Results

By type

          2022-05-07 01:37:50,952 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-05-07 01:37:55,055 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-05-07 01:37:58.043  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
May 07, 2022 1:38:06 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
May 07, 2022 1:38:06 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
May 07, 2022 1:38:06 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
May 07, 2022 1:38:07 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-05-07 01:38:08.847 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-05-07 01:38:09.947  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-05-07 01:38:10.559  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-05-07 01:38:13.448 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-05-07 01:38:13.451 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
2022-05-07 01:38:13.452 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-05-07 01:38:13.455 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-05-07 01:38:13.645 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2022-05-07 01:38:13.648 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
	{GET [/docs]}: redirectToUi(HttpServletRequest)
2022-05-07 01:38:14.148 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-05-07 01:38:18.366 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
May 07, 2022 1:38:21 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-05-07 01:38:22.466  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 34.906 seconds (JVM running for 41.882)
May 07, 2022 1:38:26 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-05-07 01:38:58.738  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-07 01:38:58.746 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-07 01:38:58.942 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-05-07 01:38:58.945 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-07 01:38:58.957  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-05-07 01:38:59.038  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-07 01:38:59.039  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-07 01:38:59.041 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-07 01:38:59.041 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-07 01:38:59.045 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-07 01:38:59.050 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-07 01:38:59.053 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-07 01:38:59.240 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-07 01:38:59.245 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-07 01:38:59.246 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-07 01:38:59.250 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-07 01:39:00.661  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-07 01:39:00.740  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-07 01:39:00.741 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-07 01:39:00.742 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-07 01:39:00.750  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-07 01:39:00.751  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-07 01:39:00.752 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-07 01:39:00.752 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-07 01:39:00.752 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-07 01:39:00.843 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-07 01:39:00.843 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-07 01:39:00.844 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-07 01:39:00.851 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-07 01:39:00.852 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-07 01:39:00.852 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-07 01:39:00.855 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-07 01:39:01.045 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 725278196435670274915018592003497980231676416523
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat May 07 01:34:41 UTC 2022
           Final Date: Thu May 06 01:34:40 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [fb:b6:56:a3:6e:27:ce:49:16:04:58:60:52:ad:4e:20:ee:04:1a:39]
            modulus: ab2393350b4b2261d235305b2394ecff6d3ce0ce8b29b2c85e8cd091bf5dab6dd419dc5832a6bebda671f0968233bfcf9925fd04db11ed32c08d41fc21e349f0ea4c1f27b0d27587fef8cd064cc3fe2a8a454641cf554a5884801ff6e09086459b31bf4b4578178762296db93b7f091afa753b7b7bcee65d66841a67b5c3ac10f0c03616d922e353abdb5f03246d8083980e278e6f90d68c0c4635e420c0f0dfbc40ac79b55559608c40bbbac7bac8f897e6d5d42f6062b0269b69345aee48aae9fcf013912b4331bf56d2ca3f11bb8b7d1ced122cda5ebb2365aba1665ea73a40c38c542453f2f68924376fce176b38660847eb1e11354f075d89d985d4a5545543efa0efa7681dd4052962551b8d3743d4003304ae2227db473971139bfff7057098a875673f8d4336004bbdf353e31f0b999175680198f4e86f6911afde33609d65c24f45f67475498224618598aa567f2f2697483ad7723323a7c4312bf88de47b9aae85a688a838f201ee94edde6a06a087e07c64cd092bb5cbd0c12245
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 4772232574449cedf074174d954df4c8a63f0aa6
                       be6acd32017bb044337e368ffac6b94f0c068934
                       1e2140309eb0adc699a899892278a38de05465ac
                       490fa557220aa1a76e9e6d6f39a6966924920d5f
                       3f93337e5de051eb4f5eeaad78f7af643c3acef8
                       e9def00cd5c05136ca5e375ea8525a58f3b03396
                       99c18b735350ab08f29a76d9288f7c0ef28be0f8
