Results

By type

          2023-01-17 05:03:40,669 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2023-01-17 05:03:41,826 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2023-01-17 05:03:42.593  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Jan 17, 2023 5:03:44 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Jan 17, 2023 5:03:44 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Jan 17, 2023 5:03:44 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Jan 17, 2023 5:03:44 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2023-01-17 05:03:45.633 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2023-01-17 05:03:45.939  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2023-01-17 05:03:46.107  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2023-01-17 05:03:46.858 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2023-01-17 05:03:46.861 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
2023-01-17 05:03:46.862 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2023-01-17 05:03:46.866 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2023-01-17 05:03:46.903 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
2023-01-17 05:03:46.906 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
	{GET [/docs]}: redirectToUi(HttpServletRequest)
2023-01-17 05:03:47.027 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2023-01-17 05:03:47.752 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Jan 17, 2023 5:03:48 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2023-01-17 05:03:48.683  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 8.888 seconds (JVM running for 10.597)
Jan 17, 2023 5:04:11 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2023-01-17 05:04:40.088  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-17 05:04:40.094 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-17 05:04:40.132 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2023-01-17 05:04:40.135 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-17 05:04:40.158  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2023-01-17 05:04:40.161  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-17 05:04:40.162  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-17 05:04:40.163 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-17 05:04:40.164 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-17 05:04:40.169 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-17 05:04:40.183 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-17 05:04:40.187 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-17 05:04:40.237 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-17 05:04:40.243 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-17 05:04:40.243 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-17 05:04:40.246 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-17 05:04:40.802  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-17 05:04:40.808  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-17 05:04:40.809 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-17 05:04:40.810 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-17 05:04:40.826  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-17 05:04:40.829  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-17 05:04:40.830 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-17 05:04:40.834 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-17 05:04:40.837 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-17 05:04:40.889 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-17 05:04:40.890 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-17 05:04:40.892 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-17 05:04:40.904 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-17 05:04:40.905 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-17 05:04:40.905 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-17 05:04:40.908 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-17 05:04:40.961 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 453424586230408379477485893046427039130592833498
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jan 17 05:01:18 UTC 2023
           Final Date: Sun Jan 16 05:01:17 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [48:7d:c4:91:bf:3b:f7:42:1c:7b:81:e9:b0:e7:89:35:33:90:30:3c],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a1090ba6542610144eaa015b0180b2b2b0795bd9
                       bcee191eb135ce2d5a268ddd476280b52d4a036a
                       2e294977edbfd78eeb0ee965010516d1b8e6f83b
                       7b4c6c69dc79942d0b2873b64fcc9d4df46b0ad6
                       9fd6d09fedb3b6cfafa4823b4f1bb8807d6f687d
                       5c48a41a5d416a71d102a9500d28a3e06703d10c
                       b69e7ac3f936de8528302c44af25734df02ff752
                       0be9886a1df6acaf5480a3d25fb9b2da066b2cf1
                       b2781022955a6878d6a138517b536eaa48b02c33
                       5b8873f00ac9a6071a2a9d2337fd1faee40ba66d
                       f6b9bd2b8daeded422547b62285cd3ef79f82545
                       044b891b81c64d0fa394ce115bc0a71f8f81ed2f
                       2625055f672866445f5f19c0a34671d1a869679e
                       077370318a1f2ddb15f74f31890eee6fba54fdc4
                       fb5af6a6ff8b7b66c3ef9e7821f27b8daaf1a7b1
                       1bc41c801a63719988ae0309445bd58ef0fb4d99
                       cea862d5392d58d2df7f0645cc6d59ee47131cb7
                       e58139f98b1634a56807156281fd1889754fec5f
                       920df95a6bd34e0dbbc4f66a67b9f8b6ccacb03c
                       e7b9382f
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [75:99:10:90:65:e0:90:20:f9:43:ae:a9:56:46:fa:5b:0b:77:ac:17],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-17 06:41:04.282  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-17 06:41:04.286 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-17 06:41:04.289 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-17 06:41:04.290 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-17 06:41:04.291  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-17 06:41:04.292  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-17 06:41:04.292  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-17 06:41:04.293 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-17 06:41:04.293 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-17 06:41:04.294 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-17 06:41:04.300 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-17 06:41:04.301 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-17 06:41:04.301 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-17 06:41:04.301 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-17 06:41:04.509  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-17 06:41:04.510  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-17 06:41:04.510 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-17 06:41:04.511 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-17 06:41:04.513  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-17 06:41:04.514  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-17 06:41:04.514 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-17 06:41:04.515 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-17 06:41:04.515 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-17 06:41:04.516 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-17 06:41:04.517 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-17 06:41:04.517 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-17 06:41:04.518 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-17 06:41:04.519 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-17 06:41:04.519 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-17 06:41:04.520 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-17 06:41:04.524 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 453424586230408379477485893046427039130592833498
