Results

By type

          2023-01-08 05:05:50,604 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2023-01-08 05:05:51,501 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2023-01-08 05:05:52.267  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Jan 08, 2023 5:05:54 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Jan 08, 2023 5:05:54 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Jan 08, 2023 5:05:54 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Jan 08, 2023 5:05:54 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2023-01-08 05:05:54.957 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2023-01-08 05:05:55.267  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2023-01-08 05:05:55.459  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2023-01-08 05:05:56.242 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2023-01-08 05:05:56.244 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
2023-01-08 05:05:56.246 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2023-01-08 05:05:56.250 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2023-01-08 05:05:56.289 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2023-01-08 05:05:56.292 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/docs]}: redirectToUi(HttpServletRequest)
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
2023-01-08 05:05:56.417 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2023-01-08 05:05:57.084 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Jan 08, 2023 5:05:57 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2023-01-08 05:05:58.161  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 8.517 seconds (JVM running for 10.356)
Jan 08, 2023 5:06:19 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2023-01-08 05:06:42.286  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-08 05:06:42.294 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-08 05:06:42.348 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2023-01-08 05:06:42.352 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-08 05:06:42.370  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2023-01-08 05:06:42.374  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-08 05:06:42.375  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-08 05:06:42.378 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-08 05:06:42.378 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-08 05:06:42.387 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-08 05:06:42.398 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-08 05:06:42.403 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-08 05:06:42.470 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-08 05:06:42.477 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-08 05:06:42.477 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-08 05:06:42.481 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-08 05:06:43.349  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-08 05:06:43.351  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-08 05:06:43.352 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-08 05:06:43.353 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-08 05:06:43.363  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-08 05:06:43.363  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-08 05:06:43.364 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-08 05:06:43.365 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-08 05:06:43.365 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-08 05:06:43.382 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-08 05:06:43.383 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-08 05:06:43.383 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-08 05:06:43.389 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-08 05:06:43.390 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-08 05:06:43.390 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-08 05:06:43.394 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-08 05:06:43.433 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 695215511508180547193010924774135480742265436970
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Jan 08 05:03:19 UTC 2023
           Final Date: Fri Jan 07 05:03:18 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [9b:83:a2:c5:37:d3:bf:31:8b:9e:8b:4a:50:5f:30:9a:74:95:95:40],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 17deec314758c2061aae69e9aafddf52e99b8fe3
                       e05b73f3b02ff489fc110399081d16d375dbc3a9
                       3a0dea7ea44c22224771886630f26d220febac8c
                       4473af2bb79194b25da0036e49356792d7acf33f
                       9535c335c9a3946d978cefec92cb3b27e1cbba6f
                       982f99e8f90d66675aed52b805366dbbbe7c6f8f
                       b8057cc0f24ffba873dab46c07919c0e58bd4bcb
                       38104e436ac975955b07a17b3e14b13c8a24e5f4
                       26987aaa6ed4394c8bbd3f10a751e9d4d1dfc7ff
                       f1fafd9cdd37f7d6091c92d72655f1efb0285423
                       1dd95fb7de357d5406d1863a08ed5b271524e733
                       72d49516025c647d2a1679746934bfc76f57742b
                       f0d55d89a3cda546b11c4253e7cbce621e596f2d
                       37865146f2e7244f20df356ea5db297e590b8554
                       148da068cd44e1bdd9eabec65a8735217783e07f
                       28bcf2090652bc441ec35991851eb7a648832456
                       7cb0e1b92217063df6198a72334600c8243bc50d
                       6ccd77563134d5e92fe57af3bc7a04a9cbf56e4f
                       b90d0478fde90cc446c468749840a697eca875c7
                       1eef91c9
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [13:b1:4d:8e:a5:2f:5e:7f:c1:a6:de:da:85:cd:67:b8:06:56:d7:7b],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-08 06:44:56.279  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-08 06:44:56.284 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-08 06:44:56.288 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-08 06:44:56.289 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-08 06:44:56.290  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-08 06:44:56.291  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-08 06:44:56.292  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-08 06:44:56.292 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-08 06:44:56.293 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-08 06:44:56.293 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-08 06:44:56.298 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-08 06:44:56.301 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-08 06:44:56.301 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-08 06:44:56.302 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-08 06:44:56.634  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-08 06:44:56.635  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-08 06:44:56.635 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-08 06:44:56.635 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-08 06:44:56.638  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-08 06:44:56.638  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-08 06:44:56.638 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-08 06:44:56.639 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-08 06:44:56.639 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-08 06:44:56.640 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-08 06:44:56.641 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-08 06:44:56.641 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-08 06:44:56.642 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-08 06:44:56.642 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-08 06:44:56.643 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-08 06:44:56.644 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-08 06:44:56.648 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 695215511508180547193010924774135480742265436970
