Results

By type

          2023-01-16 05:06:45,110 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2023-01-16 05:06:48,323 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2023-01-16 05:06:49.781  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Jan 16, 2023 5:06:53 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Jan 16, 2023 5:06:53 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Jan 16, 2023 5:06:53 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Jan 16, 2023 5:06:53 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2023-01-16 05:06:54.675 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2023-01-16 05:06:55.116  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2023-01-16 05:06:55.383  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2023-01-16 05:06:56.776 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2023-01-16 05:06:56.788 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
2023-01-16 05:06:56.791 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2023-01-16 05:06:56.801 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2023-01-16 05:06:56.873 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2023-01-16 05:06:56.879 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
	{GET [/docs]}: redirectToUi(HttpServletRequest)
2023-01-16 05:06:57.072 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2023-01-16 05:06:58.208 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Jan 16, 2023 5:06:59 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2023-01-16 05:06:59.904  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 16.333 seconds (JVM running for 20.181)
Jan 16, 2023 5:07:10 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2023-01-16 05:07:48.476  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-16 05:07:48.496 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-16 05:07:48.590 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2023-01-16 05:07:48.600 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-16 05:07:48.636  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2023-01-16 05:07:48.640  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-16 05:07:48.642  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-16 05:07:48.645 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-16 05:07:48.647 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-16 05:07:48.654 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-16 05:07:48.672 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-16 05:07:48.680 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-16 05:07:48.773 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-16 05:07:48.781 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-16 05:07:48.782 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-16 05:07:48.787 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-16 05:07:49.629  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-16 05:07:49.634  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-16 05:07:49.634 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-16 05:07:49.639 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-16 05:07:49.654  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-16 05:07:49.657  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-16 05:07:49.658 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-16 05:07:49.660 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-16 05:07:49.662 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-16 05:07:49.704 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-16 05:07:49.705 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-16 05:07:49.705 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-16 05:07:49.715 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-16 05:07:49.716 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-16 05:07:49.717 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-16 05:07:49.719 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-16 05:07:49.801 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 618030157213030726718489113057499996778427877620
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Jan 16 05:04:36 UTC 2023
           Final Date: Sat Jan 15 05:04:35 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [bb:f9:e2:f5:25:c4:3e:5a:bb:1a:54:8e:f9:d9:31:6e:0b:39:c8:4a],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 62bd748800e4e931effbfea7dd46dc6d3eb60c46
                       2163b8555b35ccfc32dec865486134de6f1eebd6
                       937d9c9255ef545d9ff10f3aa20e72b10014447e
                       a4679ee402dd2f2e34636ad52ffb4bee2a5b18e8
                       79c2c42205a02353bb0e98ca4d8616cc916dcce4
                       810e79039b00483f9e9c55d7f5e07df17fd0543a
                       b36b941d4ba77fdfb18cabea831bfdeba1f25ce2
                       4f57ad2dd8e27e6306c4a3ee898fc9ff01973bb9
                       50d056785189b5a7c277af008ab7788689cd155e
                       2bbadba47531f71baf3e849c0cd3a806e4d8576e
                       91c66bb1a2eac0d4fb7a599e4f0de03819815b67
                       446c4be4dc1145f1bc26908da10326e601d48518
                       ded0ee6370c5fe68d87fc888a5e54c38aa18455f
                       bc23e1a41e6a648c10fa0ddd19faad1a7e780f78
                       0ef27d4e46a9ba6fc4d8f4cb1a013e2d35c335dd
                       0f718d6ab12bf2d3deb6fc3675ea8e43bf2fee6b
                       19defa36748f37f3ed10e7e1975805d52d68a27c
                       1d6d52ffecfde2cada10311617900cfaa8ab93e1
                       daade11e591a82f60a75362bfba728fc277f26cf
                       eb58169f
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [02:97:62:f7:1a:49:78:66:7c:e1:16:c7:2c:16:de:2d:44:59:d5:8a],[56:66:d1:a4]
        modulus: cfd5b35709b8fc40d7ec0015829f825af3b7217cfb3684cf740b82b77ffbfd9cd555451f2d65bc9383f6931bbe0a714242b3f68ebf48e4d37af600ff937e9d40607fb6020ca16d10e3e574cd66f849d4178659f46bf1a3ef08b56335fdacc08fb7efc1994c70f630d6db03ee341ce24a2f4acd1249d18280294ef70b8bd2cecc724c933eba8c1a0f576c5099e073e918416bbb35b8820cc91b7b93676bdbe9aaa36c27ef8dbb992adbf5ca20360f4bdcb081f712ea688c0601098f12802f6180f63fb1c22ad9495ae2fb1ba2cb74f3cf0696d4973a0642ffb749044ee33d8219542922a7d6839fd146866853141d827d617094837c82bd90e484221cae19bf13
public exponent: 10001

] 
2023-01-16 06:49:04.165  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-16 06:49:04.168 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-16 06:49:04.171 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-16 06:49:04.173 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-16 06:49:04.173  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-16 06:49:04.175  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-16 06:49:04.175  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-16 06:49:04.176 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-16 06:49:04.176 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-16 06:49:04.177 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-16 06:49:04.186 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-16 06:49:04.188 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-16 06:49:04.188 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-16 06:49:04.189 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-16 06:49:04.399  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-16 06:49:04.400  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-16 06:49:04.401 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-16 06:49:04.401 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-16 06:49:04.404  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-16 06:49:04.405  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-16 06:49:04.405 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-16 06:49:04.406 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-16 06:49:04.406 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-16 06:49:04.408 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-16 06:49:04.408 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-16 06:49:04.409 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-16 06:49:04.410 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-16 06:49:04.411 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-16 06:49:04.411 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-16 06:49:04.413 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-16 06:49:04.418 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 618030157213030726718489113057499996778427877620