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jan 17 05:01:18 UTC 2023
           Final Date: Sun Jan 16 05:01:17 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [48:7d:c4:91:bf:3b:f7:42:1c:7b:81:e9:b0:e7:89:35:33:90:30:3c],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a1090ba6542610144eaa015b0180b2b2b0795bd9
                       bcee191eb135ce2d5a268ddd476280b52d4a036a
                       2e294977edbfd78eeb0ee965010516d1b8e6f83b
                       7b4c6c69dc79942d0b2873b64fcc9d4df46b0ad6
                       9fd6d09fedb3b6cfafa4823b4f1bb8807d6f687d
                       5c48a41a5d416a71d102a9500d28a3e06703d10c
                       b69e7ac3f936de8528302c44af25734df02ff752
                       0be9886a1df6acaf5480a3d25fb9b2da066b2cf1
                       b2781022955a6878d6a138517b536eaa48b02c33
                       5b8873f00ac9a6071a2a9d2337fd1faee40ba66d
                       f6b9bd2b8daeded422547b62285cd3ef79f82545
                       044b891b81c64d0fa394ce115bc0a71f8f81ed2f
                       2625055f672866445f5f19c0a34671d1a869679e
                       077370318a1f2ddb15f74f31890eee6fba54fdc4
                       fb5af6a6ff8b7b66c3ef9e7821f27b8daaf1a7b1
                       1bc41c801a63719988ae0309445bd58ef0fb4d99
                       cea862d5392d58d2df7f0645cc6d59ee47131cb7
                       e58139f98b1634a56807156281fd1889754fec5f
                       920df95a6bd34e0dbbc4f66a67b9f8b6ccacb03c
                       e7b9382f
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [2e:57:cf:84:45:ba:9c:b4:da:43:59:94:fe:6a:5a:1f:6f:17:6d:11],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-17 06:42:48.017  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-17 06:42:48.018 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-17 06:42:48.020 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2023-01-17 06:42:48.021 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-17 06:42:48.022  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2023-01-17 06:42:48.022  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-17 06:42:48.023  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-17 06:42:48.023 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-17 06:42:48.024 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-17 06:42:48.025 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-17 06:42:48.030 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-17 06:42:48.030 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-17 06:42:48.031 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-17 06:42:48.031 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-17 06:42:48.181  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-17 06:42:48.182  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-17 06:42:48.182 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-17 06:42:48.183 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-17 06:42:48.185  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-17 06:42:48.185  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-17 06:42:48.185 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-17 06:42:48.186 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-17 06:42:48.186 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-17 06:42:48.187 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-17 06:42:48.188 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-17 06:42:48.188 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-17 06:42:48.189 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-17 06:42:48.190 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-17 06:42:48.190 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-17 06:42:48.191 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-17 06:42:48.196 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 453424586230408379477485893046427039130592833498
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jan 17 05:01:18 UTC 2023
           Final Date: Sun Jan 16 05:01:17 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [48:7d:c4:91:bf:3b:f7:42:1c:7b:81:e9:b0:e7:89:35:33:90:30:3c],[56:66:d1:a4]
        modulus: d13efc04aa1bec19d6bfadbf4e3bf7efbe8287fcb5d31ae0cd7a59a2a5fdb4ba869102c594806ff15837c18103011eaf0cf4268eb7c2f8cd4fad6e1bff3887b96d3d8257817c29ca0728a68ac58d119c7c06c91b1ab8b9e05e7343428880eafb0591304ed88a04720485b1f038e5176db467db8f13bb8dd52b5598e9cdb460b25e3c43a25ffb3a09ff427da59ada8f35dd214b63cc1967896c702ff7af8695c395a7d09160bdf03e9b7e3384b83abf67ed53f20adb3ca7ab35f65abbf9ab905635a525fd667ec3c43661ad161deb9447cc99101f4c8d9944e6a3aaf25437682b2b1a4ea20549aa458d3437a525eed94dc97337fe2b977c036510d08f3645d5c4a6d81d5c9dee207d6c4b930cb018f3c7865c0024f5e573df43aa893b29209495c49cbfc778bec3c7a383109200c3f8b6217d54c586a40ad8031c3bfa3917fea4e58d300cf5f23627c6072b59f9cfaa41cc5efbda4d1756a5c792bc5db1cfa0415fa5896c9d99631dc6a49c66faf97fff8145bdf6b740a5308887a54201c4c6f9
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a1090ba6542610144eaa015b0180b2b2b0795bd9
                       bcee191eb135ce2d5a268ddd476280b52d4a036a
                       2e294977edbfd78eeb0ee965010516d1b8e6f83b
                       7b4c6c69dc79942d0b2873b64fcc9d4df46b0ad6
                       9fd6d09fedb3b6cfafa4823b4f1bb8807d6f687d
                       5c48a41a5d416a71d102a9500d28a3e06703d10c
                       b69e7ac3f936de8528302c44af25734df02ff752
                       0be9886a1df6acaf5480a3d25fb9b2da066b2cf1
                       b2781022955a6878d6a138517b536eaa48b02c33
                       5b8873f00ac9a6071a2a9d2337fd1faee40ba66d
                       f6b9bd2b8daeded422547b62285cd3ef79f82545
                       044b891b81c64d0fa394ce115bc0a71f8f81ed2f
                       2625055f672866445f5f19c0a34671d1a869679e
                       077370318a1f2ddb15f74f31890eee6fba54fdc4
                       fb5af6a6ff8b7b66c3ef9e7821f27b8daaf1a7b1
                       1bc41c801a63719988ae0309445bd58ef0fb4d99
                       cea862d5392d58d2df7f0645cc6d59ee47131cb7
                       e58139f98b1634a56807156281fd1889754fec5f
                       920df95a6bd34e0dbbc4f66a67b9f8b6ccacb03c
                       e7b9382f
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [eb:e0:69:78:81:1b:5c:bb:96:13:f5:79:81:01:48:18:4a:39:3f:fb],[56:66:d1:a4]
        modulus: dd41bde6d8d12b7dc106d308aa1a92f2182d677f1a5c20283c1968725877709568d5d09362e1fce9be2a3b75a3e990026202bad5f343eed74045810acc5839350b4c87944a4469394a32a1277188d37081e49f183dbf0f598558e45b5f2f152c01588380dae65f85b2c7283ae13379bea9a382b6a5e8bccd69d3602f66b8a0431c00e51878b2d3e73f912b9cb028e844a113a10cebfcc0d743044cb67fc854e33b387717a8238367c04aedab34f33bbfc451b2c79f19435b5ebdbe58438dbb6a78691cfafa2c6332a7c13928c1555edaf55dabb6431f40513d613c438d2328ae9c40b9a7d70fdc36bcf224e66f443545e91d5000843b7406c22dc35f6df3700d
public exponent: 10001

] 