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Jan 08 05:03:19 UTC 2023
           Final Date: Fri Jan 07 05:03:18 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [9b:83:a2:c5:37:d3:bf:31:8b:9e:8b:4a:50:5f:30:9a:74:95:95:40],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 17deec314758c2061aae69e9aafddf52e99b8fe3
                       e05b73f3b02ff489fc110399081d16d375dbc3a9
                       3a0dea7ea44c22224771886630f26d220febac8c
                       4473af2bb79194b25da0036e49356792d7acf33f
                       9535c335c9a3946d978cefec92cb3b27e1cbba6f
                       982f99e8f90d66675aed52b805366dbbbe7c6f8f
                       b8057cc0f24ffba873dab46c07919c0e58bd4bcb
                       38104e436ac975955b07a17b3e14b13c8a24e5f4
                       26987aaa6ed4394c8bbd3f10a751e9d4d1dfc7ff
                       f1fafd9cdd37f7d6091c92d72655f1efb0285423
                       1dd95fb7de357d5406d1863a08ed5b271524e733
                       72d49516025c647d2a1679746934bfc76f57742b
                       f0d55d89a3cda546b11c4253e7cbce621e596f2d
                       37865146f2e7244f20df356ea5db297e590b8554
                       148da068cd44e1bdd9eabec65a8735217783e07f
                       28bcf2090652bc441ec35991851eb7a648832456
                       7cb0e1b92217063df6198a72334600c8243bc50d
                       6ccd77563134d5e92fe57af3bc7a04a9cbf56e4f
                       b90d0478fde90cc446c468749840a697eca875c7
                       1eef91c9
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [b6:8d:8b:95:a5:67:bd:d6:a4:35:e8:08:c4:b8:e2:71:f4:f5:65:2f],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-08 06:46:44.468  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-08 06:46:44.470 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-08 06:46:44.472 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2023-01-08 06:46:44.472 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-08 06:46:44.473  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2023-01-08 06:46:44.474  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-08 06:46:44.474  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-08 06:46:44.475 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-08 06:46:44.475 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-08 06:46:44.476 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-08 06:46:44.483 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-08 06:46:44.483 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-08 06:46:44.483 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-08 06:46:44.484 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-08 06:46:44.678  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-08 06:46:44.679  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-08 06:46:44.679 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-08 06:46:44.680 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-08 06:46:44.682  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-08 06:46:44.682  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-08 06:46:44.683 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-08 06:46:44.683 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-08 06:46:44.684 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-08 06:46:44.685 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-08 06:46:44.685 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-08 06:46:44.686 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-08 06:46:44.686 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-08 06:46:44.687 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-08 06:46:44.687 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-08 06:46:44.693 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-08 06:46:44.698 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 695215511508180547193010924774135480742265436970
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Jan 08 05:03:19 UTC 2023
           Final Date: Fri Jan 07 05:03:18 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [9b:83:a2:c5:37:d3:bf:31:8b:9e:8b:4a:50:5f:30:9a:74:95:95:40],[56:66:d1:a4]
        modulus: be7a27fb3b71a88f35647be5037e948af316faaa6bbb900fe17681f8555bdbac99a991e10d8ae8c162aad1239bea204eca1356f64a71acf56e4754a6de516fdcfd04cab05b71247266c26fe2e8f70731cb6967d4102cb698e4c0168da649e852c67f1eec08f9690447f581cabb53389ccc47a89cc992b0c187789938b11191d037808af2a825f2fdacc56214f75fe7b2a7b5739e08600040ac72a1b48f94699b2cf76101a5bad4651cfe07bf3f58c1f9d4ac37b1483e247320e2179c27bcd1fab378b0df09f85cc7b130c1a3947d99f9af6e97f68b3227b1320c19f99e53d789a8d175f7c1f249cd8eebc7cd08f6951ed76072de265d34a43b864eb121a87dfd5eae38115e85d7bc081d6bd48639a02f7ff319b58e3e57ce52d66dcca223b16a21b4860d8e0c01b8bcb8c1962583e790dd118c928abfda9b5d4b55134135032418b0a7999444b3dc99290dece376a3734695045e8c7c1e6c6f979b3b40b59ca505c12cf14d0753afac33f1629d5d35cf2cdc4662d2acbe1e984da56304a7bc63
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 17deec314758c2061aae69e9aafddf52e99b8fe3
                       e05b73f3b02ff489fc110399081d16d375dbc3a9
                       3a0dea7ea44c22224771886630f26d220febac8c
                       4473af2bb79194b25da0036e49356792d7acf33f
                       9535c335c9a3946d978cefec92cb3b27e1cbba6f
                       982f99e8f90d66675aed52b805366dbbbe7c6f8f
                       b8057cc0f24ffba873dab46c07919c0e58bd4bcb
                       38104e436ac975955b07a17b3e14b13c8a24e5f4
                       26987aaa6ed4394c8bbd3f10a751e9d4d1dfc7ff
                       f1fafd9cdd37f7d6091c92d72655f1efb0285423
                       1dd95fb7de357d5406d1863a08ed5b271524e733
                       72d49516025c647d2a1679746934bfc76f57742b
                       f0d55d89a3cda546b11c4253e7cbce621e596f2d
                       37865146f2e7244f20df356ea5db297e590b8554
                       148da068cd44e1bdd9eabec65a8735217783e07f
                       28bcf2090652bc441ec35991851eb7a648832456
                       7cb0e1b92217063df6198a72334600c8243bc50d
                       6ccd77563134d5e92fe57af3bc7a04a9cbf56e4f
                       b90d0478fde90cc446c468749840a697eca875c7
                       1eef91c9
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [36:ca:9c:e5:bf:04:b6:4f:24:3f:56:15:1b:0a:9f:22:d6:5a:70:ed],[56:66:d1:a4]
        modulus: a10e01d4e7fdde7a3c9c631579dbe14285e5712ad41fac446f2eccfd88819b4f588a0eaaa527bbd7e48d3fc6aa185d75a1f8a85a7e1816613c81eaefbfe5f1e48b5673ae0c411320629516851cf3428a852f75f599f658bb16e6c2ccf753e28f809c5676b2b4d421de9fdb383869589ada7bfec6bd8c939fd135400a034fb455bebc57a9d353380c57934ac1c790cbb633011c6a6056855204f18886176fb0031f7a85d91e9d0a89cd1d92f2499a45beec9246e018ca1c8dc9a79dfbd8308bf8b146d82139a1a6aa3ba72ea1406d125b8bc9b070f474d5529cacad2edfc4545f7c272d073ef1cb75c7aba7666ce0aa10562b7c67206ade164623a02404309817
public exponent: 10001

] 