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Jan 16 05:04:36 UTC 2023
           Final Date: Sat Jan 15 05:04:35 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [bb:f9:e2:f5:25:c4:3e:5a:bb:1a:54:8e:f9:d9:31:6e:0b:39:c8:4a],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 62bd748800e4e931effbfea7dd46dc6d3eb60c46
                       2163b8555b35ccfc32dec865486134de6f1eebd6
                       937d9c9255ef545d9ff10f3aa20e72b10014447e
                       a4679ee402dd2f2e34636ad52ffb4bee2a5b18e8
                       79c2c42205a02353bb0e98ca4d8616cc916dcce4
                       810e79039b00483f9e9c55d7f5e07df17fd0543a
                       b36b941d4ba77fdfb18cabea831bfdeba1f25ce2
                       4f57ad2dd8e27e6306c4a3ee898fc9ff01973bb9
                       50d056785189b5a7c277af008ab7788689cd155e
                       2bbadba47531f71baf3e849c0cd3a806e4d8576e
                       91c66bb1a2eac0d4fb7a599e4f0de03819815b67
                       446c4be4dc1145f1bc26908da10326e601d48518
                       ded0ee6370c5fe68d87fc888a5e54c38aa18455f
                       bc23e1a41e6a648c10fa0ddd19faad1a7e780f78
                       0ef27d4e46a9ba6fc4d8f4cb1a013e2d35c335dd
                       0f718d6ab12bf2d3deb6fc3675ea8e43bf2fee6b
                       19defa36748f37f3ed10e7e1975805d52d68a27c
                       1d6d52ffecfde2cada10311617900cfaa8ab93e1
                       daade11e591a82f60a75362bfba728fc277f26cf
                       eb58169f
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [3c:d8:d5:47:97:82:5e:e3:b2:c1:64:3f:5a:dc:11:45:a4:d8:08:5e],[56:66:d1:a4]
        modulus: b6bd7dbd05e3e1f44bc0fb808fa65d9e77e9a20d09146657ea59fa1f371ae41aea263a9e323fbfd6315aff730631e376635d514065d7a00432a5d023a87af0e607b87d0d700173b69eac67a2ce8b721b48d073c5b56bd432ddfe5c408c6c372453e407035450e5bb1935f1dbcee0051f3196ba65feaee3adf8e64ebb248a4d8ad10c99ff53327606f3fd0495df6533a5bb09f7a9ea49ff68b0b65ccd5e8a0b23b2447116f131e228a033846ad5c351be513677f7b89885918fd41e1fd3f5f5cf35115e89f3299287d6d6547e76540f79d2dbf03dc0826638d3e7b5c773a35a44761055f19273b9b7a6c77406e44410cdb760fa20ed402ea64e65430ab3854149
public exponent: 10001

] 
2023-01-16 06:50:53.304  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-16 06:50:53.307 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-16 06:50:53.309 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2023-01-16 06:50:53.310 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-16 06:50:53.311  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2023-01-16 06:50:53.312  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-16 06:50:53.312  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-16 06:50:53.313 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-16 06:50:53.314 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-16 06:50:53.322 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-16 06:50:53.332 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-16 06:50:53.333 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-16 06:50:53.333 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-16 06:50:53.334 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-16 06:50:53.518  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-16 06:50:53.522  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-16 06:50:53.523 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-16 06:50:53.524 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-16 06:50:53.529  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-16 06:50:53.530  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-16 06:50:53.531 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-16 06:50:53.531 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-16 06:50:53.532 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-16 06:50:53.534 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-16 06:50:53.535 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-16 06:50:53.536 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-16 06:50:53.537 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-16 06:50:53.538 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-16 06:50:53.538 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-16 06:50:53.540 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-16 06:50:53.546 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 618030157213030726718489113057499996778427877620
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Jan 16 05:04:36 UTC 2023
           Final Date: Sat Jan 15 05:04:35 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [bb:f9:e2:f5:25:c4:3e:5a:bb:1a:54:8e:f9:d9:31:6e:0b:39:c8:4a],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 62bd748800e4e931effbfea7dd46dc6d3eb60c46
                       2163b8555b35ccfc32dec865486134de6f1eebd6
                       937d9c9255ef545d9ff10f3aa20e72b10014447e
                       a4679ee402dd2f2e34636ad52ffb4bee2a5b18e8
                       79c2c42205a02353bb0e98ca4d8616cc916dcce4
                       810e79039b00483f9e9c55d7f5e07df17fd0543a
                       b36b941d4ba77fdfb18cabea831bfdeba1f25ce2
                       4f57ad2dd8e27e6306c4a3ee898fc9ff01973bb9
                       50d056785189b5a7c277af008ab7788689cd155e
                       2bbadba47531f71baf3e849c0cd3a806e4d8576e
                       91c66bb1a2eac0d4fb7a599e4f0de03819815b67
                       446c4be4dc1145f1bc26908da10326e601d48518
                       ded0ee6370c5fe68d87fc888a5e54c38aa18455f
                       bc23e1a41e6a648c10fa0ddd19faad1a7e780f78
                       0ef27d4e46a9ba6fc4d8f4cb1a013e2d35c335dd
                       0f718d6ab12bf2d3deb6fc3675ea8e43bf2fee6b
                       19defa36748f37f3ed10e7e1975805d52d68a27c
                       1d6d52ffecfde2cada10311617900cfaa8ab93e1
                       daade11e591a82f60a75362bfba728fc277f26cf
                       eb58169f