2023-01-17 06:45:56.145  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-17 06:45:56.149 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-17 06:45:56.151 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2023-01-17 06:45:56.152 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-17 06:45:56.152  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2023-01-17 06:45:56.153  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-17 06:45:56.154  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-17 06:45:56.154 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-17 06:45:56.155 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-17 06:45:56.156 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-17 06:45:56.159 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-17 06:45:56.160 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-17 06:45:56.161 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-17 06:45:56.161 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-17 06:45:56.293  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-17 06:45:56.294  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-17 06:45:56.295 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-17 06:45:56.295 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-17 06:45:56.297  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-17 06:45:56.297  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-17 06:45:56.298 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-17 06:45:56.298 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-17 06:45:56.298 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-17 06:45:56.299 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-17 06:45:56.299 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-17 06:45:56.300 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-17 06:45:56.300 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-17 06:45:56.301 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-17 06:45:56.301 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-17 06:45:56.302 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-17 06:45:56.305 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 453424586230408379477485893046427039130592833498
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jan 17 05:01:18 UTC 2023
           Final Date: Sun Jan 16 05:01:17 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [48:7d:c4:91:bf:3b:f7:42:1c:7b:81:e9:b0:e7:89:35:33:90:30:3c],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a1090ba6542610144eaa015b0180b2b2b0795bd9
                       bcee191eb135ce2d5a268ddd476280b52d4a036a
                       2e294977edbfd78eeb0ee965010516d1b8e6f83b
                       7b4c6c69dc79942d0b2873b64fcc9d4df46b0ad6
                       9fd6d09fedb3b6cfafa4823b4f1bb8807d6f687d
                       5c48a41a5d416a71d102a9500d28a3e06703d10c
                       b69e7ac3f936de8528302c44af25734df02ff752
                       0be9886a1df6acaf5480a3d25fb9b2da066b2cf1
                       b2781022955a6878d6a138517b536eaa48b02c33
                       5b8873f00ac9a6071a2a9d2337fd1faee40ba66d
                       f6b9bd2b8daeded422547b62285cd3ef79f82545
                       044b891b81c64d0fa394ce115bc0a71f8f81ed2f
                       2625055f672866445f5f19c0a34671d1a869679e
                       077370318a1f2ddb15f74f31890eee6fba54fdc4
                       fb5af6a6ff8b7b66c3ef9e7821f27b8daaf1a7b1
                       1bc41c801a63719988ae0309445bd58ef0fb4d99
                       cea862d5392d58d2df7f0645cc6d59ee47131cb7
                       e58139f98b1634a56807156281fd1889754fec5f
                       920df95a6bd34e0dbbc4f66a67b9f8b6ccacb03c
                       e7b9382f
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [17:8e:a3:3e:73:46:0c:67:b3:7f:4a:4e:df:c4:6b:44:92:d4:79:64],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-17 06:48:46.020  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-17 06:48:46.022 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-17 06:48:46.023 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-17 06:48:46.024 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-17 06:48:46.025  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-17 06:48:46.026  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-17 06:48:46.026  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-17 06:48:46.027 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-17 06:48:46.028 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-17 06:48:46.028 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-17 06:48:46.035 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-17 06:48:46.036 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-17 06:48:46.036 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-17 06:48:46.037 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-17 06:48:46.193  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-17 06:48:46.194  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-17 06:48:46.195 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-17 06:48:46.196 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-17 06:48:46.198  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-17 06:48:46.198  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-17 06:48:46.200 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-17 06:48:46.200 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-17 06:48:46.201 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-17 06:48:46.202 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-17 06:48:46.203 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-17 06:48:46.205 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-17 06:48:46.206 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-17 06:48:46.206 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-17 06:48:46.207 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-17 06:48:46.210 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-17 06:48:46.216 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 453424586230408379477485893046427039130592833498
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jan 17 05:01:18 UTC 2023
           Final Date: Sun Jan 16 05:01:17 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [48:7d:c4:91:bf:3b:f7:42:1c:7b:81:e9:b0:e7:89:35:33:90:30:3c],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a1090ba6542610144eaa015b0180b2b2b0795bd9
                       bcee191eb135ce2d5a268ddd476280b52d4a036a
                       2e294977edbfd78eeb0ee965010516d1b8e6f83b
                       7b4c6c69dc79942d0b2873b64fcc9d4df46b0ad6
                       9fd6d09fedb3b6cfafa4823b4f1bb8807d6f687d
                       5c48a41a5d416a71d102a9500d28a3e06703d10c
                       b69e7ac3f936de8528302c44af25734df02ff752
                       0be9886a1df6acaf5480a3d25fb9b2da066b2cf1
                       b2781022955a6878d6a138517b536eaa48b02c33
                       5b8873f00ac9a6071a2a9d2337fd1faee40ba66d
                       f6b9bd2b8daeded422547b62285cd3ef79f82545
                       044b891b81c64d0fa394ce115bc0a71f8f81ed2f
                       2625055f672866445f5f19c0a34671d1a869679e
                       077370318a1f2ddb15f74f31890eee6fba54fdc4
                       fb5af6a6ff8b7b66c3ef9e7821f27b8daaf1a7b1
                       1bc41c801a63719988ae0309445bd58ef0fb4d99
                       cea862d5392d58d2df7f0645cc6d59ee47131cb7
                       e58139f98b1634a56807156281fd1889754fec5f
                       920df95a6bd34e0dbbc4f66a67b9f8b6ccacb03c
                       e7b9382f