2023-01-08 06:48:45.628  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-08 06:48:45.634 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-08 06:48:45.638 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2023-01-08 06:48:45.640 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-08 06:48:45.641  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2023-01-08 06:48:45.642  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-08 06:48:45.643  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-08 06:48:45.644 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-08 06:48:45.645 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-08 06:48:45.645 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-08 06:48:45.651 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-08 06:48:45.654 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-08 06:48:45.654 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-08 06:48:45.655 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-08 06:48:45.841  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-08 06:48:45.841  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-08 06:48:45.842 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-08 06:48:45.842 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-08 06:48:45.844  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-08 06:48:45.844  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-08 06:48:45.845 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-08 06:48:45.845 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-08 06:48:45.846 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-08 06:48:45.847 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-08 06:48:45.847 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-08 06:48:45.847 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-08 06:48:45.848 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-08 06:48:45.849 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-08 06:48:45.849 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-08 06:48:45.850 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-08 06:48:45.855 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 695215511508180547193010924774135480742265436970
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Jan 08 05:03:19 UTC 2023
           Final Date: Fri Jan 07 05:03:18 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [9b:83:a2:c5:37:d3:bf:31:8b:9e:8b:4a:50:5f:30:9a:74:95:95:40],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 17deec314758c2061aae69e9aafddf52e99b8fe3
                       e05b73f3b02ff489fc110399081d16d375dbc3a9
                       3a0dea7ea44c22224771886630f26d220febac8c
                       4473af2bb79194b25da0036e49356792d7acf33f
                       9535c335c9a3946d978cefec92cb3b27e1cbba6f
                       982f99e8f90d66675aed52b805366dbbbe7c6f8f
                       b8057cc0f24ffba873dab46c07919c0e58bd4bcb
                       38104e436ac975955b07a17b3e14b13c8a24e5f4
                       26987aaa6ed4394c8bbd3f10a751e9d4d1dfc7ff
                       f1fafd9cdd37f7d6091c92d72655f1efb0285423
                       1dd95fb7de357d5406d1863a08ed5b271524e733
                       72d49516025c647d2a1679746934bfc76f57742b
                       f0d55d89a3cda546b11c4253e7cbce621e596f2d
                       37865146f2e7244f20df356ea5db297e590b8554
                       148da068cd44e1bdd9eabec65a8735217783e07f
                       28bcf2090652bc441ec35991851eb7a648832456
                       7cb0e1b92217063df6198a72334600c8243bc50d
                       6ccd77563134d5e92fe57af3bc7a04a9cbf56e4f
                       b90d0478fde90cc446c468749840a697eca875c7
                       1eef91c9
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [34:88:1f:07:9d:b1:70:5d:29:35:f3:8a:db:a1:98:7e:d0:2c:6c:94],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-08 06:51:57.632  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-08 06:51:57.634 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-08 06:51:57.636 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-08 06:51:57.637 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-08 06:51:57.638  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-08 06:51:57.638  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-08 06:51:57.639  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-08 06:51:57.639 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-08 06:51:57.640 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-08 06:51:57.640 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-08 06:51:57.645 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-08 06:51:57.646 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-08 06:51:57.646 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-08 06:51:57.647 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-08 06:51:57.822  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-08 06:51:57.823  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-08 06:51:57.823 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-08 06:51:57.824 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-08 06:51:57.825  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-08 06:51:57.826  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-08 06:51:57.826 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-08 06:51:57.826 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-08 06:51:57.827 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-08 06:51:57.828 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-08 06:51:57.828 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-08 06:51:57.828 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-08 06:51:57.829 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-08 06:51:57.829 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-08 06:51:57.830 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-08 06:51:57.831 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-08 06:51:57.834 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 695215511508180547193010924774135480742265436970
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Jan 08 05:03:19 UTC 2023
           Final Date: Fri Jan 07 05:03:18 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [9b:83:a2:c5:37:d3:bf:31:8b:9e:8b:4a:50:5f:30:9a:74:95:95:40],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 17deec314758c2061aae69e9aafddf52e99b8fe3
                       e05b73f3b02ff489fc110399081d16d375dbc3a9
                       3a0dea7ea44c22224771886630f26d220febac8c
                       4473af2bb79194b25da0036e49356792d7acf33f
                       9535c335c9a3946d978cefec92cb3b27e1cbba6f
                       982f99e8f90d66675aed52b805366dbbbe7c6f8f
                       b8057cc0f24ffba873dab46c07919c0e58bd4bcb
                       38104e436ac975955b07a17b3e14b13c8a24e5f4
                       26987aaa6ed4394c8bbd3f10a751e9d4d1dfc7ff
                       f1fafd9cdd37f7d6091c92d72655f1efb0285423
                       1dd95fb7de357d5406d1863a08ed5b271524e733
                       72d49516025c647d2a1679746934bfc76f57742b
                       f0d55d89a3cda546b11c4253e7cbce621e596f2d
                       37865146f2e7244f20df356ea5db297e590b8554
                       148da068cd44e1bdd9eabec65a8735217783e07f
                       28bcf2090652bc441ec35991851eb7a648832456
                       7cb0e1b92217063df6198a72334600c8243bc50d
                       6ccd77563134d5e92fe57af3bc7a04a9cbf56e4f
                       b90d0478fde90cc446c468749840a697eca875c7
                       1eef91c9
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [aa:79:8c:36:53:6d:cc:6c:92:4c:10:28:64:46:26:11:74:bb:07:f4],[56:66:d1:a4]