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [cc:c1:fc:5e:60:29:c9:69:cf:17:78:ee:c5:da:ea:65:cd:a5:df:cd],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-16 06:53:24.122  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-16 06:53:24.125 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-16 06:53:24.128 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2023-01-16 06:53:24.129 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-16 06:53:24.129  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2023-01-16 06:53:24.131  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-16 06:53:24.145  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-16 06:53:24.146 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-16 06:53:24.149 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-16 06:53:24.151 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-16 06:53:24.160 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-16 06:53:24.162 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-16 06:53:24.168 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-16 06:53:24.169 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-16 06:53:24.317  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-16 06:53:24.318  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-16 06:53:24.319 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-16 06:53:24.319 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-16 06:53:24.327  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-16 06:53:24.338  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-16 06:53:24.339 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-16 06:53:24.339 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-16 06:53:24.340 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-16 06:53:24.349 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-16 06:53:24.350 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-16 06:53:24.360 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-16 06:53:24.362 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-16 06:53:24.362 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-16 06:53:24.363 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-16 06:53:24.373 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-16 06:53:24.378 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 618030157213030726718489113057499996778427877620
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Jan 16 05:04:36 UTC 2023
           Final Date: Sat Jan 15 05:04:35 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [bb:f9:e2:f5:25:c4:3e:5a:bb:1a:54:8e:f9:d9:31:6e:0b:39:c8:4a],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 62bd748800e4e931effbfea7dd46dc6d3eb60c46
                       2163b8555b35ccfc32dec865486134de6f1eebd6
                       937d9c9255ef545d9ff10f3aa20e72b10014447e
                       a4679ee402dd2f2e34636ad52ffb4bee2a5b18e8
                       79c2c42205a02353bb0e98ca4d8616cc916dcce4
                       810e79039b00483f9e9c55d7f5e07df17fd0543a
                       b36b941d4ba77fdfb18cabea831bfdeba1f25ce2
                       4f57ad2dd8e27e6306c4a3ee898fc9ff01973bb9
                       50d056785189b5a7c277af008ab7788689cd155e
                       2bbadba47531f71baf3e849c0cd3a806e4d8576e
                       91c66bb1a2eac0d4fb7a599e4f0de03819815b67
                       446c4be4dc1145f1bc26908da10326e601d48518
                       ded0ee6370c5fe68d87fc888a5e54c38aa18455f
                       bc23e1a41e6a648c10fa0ddd19faad1a7e780f78
                       0ef27d4e46a9ba6fc4d8f4cb1a013e2d35c335dd
                       0f718d6ab12bf2d3deb6fc3675ea8e43bf2fee6b
                       19defa36748f37f3ed10e7e1975805d52d68a27c
                       1d6d52ffecfde2cada10311617900cfaa8ab93e1
                       daade11e591a82f60a75362bfba728fc277f26cf
                       eb58169f
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [da:ad:b2:56:27:b0:aa:02:65:a3:e1:74:d5:78:80:72:67:a6:b2:7a],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-16 06:56:30.423  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-16 06:56:30.428 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-16 06:56:30.438 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-16 06:56:30.440 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-16 06:56:30.441  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-16 06:56:30.444  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-16 06:56:30.447  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-16 06:56:30.450 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-16 06:56:30.451 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-16 06:56:30.452 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-16 06:56:30.460 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-16 06:56:30.462 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-16 06:56:30.463 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-16 06:56:30.464 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-16 06:56:30.617  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-16 06:56:30.618  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-16 06:56:30.619 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-16 06:56:30.620 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-16 06:56:30.621  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-16 06:56:30.622  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-16 06:56:30.623 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-16 06:56:30.623 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-16 06:56:30.624 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-16 06:56:30.624 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-16 06:56:30.625 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-16 06:56:30.625 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-16 06:56:30.626 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-16 06:56:30.627 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-16 06:56:30.627 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-16 06:56:30.628 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-16 06:56:30.631 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 618030157213030726718489113057499996778427877620
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Jan 16 05:04:36 UTC 2023
           Final Date: Sat Jan 15 05:04:35 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [bb:f9:e2:f5:25:c4:3e:5a:bb:1a:54:8e:f9:d9:31:6e:0b:39:c8:4a],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 62bd748800e4e931effbfea7dd46dc6d3eb60c46
                       2163b8555b35ccfc32dec865486134de6f1eebd6
                       937d9c9255ef545d9ff10f3aa20e72b10014447e
                       a4679ee402dd2f2e34636ad52ffb4bee2a5b18e8
                       79c2c42205a02353bb0e98ca4d8616cc916dcce4
                       810e79039b00483f9e9c55d7f5e07df17fd0543a
                       b36b941d4ba77fdfb18cabea831bfdeba1f25ce2
                       4f57ad2dd8e27e6306c4a3ee898fc9ff01973bb9
                       50d056785189b5a7c277af008ab7788689cd155e
                       2bbadba47531f71baf3e849c0cd3a806e4d8576e
                       91c66bb1a2eac0d4fb7a599e4f0de03819815b67
                       446c4be4dc1145f1bc26908da10326e601d48518
                       ded0ee6370c5fe68d87fc888a5e54c38aa18455f
                       bc23e1a41e6a648c10fa0ddd19faad1a7e780f78
                       0ef27d4e46a9ba6fc4d8f4cb1a013e2d35c335dd
                       0f718d6ab12bf2d3deb6fc3675ea8e43bf2fee6b
                       19defa36748f37f3ed10e7e1975805d52d68a27c
                       1d6d52ffecfde2cada10311617900cfaa8ab93e1
                       daade11e591a82f60a75362bfba728fc277f26cf
                       eb58169f