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [be:a2:4b:98:97:98:81:47:f8:97:4c:a2:46:6c:c1:83:5b:ae:98:64],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-17 06:57:16.013  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-17 06:57:16.016 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-17 06:57:16.018 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-17 06:57:16.019 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-17 06:57:16.020  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-17 06:57:16.020  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-17 06:57:16.021  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-17 06:57:16.021 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-17 06:57:16.021 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-17 06:57:16.022 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-17 06:57:16.027 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-17 06:57:16.028 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-17 06:57:16.028 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-17 06:57:16.029 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-17 06:57:16.197  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-17 06:57:16.198  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-17 06:57:16.198 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-17 06:57:16.198 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-17 06:57:16.200  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-17 06:57:16.200  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-17 06:57:16.201 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-17 06:57:16.201 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-17 06:57:16.201 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-17 06:57:16.202 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-17 06:57:16.202 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-17 06:57:16.203 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-17 06:57:16.203 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-17 06:57:16.204 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-17 06:57:16.204 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-17 06:57:16.205 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-17 06:57:16.209 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 453424586230408379477485893046427039130592833498
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jan 17 05:01:18 UTC 2023
           Final Date: Sun Jan 16 05:01:17 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [48:7d:c4:91:bf:3b:f7:42:1c:7b:81:e9:b0:e7:89:35:33:90:30:3c],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a1090ba6542610144eaa015b0180b2b2b0795bd9
                       bcee191eb135ce2d5a268ddd476280b52d4a036a
                       2e294977edbfd78eeb0ee965010516d1b8e6f83b
                       7b4c6c69dc79942d0b2873b64fcc9d4df46b0ad6
                       9fd6d09fedb3b6cfafa4823b4f1bb8807d6f687d
                       5c48a41a5d416a71d102a9500d28a3e06703d10c
                       b69e7ac3f936de8528302c44af25734df02ff752
                       0be9886a1df6acaf5480a3d25fb9b2da066b2cf1
                       b2781022955a6878d6a138517b536eaa48b02c33
                       5b8873f00ac9a6071a2a9d2337fd1faee40ba66d
                       f6b9bd2b8daeded422547b62285cd3ef79f82545
                       044b891b81c64d0fa394ce115bc0a71f8f81ed2f
                       2625055f672866445f5f19c0a34671d1a869679e
                       077370318a1f2ddb15f74f31890eee6fba54fdc4
                       fb5af6a6ff8b7b66c3ef9e7821f27b8daaf1a7b1
                       1bc41c801a63719988ae0309445bd58ef0fb4d99
                       cea862d5392d58d2df7f0645cc6d59ee47131cb7
                       e58139f98b1634a56807156281fd1889754fec5f
                       920df95a6bd34e0dbbc4f66a67b9f8b6ccacb03c
                       e7b9382f
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [51:6f:2f:76:3c:74:27:ae:c8:1e:5d:66:51:b9:dd:e9:1d:db:8c:7a],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-17 07:03:14.539  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-17 07:03:14.541 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-17 07:03:14.543 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-17 07:03:14.544 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-17 07:03:14.544  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-17 07:03:14.545  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-17 07:03:14.546  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-17 07:03:14.546 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-17 07:03:14.546 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-17 07:03:14.547 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-17 07:03:14.551 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-17 07:03:14.552 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-17 07:03:14.552 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-17 07:03:14.552 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-17 07:03:14.717  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-17 07:03:14.719  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-17 07:03:14.719 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-17 07:03:14.720 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-17 07:03:14.722  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-17 07:03:14.722  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-17 07:03:14.722 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-17 07:03:14.723 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-17 07:03:14.723 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-17 07:03:14.724 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-17 07:03:14.724 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-17 07:03:14.724 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-17 07:03:14.726 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-17 07:03:14.726 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-17 07:03:14.726 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-17 07:03:14.730 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-17 07:03:14.733 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 453424586230408379477485893046427039130592833498
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jan 17 05:01:18 UTC 2023
           Final Date: Sun Jan 16 05:01:17 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [48:7d:c4:91:bf:3b:f7:42:1c:7b:81:e9:b0:e7:89:35:33:90:30:3c],[56:66:d1:a4]
        modulus: d13efc04aa1bec19d6bfadbf4e3bf7efbe8287fcb5d31ae0cd7a59a2a5fdb4ba869102c594806ff15837c18103011eaf0cf4268eb7c2f8cd4fad6e1bff3887b96d3d8257817c29ca0728a68ac58d119c7c06c91b1ab8b9e05e7343428880eafb0591304ed88a04720485b1f038e5176db467db8f13bb8dd52b5598e9cdb460b25e3c43a25ffb3a09ff427da59ada8f35dd214b63cc1967896c702ff7af8695c395a7d09160bdf03e9b7e3384b83abf67ed53f20adb3ca7ab35f65abbf9ab905635a525fd667ec3c43661ad161deb9447cc99101f4c8d9944e6a3aaf25437682b2b1a4ea20549aa458d3437a525eed94dc97337fe2b977c036510d08f3645d5c4a6d81d5c9dee207d6c4b930cb018f3c7865c0024f5e573df43aa893b29209495c49cbfc778bec3c7a383109200c3f8b6217d54c586a40ad8031c3bfa3917fea4e58d300cf5f23627c6072b59f9cfaa41cc5efbda4d1756a5c792bc5db1cfa0415fa5896c9d99631dc6a49c66faf97fff8145bdf6b740a5308887a54201c4c6f9
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a1090ba6542610144eaa015b0180b2b2b0795bd9
                       bcee191eb135ce2d5a268ddd476280b52d4a036a
                       2e294977edbfd78eeb0ee965010516d1b8e6f83b
                       7b4c6c69dc79942d0b2873b64fcc9d4df46b0ad6
                       9fd6d09fedb3b6cfafa4823b4f1bb8807d6f687d
                       5c48a41a5d416a71d102a9500d28a3e06703d10c
                       b69e7ac3f936de8528302c44af25734df02ff752
                       0be9886a1df6acaf5480a3d25fb9b2da066b2cf1
                       b2781022955a6878d6a138517b536eaa48b02c33
                       5b8873f00ac9a6071a2a9d2337fd1faee40ba66d
                       f6b9bd2b8daeded422547b62285cd3ef79f82545
                       044b891b81c64d0fa394ce115bc0a71f8f81ed2f
                       2625055f672866445f5f19c0a34671d1a869679e
                       077370318a1f2ddb15f74f31890eee6fba54fdc4
                       fb5af6a6ff8b7b66c3ef9e7821f27b8daaf1a7b1