        modulus: c761a8de3f83b06c93509cda21abcb1d63564eb1e6633b72a08e941fcc5b7629553aa7a51415950c57ce70d3ca5b2a7792cad7d574a233758053d25f67dad623bace6d48ebd316a72f5856f288152f758de8434ba9cf862a0f5239b360749e51699dcec8c04137acf4c11de4fc161849e654f53a0d57aae6082d310db8bc87c0acb18ee7c3484dfd7850ebecc8fb70405b6c4d9b73ffc50e3a7d90835580d7a2b77ff38bd3fa6098af73cd29cedb17d00de185b5eb3d480749746c8bfa04b486e5f21fcfbaa3dc82ca37a46a6fe86267206a2f3ef5ef945dcb24444edfc49d5f1ad8d33875d66b5261763d48f1eec3c34347f5202948622b1bf0784257fc401f
public exponent: 10001

] 
2023-01-08 07:00:05.503  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-08 07:00:05.508 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-08 07:00:05.513 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-08 07:00:05.515 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-08 07:00:05.517  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-08 07:00:05.517  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-08 07:00:05.518  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-08 07:00:05.519 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-08 07:00:05.520 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-08 07:00:05.520 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-08 07:00:05.535 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-08 07:00:05.537 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-08 07:00:05.537 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-08 07:00:05.537 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-08 07:00:05.775  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-08 07:00:05.780  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-08 07:00:05.783 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-08 07:00:05.783 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-08 07:00:05.785  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-08 07:00:05.785  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-08 07:00:05.786 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-08 07:00:05.786 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-08 07:00:05.786 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-08 07:00:05.790 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-08 07:00:05.790 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-08 07:00:05.791 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-08 07:00:05.792 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-08 07:00:05.792 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-08 07:00:05.792 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-08 07:00:05.793 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-08 07:00:05.804 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 695215511508180547193010924774135480742265436970
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Jan 08 05:03:19 UTC 2023
           Final Date: Fri Jan 07 05:03:18 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [9b:83:a2:c5:37:d3:bf:31:8b:9e:8b:4a:50:5f:30:9a:74:95:95:40],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 17deec314758c2061aae69e9aafddf52e99b8fe3
                       e05b73f3b02ff489fc110399081d16d375dbc3a9
                       3a0dea7ea44c22224771886630f26d220febac8c
                       4473af2bb79194b25da0036e49356792d7acf33f
                       9535c335c9a3946d978cefec92cb3b27e1cbba6f
                       982f99e8f90d66675aed52b805366dbbbe7c6f8f
                       b8057cc0f24ffba873dab46c07919c0e58bd4bcb
                       38104e436ac975955b07a17b3e14b13c8a24e5f4
                       26987aaa6ed4394c8bbd3f10a751e9d4d1dfc7ff
                       f1fafd9cdd37f7d6091c92d72655f1efb0285423
                       1dd95fb7de357d5406d1863a08ed5b271524e733
                       72d49516025c647d2a1679746934bfc76f57742b
                       f0d55d89a3cda546b11c4253e7cbce621e596f2d
                       37865146f2e7244f20df356ea5db297e590b8554
                       148da068cd44e1bdd9eabec65a8735217783e07f
                       28bcf2090652bc441ec35991851eb7a648832456
                       7cb0e1b92217063df6198a72334600c8243bc50d
                       6ccd77563134d5e92fe57af3bc7a04a9cbf56e4f
                       b90d0478fde90cc446c468749840a697eca875c7
                       1eef91c9
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [d8:33:fe:78:f3:d3:a5:fd:70:e6:42:3e:20:4a:cc:57:3c:56:a2:4c],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-08 07:05:45.627  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-08 07:05:45.631 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-08 07:05:45.634 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-08 07:05:45.635 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-08 07:05:45.636  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-08 07:05:45.637  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-08 07:05:45.637  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-08 07:05:45.638 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-08 07:05:45.638 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-08 07:05:45.639 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-08 07:05:45.643 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-08 07:05:45.645 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-08 07:05:45.645 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-08 07:05:45.645 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-08 07:05:45.803  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-08 07:05:45.804  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-08 07:05:45.804 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-08 07:05:45.805 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-08 07:05:45.806  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-08 07:05:45.807  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-08 07:05:45.807 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-08 07:05:45.807 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-08 07:05:45.808 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-08 07:05:45.809 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-08 07:05:45.809 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-08 07:05:45.810 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-08 07:05:45.810 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-08 07:05:45.811 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-08 07:05:45.811 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-08 07:05:45.812 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-08 07:05:45.815 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 695215511508180547193010924774135480742265436970
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Jan 08 05:03:19 UTC 2023
           Final Date: Fri Jan 07 05:03:18 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [9b:83:a2:c5:37:d3:bf:31:8b:9e:8b:4a:50:5f:30:9a:74:95:95:40],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 17deec314758c2061aae69e9aafddf52e99b8fe3
                       e05b73f3b02ff489fc110399081d16d375dbc3a9
                       3a0dea7ea44c22224771886630f26d220febac8c
                       4473af2bb79194b25da0036e49356792d7acf33f
                       9535c335c9a3946d978cefec92cb3b27e1cbba6f
                       982f99e8f90d66675aed52b805366dbbbe7c6f8f
                       b8057cc0f24ffba873dab46c07919c0e58bd4bcb
                       38104e436ac975955b07a17b3e14b13c8a24e5f4
                       26987aaa6ed4394c8bbd3f10a751e9d4d1dfc7ff
                       f1fafd9cdd37f7d6091c92d72655f1efb0285423
