b90
                       723a698511638de60699059fe0b5887d9079ee7b
                       86abce7546e439cad677e5977997a9b94cdcb7a9
                       e402baef062221bcff52e084f00da41a38a3ed07
                       c689748e812014cc622875831ed19ddebedfb133
                       dce8d39684ce9e6e30b084749b167d721459cf57
                       002ad2517c79a7aeaeaa3b45d430996f38ee4925
                       b35f76dcd670d932728d7577f11220bde9d9d2c7
                       ba71cae432fe344f14619e4b9b383b02d6d33224
                       f7a708f2bcd52c768a11482c3aaef9a5a6db9faf
                       51bd527f0a075da113dae25af604dc437944f0d3
                       395b3ad143cfabcb7dbd203aa02c9f009c2e2df0
                       ad152dad
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ce:01:ed:ff:5f:11:bd:2f:a9:54:af:ed:26:c7:1a:8f:d8:74:05:43],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-12-08 17:21:50.888  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-08 17:21:50.892 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-08 17:21:50.897 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-12-08 17:21:50.899 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-08 17:21:50.900  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-12-08 17:21:50.902  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-08 17:21:50.903  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-08 17:21:50.903 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-08 17:21:50.904 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-08 17:21:50.905 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-08 17:21:50.914 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-08 17:21:50.916 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-08 17:21:50.917 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-08 17:21:50.917 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-08 17:21:51.105  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-08 17:21:51.107  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-08 17:21:51.107 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-08 17:21:51.110 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-08 17:21:51.112  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-08 17:21:51.113  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-08 17:21:51.114 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-08 17:21:51.114 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-08 17:21:51.115 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-08 17:21:51.125 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-08 17:21:51.126 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-08 17:21:51.126 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-08 17:21:51.128 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-08 17:21:51.129 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-08 17:21:51.129 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-08 17:21:51.132 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-08 17:21:51.138 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 51172506973174966761330907408246848553707397839
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Dec 08 15:10:43 UTC 2022
           Final Date: Tue Dec 07 15:10:42 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [32:24:01:4d:e9:08:8a:3e:e6:eb:99:60:e5:c6:d5:a4:e6:89:2d:fe],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5b5accf98a28fe58742a417120b7372d01a51a85
                       96ee78d2403941751f3143488b270fa3b6857007
                       a4381bdd50f89a4bb905457b6f71c96599bb0505
                       cfae07e94049b5cfd618b19b73bc6278b5a95112
                       c0fcd3ff6094cb885550c3f3c60c469800878e3d
                       bde021ac8279480852ab4862d1613dc4d0f22723
                       b0038204404d6ec1332a38ca0340cd96eb98bf80
                       519768eb4f169901107c0b7a6ece8990511c5b90
                       723a698511638de60699059fe0b5887d9079ee7b
                       86abce7546e439cad677e5977997a9b94cdcb7a9
                       e402baef062221bcff52e084f00da41a38a3ed07
                       c689748e812014cc622875831ed19ddebedfb133
                       dce8d39684ce9e6e30b084749b167d721459cf57
                       002ad2517c79a7aeaeaa3b45d430996f38ee4925
                       b35f76dcd670d932728d7577f11220bde9d9d2c7
                       ba71cae432fe344f14619e4b9b383b02d6d33224
                       f7a708f2bcd52c768a11482c3aaef9a5a6db9faf
                       51bd527f0a075da113dae25af604dc437944f0d3
                       395b3ad143cfabcb7dbd203aa02c9f009c2e2df0
                       ad152dad
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [c3:a6:de:73:93:be:21:10:5b:a6:6a:98:cd:4b:20:ce:78:77:25:07],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-12-08 17:28:20.097  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-08 17:28:20.106 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-08 17:28:20.109 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-12-08 17:28:20.110 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-08 17:28:20.111  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-12-08 17:28:20.112  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-08 17:28:20.112  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-08 17:28:20.113 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-08 17:28:20.113 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-08 17:28:20.114 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-08 17:28:20.120 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-08 17:28:20.122 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-08 17:28:20.123 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-08 17:28:20.123 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-08 17:28:20.264  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-08 17:28:20.265  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-08 17:28:20.265 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-08 17:28:20.266 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-08 17:28:20.267  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-08 17:28:20.268  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-08 17:28:20.268 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-08 17:28:20.268 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-08 17:28:20.269 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-08 17:28:20.270 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-08 17:28:20.270 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-08 17:28:20.270 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-08 17:28:20.271 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-08 17:28:20.271 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-08 17:28:20.272 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-08 17:28:20.273 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-08 17:28:20.279 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 51172506973174966761330907408246848553707397839