                       1bc41c801a63719988ae0309445bd58ef0fb4d99
                       cea862d5392d58d2df7f0645cc6d59ee47131cb7
                       e58139f98b1634a56807156281fd1889754fec5f
                       920df95a6bd34e0dbbc4f66a67b9f8b6ccacb03c
                       e7b9382f
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [e8:b2:04:fc:c3:cf:78:a0:1f:d4:3f:ef:6e:84:ac:47:81:ea:4e:a0],[56:66:d1:a4]
        modulus: a67e95fe18f248a07b50caeb21f1c52059c018407ec95b4a1ea2a89db5fec6c093fa6ce617389bacd56721c12abf2057a8dc47fb5dbf59e5a2404a4131f1a9019ad153c4f2d82932ca45654a8377598e17253d2952d3f55c5827bddeaa1b623cf608712ff62e0db7fb3228bfc1ae170d0f7e7e74117c51bfd624e7a6c0d2b0aa2b6236dd8dd786b55d20d99c049189c3cd0992ac64e489511cfa56ac4c512bb42be5da0b40232f5e14247d9fb36a3d6fae894ed50c8edf629870754fb133c9137fe671c1bad68a129c1a1189f4fdc89005d5b833b987413fdc1c20e833b55b00a1b658605ab723d7d3c961c31641200f15bfe3f996ae67f19c3333d589418bad
public exponent: 10001

] 
2023-01-17 07:10:00.075  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-17 07:10:00.083 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-17 07:10:00.086 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-17 07:10:00.087 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-17 07:10:00.088  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-17 07:10:00.089  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-17 07:10:00.089  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-17 07:10:00.089 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-17 07:10:00.090 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-17 07:10:00.090 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-17 07:10:00.094 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-17 07:10:00.095 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-17 07:10:00.095 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-17 07:10:00.096 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-17 07:10:00.262  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-17 07:10:00.263  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-17 07:10:00.263 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-17 07:10:00.264 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-17 07:10:00.265  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-17 07:10:00.266  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-17 07:10:00.266 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-17 07:10:00.267 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-17 07:10:00.267 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-17 07:10:00.268 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-17 07:10:00.269 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-17 07:10:00.269 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-17 07:10:00.270 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-17 07:10:00.270 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-17 07:10:00.270 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-17 07:10:00.271 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-17 07:10:00.274 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 453424586230408379477485893046427039130592833498
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jan 17 05:01:18 UTC 2023
           Final Date: Sun Jan 16 05:01:17 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [48:7d:c4:91:bf:3b:f7:42:1c:7b:81:e9:b0:e7:89:35:33:90:30:3c],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a1090ba6542610144eaa015b0180b2b2b0795bd9
                       bcee191eb135ce2d5a268ddd476280b52d4a036a
                       2e294977edbfd78eeb0ee965010516d1b8e6f83b
                       7b4c6c69dc79942d0b2873b64fcc9d4df46b0ad6
                       9fd6d09fedb3b6cfafa4823b4f1bb8807d6f687d
                       5c48a41a5d416a71d102a9500d28a3e06703d10c
                       b69e7ac3f936de8528302c44af25734df02ff752
                       0be9886a1df6acaf5480a3d25fb9b2da066b2cf1
                       b2781022955a6878d6a138517b536eaa48b02c33
                       5b8873f00ac9a6071a2a9d2337fd1faee40ba66d
                       f6b9bd2b8daeded422547b62285cd3ef79f82545
                       044b891b81c64d0fa394ce115bc0a71f8f81ed2f
                       2625055f672866445f5f19c0a34671d1a869679e
                       077370318a1f2ddb15f74f31890eee6fba54fdc4
                       fb5af6a6ff8b7b66c3ef9e7821f27b8daaf1a7b1
                       1bc41c801a63719988ae0309445bd58ef0fb4d99
                       cea862d5392d58d2df7f0645cc6d59ee47131cb7
                       e58139f98b1634a56807156281fd1889754fec5f
                       920df95a6bd34e0dbbc4f66a67b9f8b6ccacb03c
                       e7b9382f
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ba:7b:9e:a8:f5:97:36:30:a9:e0:43:99:8b:02:66:30:22:fd:fe:62],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-17 07:16:31.267  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-17 07:16:31.272 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-17 07:16:31.274 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-17 07:16:31.275 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-17 07:16:31.275  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2023-01-17 07:16:31.276  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-17 07:16:31.276  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-17 07:16:31.276 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-17 07:16:31.277 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-17 07:16:31.277 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-17 07:16:31.281 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-17 07:16:31.282 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-17 07:16:31.282 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-17 07:16:31.283 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-17 07:16:31.451  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-17 07:16:31.452  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-17 07:16:31.452 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-17 07:16:31.452 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-17 07:16:31.453  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-17 07:16:31.454  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-17 07:16:31.454 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-17 07:16:31.454 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-17 07:16:31.455 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-17 07:16:31.455 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-17 07:16:31.456 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-17 07:16:31.456 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-17 07:16:31.457 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-17 07:16:31.457 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-17 07:16:31.457 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-17 07:16:31.458 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-17 07:16:31.461 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 453424586230408379477485893046427039130592833498
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jan 17 05:01:18 UTC 2023
           Final Date: Sun Jan 16 05:01:17 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [48:7d:c4:91:bf:3b:f7:42:1c:7b:81:e9:b0:e7:89:35:33:90:30:3c],[56:66:d1:a4]