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [66:92:3a:70:dc:5b:41:77:f4:1f:d8:cc:0e:a0:50:4f:08:e3:36:82],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-16 07:04:23.331  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-16 07:04:23.357 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-16 07:04:23.363 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-16 07:04:23.366 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-16 07:04:23.367  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-16 07:04:23.368  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-16 07:04:23.369  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-16 07:04:23.370 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-16 07:04:23.374 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-16 07:04:23.375 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-16 07:04:23.384 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-16 07:04:23.385 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-16 07:04:23.386 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-16 07:04:23.386 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-16 07:04:23.569  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-16 07:04:23.570  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-16 07:04:23.570 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-16 07:04:23.571 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-16 07:04:23.572  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-16 07:04:23.573  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-16 07:04:23.573 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-16 07:04:23.574 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-16 07:04:23.574 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-16 07:04:23.576 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-16 07:04:23.576 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-16 07:04:23.577 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-16 07:04:23.578 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-16 07:04:23.579 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-16 07:04:23.579 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-16 07:04:23.581 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-16 07:04:23.587 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 618030157213030726718489113057499996778427877620
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Jan 16 05:04:36 UTC 2023
           Final Date: Sat Jan 15 05:04:35 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [bb:f9:e2:f5:25:c4:3e:5a:bb:1a:54:8e:f9:d9:31:6e:0b:39:c8:4a],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 62bd748800e4e931effbfea7dd46dc6d3eb60c46
                       2163b8555b35ccfc32dec865486134de6f1eebd6
                       937d9c9255ef545d9ff10f3aa20e72b10014447e
                       a4679ee402dd2f2e34636ad52ffb4bee2a5b18e8
                       79c2c42205a02353bb0e98ca4d8616cc916dcce4
                       810e79039b00483f9e9c55d7f5e07df17fd0543a
                       b36b941d4ba77fdfb18cabea831bfdeba1f25ce2
                       4f57ad2dd8e27e6306c4a3ee898fc9ff01973bb9
                       50d056785189b5a7c277af008ab7788689cd155e
                       2bbadba47531f71baf3e849c0cd3a806e4d8576e
                       91c66bb1a2eac0d4fb7a599e4f0de03819815b67
                       446c4be4dc1145f1bc26908da10326e601d48518
                       ded0ee6370c5fe68d87fc888a5e54c38aa18455f
                       bc23e1a41e6a648c10fa0ddd19faad1a7e780f78
                       0ef27d4e46a9ba6fc4d8f4cb1a013e2d35c335dd
                       0f718d6ab12bf2d3deb6fc3675ea8e43bf2fee6b
                       19defa36748f37f3ed10e7e1975805d52d68a27c
                       1d6d52ffecfde2cada10311617900cfaa8ab93e1
                       daade11e591a82f60a75362bfba728fc277f26cf
                       eb58169f
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [8b:cc:4b:5c:03:ae:7b:7b:09:da:58:f2:1e:a3:47:f6:4e:5b:d9:95],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-16 07:10:36.344  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-16 07:10:36.350 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-16 07:10:36.354 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-16 07:10:36.356 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-16 07:10:36.358  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-16 07:10:36.360  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-16 07:10:36.362  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-16 07:10:36.363 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-16 07:10:36.364 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-16 07:10:36.364 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-16 07:10:36.373 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-16 07:10:36.376 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-16 07:10:36.377 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-16 07:10:36.378 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-16 07:10:36.561  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-16 07:10:36.562  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-16 07:10:36.563 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-16 07:10:36.563 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-16 07:10:36.566  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-16 07:10:36.566  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-16 07:10:36.567 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-16 07:10:36.568 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-16 07:10:36.568 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-16 07:10:36.570 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-16 07:10:36.570 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-16 07:10:36.571 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-16 07:10:36.572 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-16 07:10:36.572 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-16 07:10:36.573 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-16 07:10:36.574 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-16 07:10:36.578 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 618030157213030726718489113057499996778427877620
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Jan 16 05:04:36 UTC 2023
           Final Date: Sat Jan 15 05:04:35 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [bb:f9:e2:f5:25:c4:3e:5a:bb:1a:54:8e:f9:d9:31:6e:0b:39:c8:4a],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 62bd748800e4e931effbfea7dd46dc6d3eb60c46
                       2163b8555b35ccfc32dec865486134de6f1eebd6
                       937d9c9255ef545d9ff10f3aa20e72b10014447e
                       a4679ee402dd2f2e34636ad52ffb4bee2a5b18e8
                       79c2c42205a02353bb0e98ca4d8616cc916dcce4
                       810e79039b00483f9e9c55d7f5e07df17fd0543a
                       b36b941d4ba77fdfb18cabea831bfdeba1f25ce2
                       4f57ad2dd8e27e6306c4a3ee898fc9ff01973bb9
                       50d056785189b5a7c277af008ab7788689cd155e
                       2bbadba47531f71baf3e849c0cd3a806e4d8576e
                       91c66bb1a2eac0d4fb7a599e4f0de03819815b67
                       446c4be4dc1145f1bc26908da10326e601d48518
                       ded0ee6370c5fe68d87fc888a5e54c38aa18455f
                       bc23e1a41e6a648c10fa0ddd19faad1a7e780f78
                       0ef27d4e46a9ba6fc4d8f4cb1a013e2d35c335dd
                       0f718d6ab12bf2d3deb6fc3675ea8e43bf2fee6b