                       1dd95fb7de357d5406d1863a08ed5b271524e733
                       72d49516025c647d2a1679746934bfc76f57742b
                       f0d55d89a3cda546b11c4253e7cbce621e596f2d
                       37865146f2e7244f20df356ea5db297e590b8554
                       148da068cd44e1bdd9eabec65a8735217783e07f
                       28bcf2090652bc441ec35991851eb7a648832456
                       7cb0e1b92217063df6198a72334600c8243bc50d
                       6ccd77563134d5e92fe57af3bc7a04a9cbf56e4f
                       b90d0478fde90cc446c468749840a697eca875c7
                       1eef91c9
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [40:9f:9b:b3:f9:16:9b:4b:d9:76:f8:1d:63:f5:29:06:11:21:0b:f4],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-08 07:12:41.920  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-08 07:12:41.924 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-08 07:12:41.927 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-08 07:12:41.928 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-08 07:12:41.929  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-08 07:12:41.929  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-08 07:12:41.930  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-08 07:12:41.930 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-08 07:12:41.931 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-08 07:12:41.931 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-08 07:12:41.937 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-08 07:12:41.938 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-08 07:12:41.938 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-08 07:12:41.939 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-08 07:12:42.110  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-08 07:12:42.110  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-08 07:12:42.111 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-08 07:12:42.111 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-08 07:12:42.112  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-08 07:12:42.113  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-08 07:12:42.113 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-08 07:12:42.114 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-08 07:12:42.114 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-08 07:12:42.115 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-08 07:12:42.115 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-08 07:12:42.115 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-08 07:12:42.116 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-08 07:12:42.117 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-08 07:12:42.117 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-08 07:12:42.118 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-08 07:12:42.122 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 695215511508180547193010924774135480742265436970
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Jan 08 05:03:19 UTC 2023
           Final Date: Fri Jan 07 05:03:18 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [9b:83:a2:c5:37:d3:bf:31:8b:9e:8b:4a:50:5f:30:9a:74:95:95:40],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 17deec314758c2061aae69e9aafddf52e99b8fe3
                       e05b73f3b02ff489fc110399081d16d375dbc3a9
                       3a0dea7ea44c22224771886630f26d220febac8c
                       4473af2bb79194b25da0036e49356792d7acf33f
                       9535c335c9a3946d978cefec92cb3b27e1cbba6f
                       982f99e8f90d66675aed52b805366dbbbe7c6f8f
                       b8057cc0f24ffba873dab46c07919c0e58bd4bcb
                       38104e436ac975955b07a17b3e14b13c8a24e5f4
                       26987aaa6ed4394c8bbd3f10a751e9d4d1dfc7ff
                       f1fafd9cdd37f7d6091c92d72655f1efb0285423
                       1dd95fb7de357d5406d1863a08ed5b271524e733
                       72d49516025c647d2a1679746934bfc76f57742b
                       f0d55d89a3cda546b11c4253e7cbce621e596f2d
                       37865146f2e7244f20df356ea5db297e590b8554
                       148da068cd44e1bdd9eabec65a8735217783e07f
                       28bcf2090652bc441ec35991851eb7a648832456
                       7cb0e1b92217063df6198a72334600c8243bc50d
                       6ccd77563134d5e92fe57af3bc7a04a9cbf56e4f
                       b90d0478fde90cc446c468749840a697eca875c7
                       1eef91c9
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [2e:63:fb:5c:57:e0:2f:cd:aa:a6:35:5a:f2:52:67:f1:82:ca:54:5d],[56:66:d1:a4]
        modulus: a7c5978f4510e9acb27dfdfae3872f7e57bde452a475764d404ccb830f860be396ec9114ce04f9d227965571915b4e8fda901318c91923bd36744fce652dd21cf119e9beff8a9b0b8ca7c33f1a5d458902c393552ffb4b68f26d435f814cc45bc200f6067bcce657fab493e3f4f9d26bb43f3643233ed61686affc680aa9e91d034e1aa53a40398e80803617ff6a18804c06b755a7debf122996b366da98a1158e000cd7a1f1206ab4ff20a3b46ab5343007b088a38604346e21c3df38b2006df0f0426320ce7a8cfd1f7fbfb7ca2ccf454c1a7b48080f3d09c9a6f599b1bdd0151a4afaeb4b35d3b35d4a19808f789f8ac3a97f0d7c4a4222ba033f29d2652b
public exponent: 10001

] 
2023-01-08 07:18:35.003  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-08 07:18:35.006 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-08 07:18:35.008 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-08 07:18:35.009 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-08 07:18:35.010  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-08 07:18:35.011  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-08 07:18:35.013  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-08 07:18:35.013 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-08 07:18:35.014 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-08 07:18:35.014 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-08 07:18:35.018 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-08 07:18:35.019 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-08 07:18:35.020 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-08 07:18:35.020 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-08 07:18:35.190  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-08 07:18:35.191  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-08 07:18:35.191 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-08 07:18:35.192 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-08 07:18:35.193  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-08 07:18:35.193  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-08 07:18:35.194 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-08 07:18:35.194 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-08 07:18:35.194 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-08 07:18:35.195 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-08 07:18:35.195 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-08 07:18:35.196 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-08 07:18:35.196 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-08 07:18:35.196 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-08 07:18:35.197 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-08 07:18:35.197 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-08 07:18:35.201 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 695215511508180547193010924774135480742265436970
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Jan 08 05:03:19 UTC 2023