        modulus: d13efc04aa1bec19d6bfadbf4e3bf7efbe8287fcb5d31ae0cd7a59a2a5fdb4ba869102c594806ff15837c18103011eaf0cf4268eb7c2f8cd4fad6e1bff3887b96d3d8257817c29ca0728a68ac58d119c7c06c91b1ab8b9e05e7343428880eafb0591304ed88a04720485b1f038e5176db467db8f13bb8dd52b5598e9cdb460b25e3c43a25ffb3a09ff427da59ada8f35dd214b63cc1967896c702ff7af8695c395a7d09160bdf03e9b7e3384b83abf67ed53f20adb3ca7ab35f65abbf9ab905635a525fd667ec3c43661ad161deb9447cc99101f4c8d9944e6a3aaf25437682b2b1a4ea20549aa458d3437a525eed94dc97337fe2b977c036510d08f3645d5c4a6d81d5c9dee207d6c4b930cb018f3c7865c0024f5e573df43aa893b29209495c49cbfc778bec3c7a383109200c3f8b6217d54c586a40ad8031c3bfa3917fea4e58d300cf5f23627c6072b59f9cfaa41cc5efbda4d1756a5c792bc5db1cfa0415fa5896c9d99631dc6a49c66faf97fff8145bdf6b740a5308887a54201c4c6f9
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a1090ba6542610144eaa015b0180b2b2b0795bd9
                       bcee191eb135ce2d5a268ddd476280b52d4a036a
                       2e294977edbfd78eeb0ee965010516d1b8e6f83b
                       7b4c6c69dc79942d0b2873b64fcc9d4df46b0ad6
                       9fd6d09fedb3b6cfafa4823b4f1bb8807d6f687d
                       5c48a41a5d416a71d102a9500d28a3e06703d10c
                       b69e7ac3f936de8528302c44af25734df02ff752
                       0be9886a1df6acaf5480a3d25fb9b2da066b2cf1
                       b2781022955a6878d6a138517b536eaa48b02c33
                       5b8873f00ac9a6071a2a9d2337fd1faee40ba66d
                       f6b9bd2b8daeded422547b62285cd3ef79f82545
                       044b891b81c64d0fa394ce115bc0a71f8f81ed2f
                       2625055f672866445f5f19c0a34671d1a869679e
                       077370318a1f2ddb15f74f31890eee6fba54fdc4
                       fb5af6a6ff8b7b66c3ef9e7821f27b8daaf1a7b1
                       1bc41c801a63719988ae0309445bd58ef0fb4d99
                       cea862d5392d58d2df7f0645cc6d59ee47131cb7
                       e58139f98b1634a56807156281fd1889754fec5f
                       920df95a6bd34e0dbbc4f66a67b9f8b6ccacb03c
                       e7b9382f
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [bd:ab:da:92:51:07:35:de:f5:90:8d:9a:7a:86:55:51:63:03:75:c2],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-17 07:23:05.515  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-17 07:23:05.517 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-17 07:23:05.519 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2023-01-17 07:23:05.520 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-17 07:23:05.521  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2023-01-17 07:23:05.521  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-17 07:23:05.522  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-17 07:23:05.522 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-17 07:23:05.522 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-17 07:23:05.523 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-17 07:23:05.527 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-17 07:23:05.528 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-17 07:23:05.528 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-17 07:23:05.528 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-17 07:23:05.691  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-17 07:23:05.692  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-17 07:23:05.692 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-17 07:23:05.693 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-17 07:23:05.694  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-17 07:23:05.694  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-17 07:23:05.695 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-17 07:23:05.695 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-17 07:23:05.695 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-17 07:23:05.696 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-17 07:23:05.696 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-17 07:23:05.696 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-17 07:23:05.697 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-17 07:23:05.697 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-17 07:23:05.697 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-17 07:23:05.698 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-17 07:23:05.701 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 453424586230408379477485893046427039130592833498
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jan 17 05:01:18 UTC 2023
           Final Date: Sun Jan 16 05:01:17 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [48:7d:c4:91:bf:3b:f7:42:1c:7b:81:e9:b0:e7:89:35:33:90:30:3c],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a1090ba6542610144eaa015b0180b2b2b0795bd9
                       bcee191eb135ce2d5a268ddd476280b52d4a036a
                       2e294977edbfd78eeb0ee965010516d1b8e6f83b
                       7b4c6c69dc79942d0b2873b64fcc9d4df46b0ad6
                       9fd6d09fedb3b6cfafa4823b4f1bb8807d6f687d
                       5c48a41a5d416a71d102a9500d28a3e06703d10c
                       b69e7ac3f936de8528302c44af25734df02ff752
                       0be9886a1df6acaf5480a3d25fb9b2da066b2cf1
                       b2781022955a6878d6a138517b536eaa48b02c33
                       5b8873f00ac9a6071a2a9d2337fd1faee40ba66d
                       f6b9bd2b8daeded422547b62285cd3ef79f82545
                       044b891b81c64d0fa394ce115bc0a71f8f81ed2f
                       2625055f672866445f5f19c0a34671d1a869679e
                       077370318a1f2ddb15f74f31890eee6fba54fdc4
                       fb5af6a6ff8b7b66c3ef9e7821f27b8daaf1a7b1
                       1bc41c801a63719988ae0309445bd58ef0fb4d99
                       cea862d5392d58d2df7f0645cc6d59ee47131cb7
                       e58139f98b1634a56807156281fd1889754fec5f
                       920df95a6bd34e0dbbc4f66a67b9f8b6ccacb03c
                       e7b9382f
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [b5:17:0a:63:bf:d7:bd:2f:05:e5:7f:78:98:a0:bb:12:b9:00:7e:b2],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-17 07:29:50.866  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-17 07:29:50.869 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-17 07:29:50.870 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2023-01-17 07:29:50.871 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-17 07:29:50.871  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2023-01-17 07:29:50.872  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-17 07:29:50.873  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-17 07:29:50.873 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-17 07:29:50.873 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-17 07:29:50.874 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-17 07:29:50.877 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-17 07:29:50.878 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-17 07:29:50.878 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-17 07:29:50.879 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-17 07:29:51.035  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-17 07:29:51.036  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-17 07:29:51.036 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-17 07:29:51.036 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-17 07:29:51.038  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-17 07:29:51.038  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-17 07:29:51.039 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-17 07:29:51.039 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-17 07:29:51.039 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-17 07:29:51.040 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-17 07:29:51.040 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-17 07:29:51.041 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-17 07:29:51.042 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-17 07:29:51.042 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-17 07:29:51.042 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-17 07:29:51.044 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-17 07:29:51.046 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 453424586230408379477485893046427039130592833498