                       19defa36748f37f3ed10e7e1975805d52d68a27c
                       1d6d52ffecfde2cada10311617900cfaa8ab93e1
                       daade11e591a82f60a75362bfba728fc277f26cf
                       eb58169f
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [61:7c:7f:14:e4:9f:6f:b7:9e:a8:94:7b:1b:57:5e:fa:55:cc:50:76],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-16 07:18:10.744  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-16 07:18:10.748 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-16 07:18:10.752 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-16 07:18:10.754 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-16 07:18:10.755  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-16 07:18:10.756  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-16 07:18:10.757  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-16 07:18:10.757 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-16 07:18:10.758 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-16 07:18:10.758 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-16 07:18:10.765 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-16 07:18:10.766 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-16 07:18:10.767 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-16 07:18:10.767 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-16 07:18:10.921  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-16 07:18:10.921  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-16 07:18:10.922 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-16 07:18:10.922 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-16 07:18:10.924  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-16 07:18:10.925  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-16 07:18:10.926 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-16 07:18:10.926 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-16 07:18:10.927 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-16 07:18:10.929 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-16 07:18:10.929 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-16 07:18:10.930 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-16 07:18:10.931 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-16 07:18:10.931 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-16 07:18:10.932 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-16 07:18:10.933 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-16 07:18:10.937 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 618030157213030726718489113057499996778427877620
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Jan 16 05:04:36 UTC 2023
           Final Date: Sat Jan 15 05:04:35 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [bb:f9:e2:f5:25:c4:3e:5a:bb:1a:54:8e:f9:d9:31:6e:0b:39:c8:4a],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 62bd748800e4e931effbfea7dd46dc6d3eb60c46
                       2163b8555b35ccfc32dec865486134de6f1eebd6
                       937d9c9255ef545d9ff10f3aa20e72b10014447e
                       a4679ee402dd2f2e34636ad52ffb4bee2a5b18e8
                       79c2c42205a02353bb0e98ca4d8616cc916dcce4
                       810e79039b00483f9e9c55d7f5e07df17fd0543a
                       b36b941d4ba77fdfb18cabea831bfdeba1f25ce2
                       4f57ad2dd8e27e6306c4a3ee898fc9ff01973bb9
                       50d056785189b5a7c277af008ab7788689cd155e
                       2bbadba47531f71baf3e849c0cd3a806e4d8576e
                       91c66bb1a2eac0d4fb7a599e4f0de03819815b67
                       446c4be4dc1145f1bc26908da10326e601d48518
                       ded0ee6370c5fe68d87fc888a5e54c38aa18455f
                       bc23e1a41e6a648c10fa0ddd19faad1a7e780f78
                       0ef27d4e46a9ba6fc4d8f4cb1a013e2d35c335dd
                       0f718d6ab12bf2d3deb6fc3675ea8e43bf2fee6b
                       19defa36748f37f3ed10e7e1975805d52d68a27c
                       1d6d52ffecfde2cada10311617900cfaa8ab93e1
                       daade11e591a82f60a75362bfba728fc277f26cf
                       eb58169f
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [bc:d3:11:c9:38:9a:6e:9e:ee:3c:8d:0b:ce:5c:53:b7:df:60:5b:3c],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-16 07:25:10.095  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-16 07:25:10.098 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-16 07:25:10.102 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-16 07:25:10.103 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-16 07:25:10.104  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-16 07:25:10.105  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-16 07:25:10.105  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-16 07:25:10.106 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-16 07:25:10.107 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-16 07:25:10.107 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-16 07:25:10.117 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-16 07:25:10.119 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-16 07:25:10.120 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-16 07:25:10.120 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-16 07:25:10.294  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-16 07:25:10.295  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-16 07:25:10.296 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-16 07:25:10.296 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-16 07:25:10.299  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-16 07:25:10.300  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-16 07:25:10.302 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-16 07:25:10.303 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-16 07:25:10.303 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-16 07:25:10.304 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-16 07:25:10.305 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-16 07:25:10.306 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-16 07:25:10.308 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-16 07:25:10.309 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-16 07:25:10.310 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-16 07:25:10.316 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-16 07:25:10.323 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 618030157213030726718489113057499996778427877620
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Jan 16 05:04:36 UTC 2023
           Final Date: Sat Jan 15 05:04:35 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [bb:f9:e2:f5:25:c4:3e:5a:bb:1a:54:8e:f9:d9:31:6e:0b:39:c8:4a],[56:66:d1:a4]
        modulus: bd1c94cc25dfb9dcf62e0f2f8263626d2c5c0cf8b75026867ed347554908602763bc5c25a2bf446ad53c9fda70f5fc21c249a9c491653744234119910ee2ac4d410a2ca522d4f5d91283873206c9f044532d6c3cfdd597dc6b118dcd9f40aab77b008091deb62106830ee29eace8e67db5b7553077cdbda595580504c39fade21946e14d255f7465b385f1f936dfe7858ad7f4766e3f21dc6f6bd4be326e303144c10e758a4c309e4ef384d39e33e5ae541cc198d1e30532e00cca5d1d9e070e09e60bf5c2b2efca90cdb360e010d838b5cdcc44777f343ed895b7eb9cf6ac846cd497f4a8658b7726d4147e48c80bf717d20843ef87e9336876f7d9c3418da5e90a9a40e3deeb4d72d49e40a6116bba0200d5b7ffebee20bc88f16f4a0e3659f5fdc80f2443d7d1b037a02655dcda64626da1292959244b73b70b1f2549b604afb47ff0907f548282ff120f24353d6f8c5757e37bff3006157022c1269014f0c03ceb7877dc121de9b1e62e119b74a96b6b7d06e7f43de30ac3982b3bfd0515