           Final Date: Fri Jan 07 05:03:18 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [9b:83:a2:c5:37:d3:bf:31:8b:9e:8b:4a:50:5f:30:9a:74:95:95:40],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 17deec314758c2061aae69e9aafddf52e99b8fe3
                       e05b73f3b02ff489fc110399081d16d375dbc3a9
                       3a0dea7ea44c22224771886630f26d220febac8c
                       4473af2bb79194b25da0036e49356792d7acf33f
                       9535c335c9a3946d978cefec92cb3b27e1cbba6f
                       982f99e8f90d66675aed52b805366dbbbe7c6f8f
                       b8057cc0f24ffba873dab46c07919c0e58bd4bcb
                       38104e436ac975955b07a17b3e14b13c8a24e5f4
                       26987aaa6ed4394c8bbd3f10a751e9d4d1dfc7ff
                       f1fafd9cdd37f7d6091c92d72655f1efb0285423
                       1dd95fb7de357d5406d1863a08ed5b271524e733
                       72d49516025c647d2a1679746934bfc76f57742b
                       f0d55d89a3cda546b11c4253e7cbce621e596f2d
                       37865146f2e7244f20df356ea5db297e590b8554
                       148da068cd44e1bdd9eabec65a8735217783e07f
                       28bcf2090652bc441ec35991851eb7a648832456
                       7cb0e1b92217063df6198a72334600c8243bc50d
                       6ccd77563134d5e92fe57af3bc7a04a9cbf56e4f
                       b90d0478fde90cc446c468749840a697eca875c7
                       1eef91c9
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [e6:cf:02:cb:50:62:5a:cb:1e:d2:6b:b8:0d:29:e0:9c:90:71:ce:82],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-08 07:25:37.665  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-08 07:25:37.668 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-08 07:25:37.670 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2023-01-08 07:25:37.670 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-08 07:25:37.671  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2023-01-08 07:25:37.671  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-08 07:25:37.672  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-08 07:25:37.672 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-08 07:25:37.673 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-08 07:25:37.673 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-08 07:25:37.678 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-08 07:25:37.679 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-08 07:25:37.679 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-08 07:25:37.679 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-08 07:25:37.879  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-08 07:25:37.880  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-08 07:25:37.881 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-08 07:25:37.881 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-08 07:25:37.882  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-08 07:25:37.882  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-08 07:25:37.883 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-08 07:25:37.883 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-08 07:25:37.883 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-08 07:25:37.884 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-08 07:25:37.884 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-08 07:25:37.884 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-08 07:25:37.885 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-08 07:25:37.885 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-08 07:25:37.886 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-08 07:25:37.886 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-08 07:25:37.890 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 695215511508180547193010924774135480742265436970
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Jan 08 05:03:19 UTC 2023
           Final Date: Fri Jan 07 05:03:18 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [9b:83:a2:c5:37:d3:bf:31:8b:9e:8b:4a:50:5f:30:9a:74:95:95:40],[56:66:d1:a4]
        modulus: be7a27fb3b71a88f35647be5037e948af316faaa6bbb900fe17681f8555bdbac99a991e10d8ae8c162aad1239bea204eca1356f64a71acf56e4754a6de516fdcfd04cab05b71247266c26fe2e8f70731cb6967d4102cb698e4c0168da649e852c67f1eec08f9690447f581cabb53389ccc47a89cc992b0c187789938b11191d037808af2a825f2fdacc56214f75fe7b2a7b5739e08600040ac72a1b48f94699b2cf76101a5bad4651cfe07bf3f58c1f9d4ac37b1483e247320e2179c27bcd1fab378b0df09f85cc7b130c1a3947d99f9af6e97f68b3227b1320c19f99e53d789a8d175f7c1f249cd8eebc7cd08f6951ed76072de265d34a43b864eb121a87dfd5eae38115e85d7bc081d6bd48639a02f7ff319b58e3e57ce52d66dcca223b16a21b4860d8e0c01b8bcb8c1962583e790dd118c928abfda9b5d4b55134135032418b0a7999444b3dc99290dece376a3734695045e8c7c1e6c6f979b3b40b59ca505c12cf14d0753afac33f1629d5d35cf2cdc4662d2acbe1e984da56304a7bc63
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 17deec314758c2061aae69e9aafddf52e99b8fe3
                       e05b73f3b02ff489fc110399081d16d375dbc3a9
                       3a0dea7ea44c22224771886630f26d220febac8c
                       4473af2bb79194b25da0036e49356792d7acf33f
                       9535c335c9a3946d978cefec92cb3b27e1cbba6f
                       982f99e8f90d66675aed52b805366dbbbe7c6f8f
                       b8057cc0f24ffba873dab46c07919c0e58bd4bcb
                       38104e436ac975955b07a17b3e14b13c8a24e5f4
                       26987aaa6ed4394c8bbd3f10a751e9d4d1dfc7ff
                       f1fafd9cdd37f7d6091c92d72655f1efb0285423
                       1dd95fb7de357d5406d1863a08ed5b271524e733
                       72d49516025c647d2a1679746934bfc76f57742b
                       f0d55d89a3cda546b11c4253e7cbce621e596f2d
                       37865146f2e7244f20df356ea5db297e590b8554
                       148da068cd44e1bdd9eabec65a8735217783e07f
                       28bcf2090652bc441ec35991851eb7a648832456
                       7cb0e1b92217063df6198a72334600c8243bc50d
                       6ccd77563134d5e92fe57af3bc7a04a9cbf56e4f
                       b90d0478fde90cc446c468749840a697eca875c7
                       1eef91c9
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [1b:07:4e:57:03:00:be:23:da:6d:db:06:17:f4:ef:c8:54:af:39:3d],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-08 07:32:36.938  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-08 07:32:36.941 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-08 07:32:36.944 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2023-01-08 07:32:36.946 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-08 07:32:36.947  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2023-01-08 07:32:36.948  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-08 07:32:36.949  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-08 07:32:36.950 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-08 07:32:36.951 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-08 07:32:36.951 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-08 07:32:36.956 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-08 07:32:36.957 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-08 07:32:36.957 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-08 07:32:36.957 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-08 07:32:37.125  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-08 07:32:37.126  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-08 07:32:37.126 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-08 07:32:37.126 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-08 07:32:37.127  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-08 07:32:37.128  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-08 07:32:37.128 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-08 07:32:37.128 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-08 07:32:37.128 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-08 07:32:37.129 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-08 07:32:37.129 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-08 07:32:37.130 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-08 07:32:37.130 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-08 07:32:37.131 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-08 07:32:37.131 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-08 07:32:37.131 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-08 07:32:37.135 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 695215511508180547193010924774135480742265436970