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jan 17 05:01:18 UTC 2023
           Final Date: Sun Jan 16 05:01:17 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [48:7d:c4:91:bf:3b:f7:42:1c:7b:81:e9:b0:e7:89:35:33:90:30:3c],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a1090ba6542610144eaa015b0180b2b2b0795bd9
                       bcee191eb135ce2d5a268ddd476280b52d4a036a
                       2e294977edbfd78eeb0ee965010516d1b8e6f83b
                       7b4c6c69dc79942d0b2873b64fcc9d4df46b0ad6
                       9fd6d09fedb3b6cfafa4823b4f1bb8807d6f687d
                       5c48a41a5d416a71d102a9500d28a3e06703d10c
                       b69e7ac3f936de8528302c44af25734df02ff752
                       0be9886a1df6acaf5480a3d25fb9b2da066b2cf1
                       b2781022955a6878d6a138517b536eaa48b02c33
                       5b8873f00ac9a6071a2a9d2337fd1faee40ba66d
                       f6b9bd2b8daeded422547b62285cd3ef79f82545
                       044b891b81c64d0fa394ce115bc0a71f8f81ed2f
                       2625055f672866445f5f19c0a34671d1a869679e
                       077370318a1f2ddb15f74f31890eee6fba54fdc4
                       fb5af6a6ff8b7b66c3ef9e7821f27b8daaf1a7b1
                       1bc41c801a63719988ae0309445bd58ef0fb4d99
                       cea862d5392d58d2df7f0645cc6d59ee47131cb7
                       e58139f98b1634a56807156281fd1889754fec5f
                       920df95a6bd34e0dbbc4f66a67b9f8b6ccacb03c
                       e7b9382f
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [67:e0:86:43:1e:63:37:ba:0f:8f:48:51:7d:86:fe:1b:48:05:6d:b4],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-17 07:30:08.057  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-17 07:30:08.058 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-17 07:30:08.059 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2023-01-17 07:30:08.060 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-17 07:30:08.060  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2023-01-17 07:30:08.061  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-17 07:30:08.061  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-17 07:30:08.061 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-17 07:30:08.062 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-17 07:30:08.062 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-17 07:30:08.065 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-17 07:30:08.066 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-17 07:30:08.066 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-17 07:30:08.067 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-17 07:30:08.172  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-17 07:30:08.173  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-17 07:30:08.173 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-17 07:30:08.173 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-17 07:30:08.174  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-17 07:30:08.175  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-17 07:30:08.175 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-17 07:30:08.175 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-17 07:30:08.175 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-17 07:30:08.176 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-17 07:30:08.176 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-17 07:30:08.176 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-17 07:30:08.177 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-17 07:30:08.177 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-17 07:30:08.177 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-17 07:30:08.178 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-17 07:30:08.180 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 453424586230408379477485893046427039130592833498
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jan 17 05:01:18 UTC 2023
           Final Date: Sun Jan 16 05:01:17 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [48:7d:c4:91:bf:3b:f7:42:1c:7b:81:e9:b0:e7:89:35:33:90:30:3c],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a1090ba6542610144eaa015b0180b2b2b0795bd9
                       bcee191eb135ce2d5a268ddd476280b52d4a036a
                       2e294977edbfd78eeb0ee965010516d1b8e6f83b
                       7b4c6c69dc79942d0b2873b64fcc9d4df46b0ad6
                       9fd6d09fedb3b6cfafa4823b4f1bb8807d6f687d
                       5c48a41a5d416a71d102a9500d28a3e06703d10c
                       b69e7ac3f936de8528302c44af25734df02ff752
                       0be9886a1df6acaf5480a3d25fb9b2da066b2cf1
                       b2781022955a6878d6a138517b536eaa48b02c33
                       5b8873f00ac9a6071a2a9d2337fd1faee40ba66d
                       f6b9bd2b8daeded422547b62285cd3ef79f82545
                       044b891b81c64d0fa394ce115bc0a71f8f81ed2f
                       2625055f672866445f5f19c0a34671d1a869679e
                       077370318a1f2ddb15f74f31890eee6fba54fdc4
                       fb5af6a6ff8b7b66c3ef9e7821f27b8daaf1a7b1
                       1bc41c801a63719988ae0309445bd58ef0fb4d99
                       cea862d5392d58d2df7f0645cc6d59ee47131cb7
                       e58139f98b1634a56807156281fd1889754fec5f
                       920df95a6bd34e0dbbc4f66a67b9f8b6ccacb03c
                       e7b9382f
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ac:58:0b:f5:cf:2d:5f:11:73:6a:74:5b:32:61:6d:59:60:96:11:8f],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-17 07:55:27.632  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-17 07:55:27.636 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-17 07:55:27.638 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2023-01-17 07:55:27.639 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-17 07:55:27.639  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2023-01-17 07:55:27.640  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-17 07:55:27.640  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-17 07:55:27.641 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-17 07:55:27.641 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-17 07:55:27.642 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-17 07:55:27.646 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-17 07:55:27.647 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-17 07:55:27.647 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-17 07:55:27.648 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-17 07:55:27.821  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-17 07:55:27.822  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-17 07:55:27.822 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-17 07:55:27.823 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-17 07:55:27.824  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-17 07:55:27.825  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-17 07:55:27.829 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-17 07:55:27.830 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-17 07:55:27.831 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-17 07:55:27.832 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-17 07:55:27.832 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-17 07:55:27.833 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-17 07:55:27.834 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-17 07:55:27.835 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-17 07:55:27.835 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-17 07:55:27.836 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-17 07:55:27.841 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 453424586230408379477485893046427039130592833498