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 62bd748800e4e931effbfea7dd46dc6d3eb60c46
                       2163b8555b35ccfc32dec865486134de6f1eebd6
                       937d9c9255ef545d9ff10f3aa20e72b10014447e
                       a4679ee402dd2f2e34636ad52ffb4bee2a5b18e8
                       79c2c42205a02353bb0e98ca4d8616cc916dcce4
                       810e79039b00483f9e9c55d7f5e07df17fd0543a
                       b36b941d4ba77fdfb18cabea831bfdeba1f25ce2
                       4f57ad2dd8e27e6306c4a3ee898fc9ff01973bb9
                       50d056785189b5a7c277af008ab7788689cd155e
                       2bbadba47531f71baf3e849c0cd3a806e4d8576e
                       91c66bb1a2eac0d4fb7a599e4f0de03819815b67
                       446c4be4dc1145f1bc26908da10326e601d48518
                       ded0ee6370c5fe68d87fc888a5e54c38aa18455f
                       bc23e1a41e6a648c10fa0ddd19faad1a7e780f78
                       0ef27d4e46a9ba6fc4d8f4cb1a013e2d35c335dd
                       0f718d6ab12bf2d3deb6fc3675ea8e43bf2fee6b
                       19defa36748f37f3ed10e7e1975805d52d68a27c
                       1d6d52ffecfde2cada10311617900cfaa8ab93e1
                       daade11e591a82f60a75362bfba728fc277f26cf
                       eb58169f
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [18:4b:99:3b:1b:33:ce:40:df:bf:94:60:68:5e:37:59:c8:06:2e:12],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-16 07:32:10.221  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-16 07:32:10.226 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-16 07:32:10.229 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2023-01-16 07:32:10.231 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-16 07:32:10.231  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2023-01-16 07:32:10.232  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-16 07:32:10.233  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-16 07:32:10.235 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-16 07:32:10.236 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-16 07:32:10.237 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-16 07:32:10.247 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-16 07:32:10.251 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-16 07:32:10.252 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-16 07:32:10.252 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-16 07:32:10.431  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-16 07:32:10.432  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-16 07:32:10.433 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-16 07:32:10.434 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-16 07:32:10.439  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-16 07:32:10.440  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-16 07:32:10.440 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-16 07:32:10.442 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-16 07:32:10.443 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-16 07:32:10.448 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-16 07:32:10.448 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-16 07:32:10.449 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-16 07:32:10.452 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-16 07:32:10.453 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-16 07:32:10.453 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-16 07:32:10.456 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-16 07:32:10.462 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 618030157213030726718489113057499996778427877620
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Jan 16 05:04:36 UTC 2023
           Final Date: Sat Jan 15 05:04:35 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [bb:f9:e2:f5:25:c4:3e:5a:bb:1a:54:8e:f9:d9:31:6e:0b:39:c8:4a],[56:66:d1:a4]
        modulus: bd1c94cc25dfb9dcf62e0f2f8263626d2c5c0cf8b75026867ed347554908602763bc5c25a2bf446ad53c9fda70f5fc21c249a9c491653744234119910ee2ac4d410a2ca522d4f5d91283873206c9f044532d6c3cfdd597dc6b118dcd9f40aab77b008091deb62106830ee29eace8e67db5b7553077cdbda595580504c39fade21946e14d255f7465b385f1f936dfe7858ad7f4766e3f21dc6f6bd4be326e303144c10e758a4c309e4ef384d39e33e5ae541cc198d1e30532e00cca5d1d9e070e09e60bf5c2b2efca90cdb360e010d838b5cdcc44777f343ed895b7eb9cf6ac846cd497f4a8658b7726d4147e48c80bf717d20843ef87e9336876f7d9c3418da5e90a9a40e3deeb4d72d49e40a6116bba0200d5b7ffebee20bc88f16f4a0e3659f5fdc80f2443d7d1b037a02655dcda64626da1292959244b73b70b1f2549b604afb47ff0907f548282ff120f24353d6f8c5757e37bff3006157022c1269014f0c03ceb7877dc121de9b1e62e119b74a96b6b7d06e7f43de30ac3982b3bfd0515
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 62bd748800e4e931effbfea7dd46dc6d3eb60c46
                       2163b8555b35ccfc32dec865486134de6f1eebd6
                       937d9c9255ef545d9ff10f3aa20e72b10014447e
                       a4679ee402dd2f2e34636ad52ffb4bee2a5b18e8
                       79c2c42205a02353bb0e98ca4d8616cc916dcce4
                       810e79039b00483f9e9c55d7f5e07df17fd0543a
                       b36b941d4ba77fdfb18cabea831bfdeba1f25ce2
                       4f57ad2dd8e27e6306c4a3ee898fc9ff01973bb9
                       50d056785189b5a7c277af008ab7788689cd155e
                       2bbadba47531f71baf3e849c0cd3a806e4d8576e
                       91c66bb1a2eac0d4fb7a599e4f0de03819815b67
                       446c4be4dc1145f1bc26908da10326e601d48518
                       ded0ee6370c5fe68d87fc888a5e54c38aa18455f
                       bc23e1a41e6a648c10fa0ddd19faad1a7e780f78
                       0ef27d4e46a9ba6fc4d8f4cb1a013e2d35c335dd
                       0f718d6ab12bf2d3deb6fc3675ea8e43bf2fee6b
                       19defa36748f37f3ed10e7e1975805d52d68a27c
                       1d6d52ffecfde2cada10311617900cfaa8ab93e1
                       daade11e591a82f60a75362bfba728fc277f26cf
                       eb58169f
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [a7:3c:2e:70:9b:f8:57:7b:fa:5b:a4:50:fd:bc:a3:b9:31:78:83:50],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-16 07:39:25.323  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-16 07:39:25.326 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-16 07:39:25.329 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2023-01-16 07:39:25.330 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-16 07:39:25.330  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2023-01-16 07:39:25.331  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-16 07:39:25.332  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-16 07:39:25.333 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-16 07:39:25.333 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-16 07:39:25.334 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-16 07:39:25.340 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-16 07:39:25.341 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-16 07:39:25.341 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-16 07:39:25.342 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-16 07:39:25.493  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-16 07:39:25.494  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-16 07:39:25.494 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-16 07:39:25.495 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-16 07:39:25.497  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-16 07:39:25.497  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-16 07:39:25.498 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-16 07:39:25.498 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-16 07:39:25.499 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-16 07:39:25.500 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-16 07:39:25.500 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-16 07:39:25.501 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-16 07:39:25.502 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-16 07:39:25.502 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-16 07:39:25.503 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-16 07:39:25.505 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-16 07:39:25.512 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 618030157213030726718489113057499996778427877620