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Dec 08 15:10:43 UTC 2022
           Final Date: Tue Dec 07 15:10:42 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [32:24:01:4d:e9:08:8a:3e:e6:eb:99:60:e5:c6:d5:a4:e6:89:2d:fe],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5b5accf98a28fe58742a417120b7372d01a51a85
                       96ee78d2403941751f3143488b270fa3b6857007
                       a4381bdd50f89a4bb905457b6f71c96599bb0505
                       cfae07e94049b5cfd618b19b73bc6278b5a95112
                       c0fcd3ff6094cb885550c3f3c60c469800878e3d
                       bde021ac8279480852ab4862d1613dc4d0f22723
                       b0038204404d6ec1332a38ca0340cd96eb98bf80
                       519768eb4f169901107c0b7a6ece8990511c5b90
                       723a698511638de60699059fe0b5887d9079ee7b
                       86abce7546e439cad677e5977997a9b94cdcb7a9
                       e402baef062221bcff52e084f00da41a38a3ed07
                       c689748e812014cc622875831ed19ddebedfb133
                       dce8d39684ce9e6e30b084749b167d721459cf57
                       002ad2517c79a7aeaeaa3b45d430996f38ee4925
                       b35f76dcd670d932728d7577f11220bde9d9d2c7
                       ba71cae432fe344f14619e4b9b383b02d6d33224
                       f7a708f2bcd52c768a11482c3aaef9a5a6db9faf
                       51bd527f0a075da113dae25af604dc437944f0d3
                       395b3ad143cfabcb7dbd203aa02c9f009c2e2df0
                       ad152dad
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [c3:32:c1:d0:f2:34:d2:c4:04:06:28:60:e7:5e:c9:71:98:54:88:1e],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-12-08 17:28:39.352  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-08 17:28:39.354 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-08 17:28:39.356 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-12-08 17:28:39.358 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-08 17:28:39.358  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-12-08 17:28:39.360  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-08 17:28:39.360  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-08 17:28:39.361 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-08 17:28:39.361 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-08 17:28:39.361 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-08 17:28:39.368 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-08 17:28:39.369 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-08 17:28:39.369 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-08 17:28:39.370 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-08 17:28:39.558  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-08 17:28:39.561  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-08 17:28:39.561 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-08 17:28:39.562 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-08 17:28:39.564  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-08 17:28:39.565  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-08 17:28:39.566 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-08 17:28:39.572 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-08 17:28:39.574 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-08 17:28:39.575 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-08 17:28:39.575 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-08 17:28:39.576 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-08 17:28:39.577 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-08 17:28:39.578 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-08 17:28:39.578 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-08 17:28:39.579 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-08 17:28:39.584 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 51172506973174966761330907408246848553707397839
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Dec 08 15:10:43 UTC 2022
           Final Date: Tue Dec 07 15:10:42 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [32:24:01:4d:e9:08:8a:3e:e6:eb:99:60:e5:c6:d5:a4:e6:89:2d:fe],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5b5accf98a28fe58742a417120b7372d01a51a85
                       96ee78d2403941751f3143488b270fa3b6857007
                       a4381bdd50f89a4bb905457b6f71c96599bb0505
                       cfae07e94049b5cfd618b19b73bc6278b5a95112
                       c0fcd3ff6094cb885550c3f3c60c469800878e3d
                       bde021ac8279480852ab4862d1613dc4d0f22723
                       b0038204404d6ec1332a38ca0340cd96eb98bf80
                       519768eb4f169901107c0b7a6ece8990511c5b90
                       723a698511638de60699059fe0b5887d9079ee7b
                       86abce7546e439cad677e5977997a9b94cdcb7a9
                       e402baef062221bcff52e084f00da41a38a3ed07
                       c689748e812014cc622875831ed19ddebedfb133
                       dce8d39684ce9e6e30b084749b167d721459cf57
                       002ad2517c79a7aeaeaa3b45d430996f38ee4925
                       b35f76dcd670d932728d7577f11220bde9d9d2c7
                       ba71cae432fe344f14619e4b9b383b02d6d33224
                       f7a708f2bcd52c768a11482c3aaef9a5a6db9faf
                       51bd527f0a075da113dae25af604dc437944f0d3
                       395b3ad143cfabcb7dbd203aa02c9f009c2e2df0
                       ad152dad
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [58:25:f4:47:48:d6:20:9d:b3:a7:bd:e0:10:43:54:dd:ed:24:47:53],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-12-08 17:53:46.883  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-08 17:53:46.888 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-08 17:53:46.893 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-12-08 17:53:46.895 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-08 17:53:46.896  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-12-08 17:53:46.897  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-08 17:53:46.898  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-08 17:53:46.898 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-08 17:53:46.899 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-08 17:53:46.900 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-08 17:53:46.910 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-08 17:53:46.912 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-08 17:53:46.917 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-08 17:53:46.918 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-08 17:53:47.160  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-08 17:53:47.162  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-08 17:53:47.162 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-08 17:53:47.163 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-08 17:53:47.166  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-08 17:53:47.167  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-08 17:53:47.168 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-08 17:53:47.168 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-08 17:53:47.169 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-08 17:53:47.172 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-08 17:53:47.173 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-08 17:53:47.174 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-08 17:53:47.175 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-08 17:53:47.175 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-08 17:53:47.176 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-08 17:53:47.177 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-08 17:53:47.182 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 51172506973174966761330907408246848553707397839