                       81c62a586787253b03c9280917963df57bbcbc23
                       71d1cacb10dd1158cd4172316d058f1f8cf2ccbd
                       b7217ec36ff0c7afe5ba7e063fdcf33cf533fced
                       ca93ffee4f348c073b3223f7c2355e3e625b4129
                       58e71dd95c71645ad30f8e08b5ca2672b18cda55
                       b470a0ae0c4b6de5e84c72050e02141b2e5afbfa
                       60499f8ed85e5cd0b4798e43be4d052494a65041
                       f58f8f6a6910d29d03218bdd17d4f3d1f0acc04f
                       9bf98e9ce631d032c969907bd15f799df2e6e84d
                       8827d774f2f0e322668f08b7737d90dab3d86f2e
                       fb450ccef3fce73eaf62e263826cc9c37713db1b
                       9761e746c60111fdba547fab43c98406a3f4ba1c
                       b58e0959
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [08:45:3a:35:ae:02:33:f1:98:47:90:f6:5c:6a:87:e1:11:96:6d:6f]
            modulus: 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
    public exponent: 10001

] 
2022-05-07 03:04:02.581  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-07 03:04:02.582 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-07 03:04:02.584 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-07 03:04:02.585 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-07 03:04:02.586  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-07 03:04:02.587  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-07 03:04:02.587  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-07 03:04:02.588 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-07 03:04:02.588 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-07 03:04:02.589 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-07 03:04:02.639 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-07 03:04:02.640 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-07 03:04:02.641 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-07 03:04:02.641 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-07 03:04:02.866  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-07 03:04:02.867  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-07 03:04:02.868 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-07 03:04:02.868 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-07 03:04:02.871  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-07 03:04:02.871  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-07 03:04:02.872 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-07 03:04:02.872 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-07 03:04:02.872 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-07 03:04:02.938 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-07 03:04:02.939 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-07 03:04:02.939 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-07 03:04:02.940 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-07 03:04:02.940 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-07 03:04:02.941 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-07 03:04:02.943 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-07 03:04:02.949 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 725278196435670274915018592003497980231676416523
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat May 07 01:34:41 UTC 2022
           Final Date: Thu May 06 01:34:40 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [fb:b6:56:a3:6e:27:ce:49:16:04:58:60:52:ad:4e:20:ee:04:1a:39]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 4772232574449cedf074174d954df4c8a63f0aa6
                       be6acd32017bb044337e368ffac6b94f0c068934
                       1e2140309eb0adc699a899892278a38de05465ac
                       490fa557220aa1a76e9e6d6f39a6966924920d5f
                       3f93337e5de051eb4f5eeaad78f7af643c3acef8
                       e9def00cd5c05136ca5e375ea8525a58f3b03396
                       99c18b735350ab08f29a76d9288f7c0ef28be0f8
                       81c62a586787253b03c9280917963df57bbcbc23
                       71d1cacb10dd1158cd4172316d058f1f8cf2ccbd
                       b7217ec36ff0c7afe5ba7e063fdcf33cf533fced
                       ca93ffee4f348c073b3223f7c2355e3e625b4129
                       58e71dd95c71645ad30f8e08b5ca2672b18cda55
                       b470a0ae0c4b6de5e84c72050e02141b2e5afbfa
                       60499f8ed85e5cd0b4798e43be4d052494a65041
                       f58f8f6a6910d29d03218bdd17d4f3d1f0acc04f
                       9bf98e9ce631d032c969907bd15f799df2e6e84d
                       8827d774f2f0e322668f08b7737d90dab3d86f2e
                       fb450ccef3fce73eaf62e263826cc9c37713db1b
                       9761e746c60111fdba547fab43c98406a3f4ba1c
                       b58e0959
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [34:24:86:5f:47:71:92:a0:c0:6b:53:c4:fd:dd:22:21:51:b7:0b:27]
            modulus: 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
    public exponent: 10001

] 