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Jan 08 05:03:19 UTC 2023
           Final Date: Fri Jan 07 05:03:18 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [9b:83:a2:c5:37:d3:bf:31:8b:9e:8b:4a:50:5f:30:9a:74:95:95:40],[56:66:d1:a4]
        modulus: be7a27fb3b71a88f35647be5037e948af316faaa6bbb900fe17681f8555bdbac99a991e10d8ae8c162aad1239bea204eca1356f64a71acf56e4754a6de516fdcfd04cab05b71247266c26fe2e8f70731cb6967d4102cb698e4c0168da649e852c67f1eec08f9690447f581cabb53389ccc47a89cc992b0c187789938b11191d037808af2a825f2fdacc56214f75fe7b2a7b5739e08600040ac72a1b48f94699b2cf76101a5bad4651cfe07bf3f58c1f9d4ac37b1483e247320e2179c27bcd1fab378b0df09f85cc7b130c1a3947d99f9af6e97f68b3227b1320c19f99e53d789a8d175f7c1f249cd8eebc7cd08f6951ed76072de265d34a43b864eb121a87dfd5eae38115e85d7bc081d6bd48639a02f7ff319b58e3e57ce52d66dcca223b16a21b4860d8e0c01b8bcb8c1962583e790dd118c928abfda9b5d4b55134135032418b0a7999444b3dc99290dece376a3734695045e8c7c1e6c6f979b3b40b59ca505c12cf14d0753afac33f1629d5d35cf2cdc4662d2acbe1e984da56304a7bc63
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 17deec314758c2061aae69e9aafddf52e99b8fe3
                       e05b73f3b02ff489fc110399081d16d375dbc3a9
                       3a0dea7ea44c22224771886630f26d220febac8c
                       4473af2bb79194b25da0036e49356792d7acf33f
                       9535c335c9a3946d978cefec92cb3b27e1cbba6f
                       982f99e8f90d66675aed52b805366dbbbe7c6f8f
                       b8057cc0f24ffba873dab46c07919c0e58bd4bcb
                       38104e436ac975955b07a17b3e14b13c8a24e5f4
                       26987aaa6ed4394c8bbd3f10a751e9d4d1dfc7ff
                       f1fafd9cdd37f7d6091c92d72655f1efb0285423
                       1dd95fb7de357d5406d1863a08ed5b271524e733
                       72d49516025c647d2a1679746934bfc76f57742b
                       f0d55d89a3cda546b11c4253e7cbce621e596f2d
                       37865146f2e7244f20df356ea5db297e590b8554
                       148da068cd44e1bdd9eabec65a8735217783e07f
                       28bcf2090652bc441ec35991851eb7a648832456
                       7cb0e1b92217063df6198a72334600c8243bc50d
                       6ccd77563134d5e92fe57af3bc7a04a9cbf56e4f
                       b90d0478fde90cc446c468749840a697eca875c7
                       1eef91c9
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ec:f5:41:00:f9:3f:a5:30:14:64:6d:49:2b:fd:cb:d6:4e:34:43:51],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-08 07:32:54.393  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-08 07:32:54.395 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-08 07:32:54.396 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2023-01-08 07:32:54.396 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-08 07:32:54.397  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2023-01-08 07:32:54.397  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-08 07:32:54.398  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-08 07:32:54.398 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-08 07:32:54.398 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-08 07:32:54.399 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-08 07:32:54.402 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-08 07:32:54.402 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-08 07:32:54.403 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-08 07:32:54.403 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-08 07:32:55.296  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-08 07:32:55.297  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-08 07:32:55.298 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-08 07:32:55.299 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-08 07:32:55.300  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-08 07:32:55.300  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-08 07:32:55.301 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-08 07:32:55.301 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-08 07:32:55.304 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-08 07:32:55.305 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-08 07:32:55.305 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-08 07:32:55.306 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-08 07:32:55.307 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-08 07:32:55.307 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-08 07:32:55.308 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-08 07:32:55.309 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-08 07:32:55.312 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 695215511508180547193010924774135480742265436970
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Jan 08 05:03:19 UTC 2023
           Final Date: Fri Jan 07 05:03:18 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [9b:83:a2:c5:37:d3:bf:31:8b:9e:8b:4a:50:5f:30:9a:74:95:95:40],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 17deec314758c2061aae69e9aafddf52e99b8fe3
                       e05b73f3b02ff489fc110399081d16d375dbc3a9
                       3a0dea7ea44c22224771886630f26d220febac8c
                       4473af2bb79194b25da0036e49356792d7acf33f
                       9535c335c9a3946d978cefec92cb3b27e1cbba6f
                       982f99e8f90d66675aed52b805366dbbbe7c6f8f
                       b8057cc0f24ffba873dab46c07919c0e58bd4bcb
                       38104e436ac975955b07a17b3e14b13c8a24e5f4
                       26987aaa6ed4394c8bbd3f10a751e9d4d1dfc7ff
                       f1fafd9cdd37f7d6091c92d72655f1efb0285423
                       1dd95fb7de357d5406d1863a08ed5b271524e733
                       72d49516025c647d2a1679746934bfc76f57742b
                       f0d55d89a3cda546b11c4253e7cbce621e596f2d
                       37865146f2e7244f20df356ea5db297e590b8554
                       148da068cd44e1bdd9eabec65a8735217783e07f
                       28bcf2090652bc441ec35991851eb7a648832456
                       7cb0e1b92217063df6198a72334600c8243bc50d
                       6ccd77563134d5e92fe57af3bc7a04a9cbf56e4f
                       b90d0478fde90cc446c468749840a697eca875c7
                       1eef91c9