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Dec 08 15:10:43 UTC 2022
           Final Date: Tue Dec 07 15:10:42 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [32:24:01:4d:e9:08:8a:3e:e6:eb:99:60:e5:c6:d5:a4:e6:89:2d:fe],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5b5accf98a28fe58742a417120b7372d01a51a85
                       96ee78d2403941751f3143488b270fa3b6857007
                       a4381bdd50f89a4bb905457b6f71c96599bb0505
                       cfae07e94049b5cfd618b19b73bc6278b5a95112
                       c0fcd3ff6094cb885550c3f3c60c469800878e3d
                       bde021ac8279480852ab4862d1613dc4d0f22723
                       b0038204404d6ec1332a38ca0340cd96eb98bf80
                       519768eb4f169901107c0b7a6ece8990511c5b90
                       723a698511638de60699059fe0b5887d9079ee7b
                       86abce7546e439cad677e5977997a9b94cdcb7a9
                       e402baef062221bcff52e084f00da41a38a3ed07
                       c689748e812014cc622875831ed19ddebedfb133
                       dce8d39684ce9e6e30b084749b167d721459cf57
                       002ad2517c79a7aeaeaa3b45d430996f38ee4925
                       b35f76dcd670d932728d7577f11220bde9d9d2c7
                       ba71cae432fe344f14619e4b9b383b02d6d33224
                       f7a708f2bcd52c768a11482c3aaef9a5a6db9faf
                       51bd527f0a075da113dae25af604dc437944f0d3
                       395b3ad143cfabcb7dbd203aa02c9f009c2e2df0
                       ad152dad
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [9a:6e:da:0c:ff:66:3b:b7:24:e7:99:12:90:a9:8f:83:5c:0b:ba:0c],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-12-08 17:54:03.694  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-08 17:54:03.696 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-08 17:54:03.699 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-12-08 17:54:03.700 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-08 17:54:03.700  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-12-08 17:54:03.701  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-08 17:54:03.701  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-08 17:54:03.702 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-08 17:54:03.702 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-08 17:54:03.703 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-08 17:54:03.707 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-08 17:54:03.708 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-08 17:54:03.708 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-08 17:54:03.708 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-08 17:54:03.817  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-08 17:54:03.818  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-08 17:54:03.819 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-08 17:54:03.819 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-08 17:54:03.822  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-08 17:54:03.822  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-08 17:54:03.824 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-08 17:54:03.824 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-08 17:54:03.824 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-08 17:54:03.826 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-08 17:54:03.826 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-08 17:54:03.828 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-08 17:54:03.829 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-08 17:54:03.829 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-08 17:54:03.830 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-08 17:54:03.831 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-08 17:54:03.836 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 51172506973174966761330907408246848553707397839
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Dec 08 15:10:43 UTC 2022
           Final Date: Tue Dec 07 15:10:42 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [32:24:01:4d:e9:08:8a:3e:e6:eb:99:60:e5:c6:d5:a4:e6:89:2d:fe],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5b5accf98a28fe58742a417120b7372d01a51a85
                       96ee78d2403941751f3143488b270fa3b6857007
                       a4381bdd50f89a4bb905457b6f71c96599bb0505
                       cfae07e94049b5cfd618b19b73bc6278b5a95112
                       c0fcd3ff6094cb885550c3f3c60c469800878e3d
                       bde021ac8279480852ab4862d1613dc4d0f22723
                       b0038204404d6ec1332a38ca0340cd96eb98bf80
                       519768eb4f169901107c0b7a6ece8990511c5b90
                       723a698511638de60699059fe0b5887d9079ee7b
                       86abce7546e439cad677e5977997a9b94cdcb7a9
                       e402baef062221bcff52e084f00da41a38a3ed07
                       c689748e812014cc622875831ed19ddebedfb133
                       dce8d39684ce9e6e30b084749b167d721459cf57
                       002ad2517c79a7aeaeaa3b45d430996f38ee4925
                       b35f76dcd670d932728d7577f11220bde9d9d2c7
                       ba71cae432fe344f14619e4b9b383b02d6d33224
                       f7a708f2bcd52c768a11482c3aaef9a5a6db9faf
                       51bd527f0a075da113dae25af604dc437944f0d3
                       395b3ad143cfabcb7dbd203aa02c9f009c2e2df0
                       ad152dad
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [70:d3:9e:e1:1b:fb:ec:76:c1:2f:09:6a:c9:7a:4b:c0:bd:8e:d9:17],[56:66:d1:a4]
        modulus: abb63c5a8fb8eb35eabb1dfd60fbad682257acd311c3c99080290184ff965c94a3a163a8f253decf4a0c9519404378ea33a664b54e761e54574d494089c49d65017e6d8950dcb6f00854b1ea42be31773ff29c4c5f046727e1a6843e6a0111d04336f188ac214edb58b2e708eafceac44f96d852c7efade37364f762a63ce2400cb960f699bb473ed8f998db93d501516092523044bc969f3296cd8e5f743205b994c9f4504a4fdf23447a2425acff1d21100ed8944fd7d3cf84d54e3950a859614f7e268ae9eeddf04fce3a12ba867c83295e8757f76130c0be3af8303b7a74b2eb334fee4306ac7a8451d59d0c7586ebea769f52c86bddeecec9c35c43814b
public exponent: 10001

]