2022-05-07 03:07:29.781  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-07 03:07:29.782 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-07 03:07:29.783 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-07 03:07:29.784 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-07 03:07:29.785  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-07 03:07:29.785  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-07 03:07:29.786  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-07 03:07:29.786 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-07 03:07:29.786 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-07 03:07:29.787 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-07 03:07:29.792 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-07 03:07:29.792 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-07 03:07:29.792 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-07 03:07:29.793 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-07 03:07:29.933  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-07 03:07:29.933  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-07 03:07:29.934 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-07 03:07:29.934 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-07 03:07:29.939  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-07 03:07:29.939  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-07 03:07:29.940 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-07 03:07:29.940 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-07 03:07:29.940 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-07 03:07:29.941 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-07 03:07:29.941 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-07 03:07:29.942 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-07 03:07:29.942 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-07 03:07:29.942 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-07 03:07:29.943 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-07 03:07:29.943 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-07 03:07:29.946 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 725278196435670274915018592003497980231676416523
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat May 07 01:34:41 UTC 2022
           Final Date: Thu May 06 01:34:40 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [fb:b6:56:a3:6e:27:ce:49:16:04:58:60:52:ad:4e:20:ee:04:1a:39]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 4772232574449cedf074174d954df4c8a63f0aa6
                       be6acd32017bb044337e368ffac6b94f0c068934
                       1e2140309eb0adc699a899892278a38de05465ac
                       490fa557220aa1a76e9e6d6f39a6966924920d5f
                       3f93337e5de051eb4f5eeaad78f7af643c3acef8
                       e9def00cd5c05136ca5e375ea8525a58f3b03396
                       99c18b735350ab08f29a76d9288f7c0ef28be0f8
                       81c62a586787253b03c9280917963df57bbcbc23
                       71d1cacb10dd1158cd4172316d058f1f8cf2ccbd
                       b7217ec36ff0c7afe5ba7e063fdcf33cf533fced
                       ca93ffee4f348c073b3223f7c2355e3e625b4129
                       58e71dd95c71645ad30f8e08b5ca2672b18cda55
                       b470a0ae0c4b6de5e84c72050e02141b2e5afbfa
                       60499f8ed85e5cd0b4798e43be4d052494a65041
                       f58f8f6a6910d29d03218bdd17d4f3d1f0acc04f
                       9bf98e9ce631d032c969907bd15f799df2e6e84d
                       8827d774f2f0e322668f08b7737d90dab3d86f2e
                       fb450ccef3fce73eaf62e263826cc9c37713db1b
                       9761e746c60111fdba547fab43c98406a3f4ba1c
                       b58e0959
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [9e:ac:86:a9:c6:8c:90:3b:f3:e0:27:0b:09:a0:00:5a:f9:e0:81:99]
            modulus: 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
    public exponent: 10001

] 
2022-05-07 03:08:59.313  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-07 03:08:59.314 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-07 03:08:59.316 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-05-07 03:08:59.317 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-07 03:08:59.317  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-05-07 03:08:59.318  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-07 03:08:59.319  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-07 03:08:59.319 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-07 03:08:59.320 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-07 03:08:59.320 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-07 03:08:59.327 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-07 03:08:59.328 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-07 03:08:59.329 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-07 03:08:59.329 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-07 03:08:59.448  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-07 03:08:59.448  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-07 03:08:59.449 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-07 03:08:59.449 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-07 03:08:59.451  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-07 03:08:59.451  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-07 03:08:59.452 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-07 03:08:59.452 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-07 03:08:59.452 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-07 03:08:59.453 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-07 03:08:59.454 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-07 03:08:59.454 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-07 03:08:59.455 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-07 03:08:59.455 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-07 03:08:59.455 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-07 03:08:59.456 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-07 03:08:59.459 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 725278196435670274915018592003497980231676416523