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Jan 16 05:04:36 UTC 2023
           Final Date: Sat Jan 15 05:04:35 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [bb:f9:e2:f5:25:c4:3e:5a:bb:1a:54:8e:f9:d9:31:6e:0b:39:c8:4a],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 62bd748800e4e931effbfea7dd46dc6d3eb60c46
                       2163b8555b35ccfc32dec865486134de6f1eebd6
                       937d9c9255ef545d9ff10f3aa20e72b10014447e
                       a4679ee402dd2f2e34636ad52ffb4bee2a5b18e8
                       79c2c42205a02353bb0e98ca4d8616cc916dcce4
                       810e79039b00483f9e9c55d7f5e07df17fd0543a
                       b36b941d4ba77fdfb18cabea831bfdeba1f25ce2
                       4f57ad2dd8e27e6306c4a3ee898fc9ff01973bb9
                       50d056785189b5a7c277af008ab7788689cd155e
                       2bbadba47531f71baf3e849c0cd3a806e4d8576e
                       91c66bb1a2eac0d4fb7a599e4f0de03819815b67
                       446c4be4dc1145f1bc26908da10326e601d48518
                       ded0ee6370c5fe68d87fc888a5e54c38aa18455f
                       bc23e1a41e6a648c10fa0ddd19faad1a7e780f78
                       0ef27d4e46a9ba6fc4d8f4cb1a013e2d35c335dd
                       0f718d6ab12bf2d3deb6fc3675ea8e43bf2fee6b
                       19defa36748f37f3ed10e7e1975805d52d68a27c
                       1d6d52ffecfde2cada10311617900cfaa8ab93e1
                       daade11e591a82f60a75362bfba728fc277f26cf
                       eb58169f
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [53:17:07:28:8b:4d:34:77:92:0d:5b:0a:71:7c:a4:07:fa:b1:a8:2a],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-16 07:39:44.595  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-16 07:39:44.597 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-16 07:39:44.601 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2023-01-16 07:39:44.602 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-16 07:39:44.602  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2023-01-16 07:39:44.603  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-16 07:39:44.604  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-16 07:39:44.604 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-16 07:39:44.604 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-16 07:39:44.605 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-16 07:39:44.611 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-16 07:39:44.615 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-16 07:39:44.615 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-16 07:39:44.615 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-16 07:39:44.718  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-16 07:39:44.720  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-16 07:39:44.722 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-16 07:39:44.722 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-16 07:39:44.724  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-16 07:39:44.725  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-16 07:39:44.725 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-16 07:39:44.726 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-16 07:39:44.726 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-16 07:39:44.727 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-16 07:39:44.733 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-16 07:39:44.734 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-16 07:39:44.735 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-16 07:39:44.735 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-16 07:39:44.736 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-16 07:39:44.737 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-16 07:39:44.741 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 618030157213030726718489113057499996778427877620
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Jan 16 05:04:36 UTC 2023
           Final Date: Sat Jan 15 05:04:35 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [bb:f9:e2:f5:25:c4:3e:5a:bb:1a:54:8e:f9:d9:31:6e:0b:39:c8:4a],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 62bd748800e4e931effbfea7dd46dc6d3eb60c46
                       2163b8555b35ccfc32dec865486134de6f1eebd6
                       937d9c9255ef545d9ff10f3aa20e72b10014447e
                       a4679ee402dd2f2e34636ad52ffb4bee2a5b18e8
                       79c2c42205a02353bb0e98ca4d8616cc916dcce4
                       810e79039b00483f9e9c55d7f5e07df17fd0543a
                       b36b941d4ba77fdfb18cabea831bfdeba1f25ce2
                       4f57ad2dd8e27e6306c4a3ee898fc9ff01973bb9
                       50d056785189b5a7c277af008ab7788689cd155e
                       2bbadba47531f71baf3e849c0cd3a806e4d8576e
                       91c66bb1a2eac0d4fb7a599e4f0de03819815b67
                       446c4be4dc1145f1bc26908da10326e601d48518
                       ded0ee6370c5fe68d87fc888a5e54c38aa18455f
                       bc23e1a41e6a648c10fa0ddd19faad1a7e780f78
                       0ef27d4e46a9ba6fc4d8f4cb1a013e2d35c335dd
                       0f718d6ab12bf2d3deb6fc3675ea8e43bf2fee6b
                       19defa36748f37f3ed10e7e1975805d52d68a27c
                       1d6d52ffecfde2cada10311617900cfaa8ab93e1
                       daade11e591a82f60a75362bfba728fc277f26cf
                       eb58169f
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [0a:87:0d:85:82:8e:8a:a3:0d:98:74:1a:e2:03:a2:95:f2:e8:ea:75],[56:66:d1:a4]
        modulus: be54775c58deae75f62fbf01238cd7f242f4f27b964bdb395b996781c8e89dac00a779b29f422ea62d89e744c200569ac805346437e944dfce2e01a71d1b1f4dc269f3dae601a02a9b3dc83ddbfeda3f57ccc8252a434a8b70461c1d0cdaa5e71fd7b85856a09125ac1a1af944d59588bb9f1243225c1174be3ef6df959e9cf11a0d5f9961125be397022c639aeb90bc7c6594d9e03130694cc700dbadff50d6ab51e694936db74ef8a1ce11c6a63ea5ed213d1e4ca9b3e785b754ec60f8b85ce5e459c251623971704bc0a232c4e1c03a91e4a355a202bf2dd0b6c5b30a57b4bccf43384d00131d7c02df5aeb4a6037cd68197bc00847c281e10eae226867b5
public exponent: 10001

] 