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [42:4c:5e:23:b6:ea:33:e7:3b:ea:e7:6a:cf:29:04:47:ee:b2:9d:3a],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-08 07:57:15.728  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-08 07:57:15.731 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-08 07:57:15.734 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2023-01-08 07:57:15.735 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-08 07:57:15.735  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2023-01-08 07:57:15.736  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-08 07:57:15.736  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-08 07:57:15.737 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-08 07:57:15.738 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-08 07:57:15.738 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-08 07:57:15.743 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-08 07:57:15.744 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-08 07:57:15.744 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-08 07:57:15.744 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-08 07:57:15.930  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-08 07:57:15.930  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-08 07:57:15.931 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-08 07:57:15.931 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-08 07:57:15.932  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-08 07:57:15.932  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-08 07:57:15.933 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-08 07:57:15.933 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-08 07:57:15.933 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-08 07:57:15.934 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-08 07:57:15.934 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-08 07:57:15.935 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-08 07:57:15.935 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-08 07:57:15.935 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-08 07:57:15.936 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-08 07:57:15.936 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-08 07:57:15.940 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 695215511508180547193010924774135480742265436970
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Jan 08 05:03:19 UTC 2023
           Final Date: Fri Jan 07 05:03:18 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [9b:83:a2:c5:37:d3:bf:31:8b:9e:8b:4a:50:5f:30:9a:74:95:95:40],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 17deec314758c2061aae69e9aafddf52e99b8fe3
                       e05b73f3b02ff489fc110399081d16d375dbc3a9
                       3a0dea7ea44c22224771886630f26d220febac8c
                       4473af2bb79194b25da0036e49356792d7acf33f
                       9535c335c9a3946d978cefec92cb3b27e1cbba6f
                       982f99e8f90d66675aed52b805366dbbbe7c6f8f
                       b8057cc0f24ffba873dab46c07919c0e58bd4bcb
                       38104e436ac975955b07a17b3e14b13c8a24e5f4
                       26987aaa6ed4394c8bbd3f10a751e9d4d1dfc7ff
                       f1fafd9cdd37f7d6091c92d72655f1efb0285423
                       1dd95fb7de357d5406d1863a08ed5b271524e733
                       72d49516025c647d2a1679746934bfc76f57742b
                       f0d55d89a3cda546b11c4253e7cbce621e596f2d
                       37865146f2e7244f20df356ea5db297e590b8554
                       148da068cd44e1bdd9eabec65a8735217783e07f
                       28bcf2090652bc441ec35991851eb7a648832456
                       7cb0e1b92217063df6198a72334600c8243bc50d
                       6ccd77563134d5e92fe57af3bc7a04a9cbf56e4f
                       b90d0478fde90cc446c468749840a697eca875c7
                       1eef91c9
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [c1:a7:9f:f5:b2:89:e7:47:4a:1d:2e:44:5c:2b:0b:ba:c1:be:69:be],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-08 07:57:36.568  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-08 07:57:36.570 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-08 07:57:36.571 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2023-01-08 07:57:36.572 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-08 07:57:36.573  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2023-01-08 07:57:36.573  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-08 07:57:36.573  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-08 07:57:36.574 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-08 07:57:36.574 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-08 07:57:36.574 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-08 07:57:36.578 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-08 07:57:36.579 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-08 07:57:36.579 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-08 07:57:36.579 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-08 07:57:36.744  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-08 07:57:36.745  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-08 07:57:36.745 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-08 07:57:36.745 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-08 07:57:36.746  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-08 07:57:36.747  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-08 07:57:36.747 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-08 07:57:36.747 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-08 07:57:36.747 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-08 07:57:36.748 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-08 07:57:36.748 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-08 07:57:36.748 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-08 07:57:36.749 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-08 07:57:36.749 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-08 07:57:36.749 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-08 07:57:36.750 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-08 07:57:36.753 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 695215511508180547193010924774135480742265436970
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Jan 08 05:03:19 UTC 2023
           Final Date: Fri Jan 07 05:03:18 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [9b:83:a2:c5:37:d3:bf:31:8b:9e:8b:4a:50:5f:30:9a:74:95:95:40],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 17deec314758c2061aae69e9aafddf52e99b8fe3
                       e05b73f3b02ff489fc110399081d16d375dbc3a9
                       3a0dea7ea44c22224771886630f26d220febac8c
                       4473af2bb79194b25da0036e49356792d7acf33f
                       9535c335c9a3946d978cefec92cb3b27e1cbba6f
                       982f99e8f90d66675aed52b805366dbbbe7c6f8f
                       b8057cc0f24ffba873dab46c07919c0e58bd4bcb
                       38104e436ac975955b07a17b3e14b13c8a24e5f4
                       26987aaa6ed4394c8bbd3f10a751e9d4d1dfc7ff
                       f1fafd9cdd37f7d6091c92d72655f1efb0285423
                       1dd95fb7de357d5406d1863a08ed5b271524e733
                       72d49516025c647d2a1679746934bfc76f57742b
                       f0d55d89a3cda546b11c4253e7cbce621e596f2d
                       37865146f2e7244f20df356ea5db297e590b8554
                       148da068cd44e1bdd9eabec65a8735217783e07f
                       28bcf2090652bc441ec35991851eb7a648832456
                       7cb0e1b92217063df6198a72334600c8243bc50d
                       6ccd77563134d5e92fe57af3bc7a04a9cbf56e4f
                       b90d0478fde90cc446c468749840a697eca875c7
                       1eef91c9
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [13:36:a8:ff:ca:87:fc:df:d6:ff:7a:5c:77:d8:a3:e5:85:4b:87:e2],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

]