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat May 07 01:34:41 UTC 2022
           Final Date: Thu May 06 01:34:40 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [fb:b6:56:a3:6e:27:ce:49:16:04:58:60:52:ad:4e:20:ee:04:1a:39]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 4772232574449cedf074174d954df4c8a63f0aa6
                       be6acd32017bb044337e368ffac6b94f0c068934
                       1e2140309eb0adc699a899892278a38de05465ac
                       490fa557220aa1a76e9e6d6f39a6966924920d5f
                       3f93337e5de051eb4f5eeaad78f7af643c3acef8
                       e9def00cd5c05136ca5e375ea8525a58f3b03396
                       99c18b735350ab08f29a76d9288f7c0ef28be0f8
                       81c62a586787253b03c9280917963df57bbcbc23
                       71d1cacb10dd1158cd4172316d058f1f8cf2ccbd
                       b7217ec36ff0c7afe5ba7e063fdcf33cf533fced
                       ca93ffee4f348c073b3223f7c2355e3e625b4129
                       58e71dd95c71645ad30f8e08b5ca2672b18cda55
                       b470a0ae0c4b6de5e84c72050e02141b2e5afbfa
                       60499f8ed85e5cd0b4798e43be4d052494a65041
                       f58f8f6a6910d29d03218bdd17d4f3d1f0acc04f
                       9bf98e9ce631d032c969907bd15f799df2e6e84d
                       8827d774f2f0e322668f08b7737d90dab3d86f2e
                       fb450ccef3fce73eaf62e263826cc9c37713db1b
                       9761e746c60111fdba547fab43c98406a3f4ba1c
                       b58e0959
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [df:5f:10:7a:c6:74:61:c0:c0:70:a4:0f:c9:de:59:b3:98:ed:82:95]
            modulus: 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
    public exponent: 10001

] 
2022-05-07 03:11:24.081  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-07 03:11:24.082 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-07 03:11:24.083 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-07 03:11:24.084 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-07 03:11:24.084  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-07 03:11:24.085  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-07 03:11:24.085  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-07 03:11:24.086 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-07 03:11:24.086 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-07 03:11:24.086 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-07 03:11:24.090 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-07 03:11:24.091 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-07 03:11:24.091 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-07 03:11:24.092 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-07 03:11:24.198  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-07 03:11:24.199  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-07 03:11:24.199 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-07 03:11:24.199 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-07 03:11:24.201  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-07 03:11:24.201  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-07 03:11:24.201 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-07 03:11:24.202 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-07 03:11:24.202 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-07 03:11:24.202 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-07 03:11:24.202 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-07 03:11:24.203 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-07 03:11:24.203 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-07 03:11:24.204 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-07 03:11:24.204 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-07 03:11:24.204 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-07 03:11:24.238 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 725278196435670274915018592003497980231676416523
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat May 07 01:34:41 UTC 2022
           Final Date: Thu May 06 01:34:40 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [fb:b6:56:a3:6e:27:ce:49:16:04:58:60:52:ad:4e:20:ee:04:1a:39]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 4772232574449cedf074174d954df4c8a63f0aa6
                       be6acd32017bb044337e368ffac6b94f0c068934
                       1e2140309eb0adc699a899892278a38de05465ac
                       490fa557220aa1a76e9e6d6f39a6966924920d5f
                       3f93337e5de051eb4f5eeaad78f7af643c3acef8
                       e9def00cd5c05136ca5e375ea8525a58f3b03396
                       99c18b735350ab08f29a76d9288f7c0ef28be0f8
                       81c62a586787253b03c9280917963df57bbcbc23
                       71d1cacb10dd1158cd4172316d058f1f8cf2ccbd
                       b7217ec36ff0c7afe5ba7e063fdcf33cf533fced
                       ca93ffee4f348c073b3223f7c2355e3e625b4129
                       58e71dd95c71645ad30f8e08b5ca2672b18cda55
                       b470a0ae0c4b6de5e84c72050e02141b2e5afbfa
                       60499f8ed85e5cd0b4798e43be4d052494a65041
                       f58f8f6a6910d29d03218bdd17d4f3d1f0acc04f
                       9bf98e9ce631d032c969907bd15f799df2e6e84d
                       8827d774f2f0e322668f08b7737d90dab3d86f2e
                       fb450ccef3fce73eaf62e263826cc9c37713db1b