2023-01-16 08:04:33.101  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-16 08:04:33.106 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-16 08:04:33.110 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2023-01-16 08:04:33.111 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-16 08:04:33.112  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2023-01-16 08:04:33.114  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-16 08:04:33.114  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-16 08:04:33.115 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-16 08:04:33.115 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-16 08:04:33.116 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-16 08:04:33.123 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-16 08:04:33.125 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-16 08:04:33.126 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-16 08:04:33.126 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-16 08:04:33.374  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-16 08:04:33.375  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-16 08:04:33.375 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-16 08:04:33.376 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-16 08:04:33.377  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-16 08:04:33.380  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-16 08:04:33.381 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-16 08:04:33.382 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-16 08:04:33.382 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-16 08:04:33.384 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-16 08:04:33.384 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-16 08:04:33.384 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-16 08:04:33.427 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-16 08:04:33.427 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-16 08:04:33.428 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-16 08:04:33.429 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-16 08:04:33.434 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 618030157213030726718489113057499996778427877620
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Jan 16 05:04:36 UTC 2023
           Final Date: Sat Jan 15 05:04:35 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [bb:f9:e2:f5:25:c4:3e:5a:bb:1a:54:8e:f9:d9:31:6e:0b:39:c8:4a],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 62bd748800e4e931effbfea7dd46dc6d3eb60c46
                       2163b8555b35ccfc32dec865486134de6f1eebd6
                       937d9c9255ef545d9ff10f3aa20e72b10014447e
                       a4679ee402dd2f2e34636ad52ffb4bee2a5b18e8
                       79c2c42205a02353bb0e98ca4d8616cc916dcce4
                       810e79039b00483f9e9c55d7f5e07df17fd0543a
                       b36b941d4ba77fdfb18cabea831bfdeba1f25ce2
                       4f57ad2dd8e27e6306c4a3ee898fc9ff01973bb9
                       50d056785189b5a7c277af008ab7788689cd155e
                       2bbadba47531f71baf3e849c0cd3a806e4d8576e
                       91c66bb1a2eac0d4fb7a599e4f0de03819815b67
                       446c4be4dc1145f1bc26908da10326e601d48518
                       ded0ee6370c5fe68d87fc888a5e54c38aa18455f
                       bc23e1a41e6a648c10fa0ddd19faad1a7e780f78
                       0ef27d4e46a9ba6fc4d8f4cb1a013e2d35c335dd
                       0f718d6ab12bf2d3deb6fc3675ea8e43bf2fee6b
                       19defa36748f37f3ed10e7e1975805d52d68a27c
                       1d6d52ffecfde2cada10311617900cfaa8ab93e1
                       daade11e591a82f60a75362bfba728fc277f26cf
                       eb58169f
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [9e:6a:0f:10:9a:6f:32:3a:2f:69:b7:01:0b:f3:a3:11:4c:4a:ef:9e],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-16 08:04:50.292  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-16 08:04:50.293 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-16 08:04:50.294 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2023-01-16 08:04:50.298 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-16 08:04:50.298  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2023-01-16 08:04:50.299  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-16 08:04:50.299  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-16 08:04:50.300 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-16 08:04:50.300 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-16 08:04:50.301 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-16 08:04:50.305 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-16 08:04:50.306 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-16 08:04:50.306 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-16 08:04:50.307 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-16 08:04:50.433  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-16 08:04:50.433  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-16 08:04:50.434 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-16 08:04:50.434 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-16 08:04:50.435  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-16 08:04:50.436  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-16 08:04:50.437 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-16 08:04:50.437 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-16 08:04:50.437 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-16 08:04:50.438 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-16 08:04:50.438 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-16 08:04:50.439 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-16 08:04:50.439 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-16 08:04:50.440 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-16 08:04:50.440 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-16 08:04:50.441 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-16 08:04:50.445 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 618030157213030726718489113057499996778427877620
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Jan 16 05:04:36 UTC 2023
           Final Date: Sat Jan 15 05:04:35 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [bb:f9:e2:f5:25:c4:3e:5a:bb:1a:54:8e:f9:d9:31:6e:0b:39:c8:4a],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 62bd748800e4e931effbfea7dd46dc6d3eb60c46
                       2163b8555b35ccfc32dec865486134de6f1eebd6
                       937d9c9255ef545d9ff10f3aa20e72b10014447e
                       a4679ee402dd2f2e34636ad52ffb4bee2a5b18e8
                       79c2c42205a02353bb0e98ca4d8616cc916dcce4
                       810e79039b00483f9e9c55d7f5e07df17fd0543a
                       b36b941d4ba77fdfb18cabea831bfdeba1f25ce2
                       4f57ad2dd8e27e6306c4a3ee898fc9ff01973bb9
                       50d056785189b5a7c277af008ab7788689cd155e
                       2bbadba47531f71baf3e849c0cd3a806e4d8576e
                       91c66bb1a2eac0d4fb7a599e4f0de03819815b67
                       446c4be4dc1145f1bc26908da10326e601d48518
                       ded0ee6370c5fe68d87fc888a5e54c38aa18455f
                       bc23e1a41e6a648c10fa0ddd19faad1a7e780f78
                       0ef27d4e46a9ba6fc4d8f4cb1a013e2d35c335dd
                       0f718d6ab12bf2d3deb6fc3675ea8e43bf2fee6b
                       19defa36748f37f3ed10e7e1975805d52d68a27c
                       1d6d52ffecfde2cada10311617900cfaa8ab93e1
                       daade11e591a82f60a75362bfba728fc277f26cf
                       eb58169f
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [5e:bb:6f:27:8d:22:47:4f:e7:62:c4:d1:af:1e:6e:71:19:5b:09:7d],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

]