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jan 17 05:01:18 UTC 2023
           Final Date: Sun Jan 16 05:01:17 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [48:7d:c4:91:bf:3b:f7:42:1c:7b:81:e9:b0:e7:89:35:33:90:30:3c],[56:66:d1:a4]
        modulus: d13efc04aa1bec19d6bfadbf4e3bf7efbe8287fcb5d31ae0cd7a59a2a5fdb4ba869102c594806ff15837c18103011eaf0cf4268eb7c2f8cd4fad6e1bff3887b96d3d8257817c29ca0728a68ac58d119c7c06c91b1ab8b9e05e7343428880eafb0591304ed88a04720485b1f038e5176db467db8f13bb8dd52b5598e9cdb460b25e3c43a25ffb3a09ff427da59ada8f35dd214b63cc1967896c702ff7af8695c395a7d09160bdf03e9b7e3384b83abf67ed53f20adb3ca7ab35f65abbf9ab905635a525fd667ec3c43661ad161deb9447cc99101f4c8d9944e6a3aaf25437682b2b1a4ea20549aa458d3437a525eed94dc97337fe2b977c036510d08f3645d5c4a6d81d5c9dee207d6c4b930cb018f3c7865c0024f5e573df43aa893b29209495c49cbfc778bec3c7a383109200c3f8b6217d54c586a40ad8031c3bfa3917fea4e58d300cf5f23627c6072b59f9cfaa41cc5efbda4d1756a5c792bc5db1cfa0415fa5896c9d99631dc6a49c66faf97fff8145bdf6b740a5308887a54201c4c6f9
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a1090ba6542610144eaa015b0180b2b2b0795bd9
                       bcee191eb135ce2d5a268ddd476280b52d4a036a
                       2e294977edbfd78eeb0ee965010516d1b8e6f83b
                       7b4c6c69dc79942d0b2873b64fcc9d4df46b0ad6
                       9fd6d09fedb3b6cfafa4823b4f1bb8807d6f687d
                       5c48a41a5d416a71d102a9500d28a3e06703d10c
                       b69e7ac3f936de8528302c44af25734df02ff752
                       0be9886a1df6acaf5480a3d25fb9b2da066b2cf1
                       b2781022955a6878d6a138517b536eaa48b02c33
                       5b8873f00ac9a6071a2a9d2337fd1faee40ba66d
                       f6b9bd2b8daeded422547b62285cd3ef79f82545
                       044b891b81c64d0fa394ce115bc0a71f8f81ed2f
                       2625055f672866445f5f19c0a34671d1a869679e
                       077370318a1f2ddb15f74f31890eee6fba54fdc4
                       fb5af6a6ff8b7b66c3ef9e7821f27b8daaf1a7b1
                       1bc41c801a63719988ae0309445bd58ef0fb4d99
                       cea862d5392d58d2df7f0645cc6d59ee47131cb7
                       e58139f98b1634a56807156281fd1889754fec5f
                       920df95a6bd34e0dbbc4f66a67b9f8b6ccacb03c
                       e7b9382f
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [e2:7d:e2:57:57:10:1b:02:3b:6f:f4:ab:4f:48:bb:31:be:59:9c:23],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2023-01-17 07:55:33.435  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2023-01-17 07:55:33.436 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2023-01-17 07:55:33.437 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2023-01-17 07:55:33.438 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2023-01-17 07:55:33.439  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2023-01-17 07:55:33.439  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2023-01-17 07:55:33.440  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2023-01-17 07:55:33.440 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2023-01-17 07:55:33.440 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2023-01-17 07:55:33.441 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2023-01-17 07:55:33.444 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2023-01-17 07:55:33.445 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-17 07:55:33.445 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2023-01-17 07:55:33.446 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-17 07:55:33.551  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2023-01-17 07:55:33.552  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2023-01-17 07:55:33.552 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2023-01-17 07:55:33.552 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2023-01-17 07:55:33.554  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2023-01-17 07:55:33.554  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2023-01-17 07:55:33.554 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-17 07:55:33.555 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-17 07:55:33.555 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-17 07:55:33.556 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-17 07:55:33.556 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-17 07:55:33.557 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-17 07:55:33.557 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2023-01-17 07:55:33.558 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2023-01-17 07:55:33.558 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2023-01-17 07:55:33.559 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2023-01-17 07:55:33.570 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 453424586230408379477485893046427039130592833498
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jan 17 05:01:18 UTC 2023
           Final Date: Sun Jan 16 05:01:17 UTC 2033
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [48:7d:c4:91:bf:3b:f7:42:1c:7b:81:e9:b0:e7:89:35:33:90:30:3c],[56:66:d1:a4]
        modulus: d13efc04aa1bec19d6bfadbf4e3bf7efbe8287fcb5d31ae0cd7a59a2a5fdb4ba869102c594806ff15837c18103011eaf0cf4268eb7c2f8cd4fad6e1bff3887b96d3d8257817c29ca0728a68ac58d119c7c06c91b1ab8b9e05e7343428880eafb0591304ed88a04720485b1f038e5176db467db8f13bb8dd52b5598e9cdb460b25e3c43a25ffb3a09ff427da59ada8f35dd214b63cc1967896c702ff7af8695c395a7d09160bdf03e9b7e3384b83abf67ed53f20adb3ca7ab35f65abbf9ab905635a525fd667ec3c43661ad161deb9447cc99101f4c8d9944e6a3aaf25437682b2b1a4ea20549aa458d3437a525eed94dc97337fe2b977c036510d08f3645d5c4a6d81d5c9dee207d6c4b930cb018f3c7865c0024f5e573df43aa893b29209495c49cbfc778bec3c7a383109200c3f8b6217d54c586a40ad8031c3bfa3917fea4e58d300cf5f23627c6072b59f9cfaa41cc5efbda4d1756a5c792bc5db1cfa0415fa5896c9d99631dc6a49c66faf97fff8145bdf6b740a5308887a54201c4c6f9
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a1090ba6542610144eaa015b0180b2b2b0795bd9
                       bcee191eb135ce2d5a268ddd476280b52d4a036a
                       2e294977edbfd78eeb0ee965010516d1b8e6f83b
                       7b4c6c69dc79942d0b2873b64fcc9d4df46b0ad6
                       9fd6d09fedb3b6cfafa4823b4f1bb8807d6f687d
                       5c48a41a5d416a71d102a9500d28a3e06703d10c
                       b69e7ac3f936de8528302c44af25734df02ff752
                       0be9886a1df6acaf5480a3d25fb9b2da066b2cf1
                       b2781022955a6878d6a138517b536eaa48b02c33
                       5b8873f00ac9a6071a2a9d2337fd1faee40ba66d
                       f6b9bd2b8daeded422547b62285cd3ef79f82545
                       044b891b81c64d0fa394ce115bc0a71f8f81ed2f
                       2625055f672866445f5f19c0a34671d1a869679e
                       077370318a1f2ddb15f74f31890eee6fba54fdc4
                       fb5af6a6ff8b7b66c3ef9e7821f27b8daaf1a7b1
                       1bc41c801a63719988ae0309445bd58ef0fb4d99
                       cea862d5392d58d2df7f0645cc6d59ee47131cb7
                       e58139f98b1634a56807156281fd1889754fec5f
                       920df95a6bd34e0dbbc4f66a67b9f8b6ccacb03c
                       e7b9382f
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [86:42:66:e1:3f:1a:86:4d:d5:05:17:e6:25:60:14:b8:d7:e2:19:57],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

]