                       9761e746c60111fdba547fab43c98406a3f4ba1c
                       b58e0959
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [22:e6:9c:3e:a9:60:3a:66:47:d8:3b:ce:05:93:b8:0b:f6:b9:f9:dc]
            modulus: 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
    public exponent: 10001

] 
2022-05-07 03:15:41.763  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-07 03:15:41.764 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-07 03:15:41.766 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-05-07 03:15:41.766 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-07 03:15:41.766  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-05-07 03:15:41.767  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-07 03:15:41.767  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-07 03:15:41.768 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-07 03:15:41.768 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-07 03:15:41.768 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-07 03:15:41.775 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-07 03:15:41.775 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-07 03:15:41.776 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-07 03:15:41.776 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-07 03:15:41.935  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-07 03:15:41.936  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-07 03:15:41.936 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-07 03:15:41.937 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-07 03:15:41.938  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-07 03:15:41.939  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-07 03:15:41.939 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-07 03:15:41.940 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-07 03:15:41.940 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-07 03:15:41.941 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-07 03:15:41.941 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-07 03:15:41.942 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-07 03:15:41.943 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-07 03:15:41.943 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-07 03:15:41.944 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-07 03:15:41.945 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-07 03:15:41.948 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 725278196435670274915018592003497980231676416523
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat May 07 01:34:41 UTC 2022
           Final Date: Thu May 06 01:34:40 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [fb:b6:56:a3:6e:27:ce:49:16:04:58:60:52:ad:4e:20:ee:04:1a:39]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 4772232574449cedf074174d954df4c8a63f0aa6
                       be6acd32017bb044337e368ffac6b94f0c068934
                       1e2140309eb0adc699a899892278a38de05465ac
                       490fa557220aa1a76e9e6d6f39a6966924920d5f
                       3f93337e5de051eb4f5eeaad78f7af643c3acef8
                       e9def00cd5c05136ca5e375ea8525a58f3b03396
                       99c18b735350ab08f29a76d9288f7c0ef28be0f8
                       81c62a586787253b03c9280917963df57bbcbc23
                       71d1cacb10dd1158cd4172316d058f1f8cf2ccbd
                       b7217ec36ff0c7afe5ba7e063fdcf33cf533fced
                       ca93ffee4f348c073b3223f7c2355e3e625b4129
                       58e71dd95c71645ad30f8e08b5ca2672b18cda55
                       b470a0ae0c4b6de5e84c72050e02141b2e5afbfa
                       60499f8ed85e5cd0b4798e43be4d052494a65041
                       f58f8f6a6910d29d03218bdd17d4f3d1f0acc04f
                       9bf98e9ce631d032c969907bd15f799df2e6e84d
                       8827d774f2f0e322668f08b7737d90dab3d86f2e
                       fb450ccef3fce73eaf62e263826cc9c37713db1b
                       9761e746c60111fdba547fab43c98406a3f4ba1c
                       b58e0959
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ee:67:a6:c8:b1:df:92:72:3e:29:f4:61:f6:66:e1:42:b2:26:77:66]
            modulus: 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
    public exponent: 10001

] 
2022-05-07 03:18:51.620  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-07 03:18:51.622 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-07 03:18:51.624 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-07 03:18:51.625 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-07 03:18:51.625  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-07 03:18:51.626  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-07 03:18:51.627  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-07 03:18:51.627 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-07 03:18:51.628 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-07 03:18:51.628 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-07 03:18:51.633 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-07 03:18:51.634 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-07 03:18:51.634 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-07 03:18:51.635 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-07 03:18:51.731  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-07 03:18:51.731  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-07 03:18:51.731 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-07 03:18:51.732 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-07 03:18:51.733  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-07 03:18:51.733  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-07 03:18:51.733 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-07 03:18:51.734 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-07 03:18:51.734 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-07 03:18:51.734 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-07 03:18:51.734 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-07 03:18:51.735 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-07 03:18:51.735 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-07 03:18:51.736 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-07 03:18:51.736 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-07 03:18:51.736 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-07 03:18:51.739 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 725278196435670274915018592003497980231676416523
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat May 07 01:34:41 UTC 2022
           Final Date: Thu May 06 01:34:40 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [fb:b6:56:a3:6e:27:ce:49:16:04:58:60:52:ad:4e:20:ee:04:1a:39]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 4772232574449cedf074174d954df4c8a63f0aa6
                       be6acd32017bb044337e368ffac6b94f0c068934
                       1e2140309eb0adc699a899892278a38de05465ac
                       490fa557220aa1a76e9e6d6f39a6966924920d5f
                       3f93337e5de051eb4f5eeaad78f7af643c3acef8
                       e9def00cd5c05136ca5e375ea8525a58f3b03396
                       99c18b735350ab08f29a76d9288f7c0ef28be0f8
                       81c62a586787253b03c9280917963df57bbcbc23
                       71d1cacb10dd1158cd4172316d058f1f8cf2ccbd
                       b7217ec36ff0c7afe5ba7e063fdcf33cf533fced
                       ca93ffee4f348c073b3223f7c2355e3e625b4129
                       58e71dd95c71645ad30f8e08b5ca2672b18cda55
                       b470a0ae0c4b6de5e84c72050e02141b2e5afbfa
                       60499f8ed85e5cd0b4798e43be4d052494a65041
                       f58f8f6a6910d29d03218bdd17d4f3d1f0acc04f
                       9bf98e9ce631d032c969907bd15f799df2e6e84d
                       8827d774f2f0e322668f08b7737d90dab3d86f2e
                       fb450ccef3fce73eaf62e263826cc9c37713db1b
                       9761e746c60111fdba547fab43c98406a3f4ba1c
                       b58e0959
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [4d:11:15:0e:da:c1:97:50:83:a3:96:87:4c:ca:53:49:4f:d1:f8:6a]
            modulus: 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
    public exponent: 10001

] 
2022-05-07 03:19:37.509  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-07 03:19:37.511 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-07 03:19:37.512 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-05-07 03:19:37.513 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-07 03:19:37.513  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-05-07 03:19:37.513  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-07 03:19:37.514  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-07 03:19:37.514 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-07 03:19:37.514 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-07 03:19:37.514 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-07 03:19:37.519 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-07 03:19:37.519 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-07 03:19:37.520 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-07 03:19:37.520 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-07 03:19:37.619  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-07 03:19:37.620  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-07 03:19:37.620 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-07 03:19:37.620 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-07 03:19:37.621  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-07 03:19:37.622  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-07 03:19:37.622 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-07 03:19:37.622 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-07 03:19:37.622 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-07 03:19:37.623 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-07 03:19:37.623 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-07 03:19:37.623 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-07 03:19:37.624 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-07 03:19:37.624 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-07 03:19:37.624 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-07 03:19:37.625 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-07 03:19:37.627 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 725278196435670274915018592003497980231676416523
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat May 07 01:34:41 UTC 2022
           Final Date: Thu May 06 01:34:40 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [fb:b6:56:a3:6e:27:ce:49:16:04:58:60:52:ad:4e:20:ee:04:1a:39]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 4772232574449cedf074174d954df4c8a63f0aa6
                       be6acd32017bb044337e368ffac6b94f0c068934
                       1e2140309eb0adc699a899892278a38de05465ac
                       490fa557220aa1a76e9e6d6f39a6966924920d5f
                       3f93337e5de051eb4f5eeaad78f7af643c3acef8
                       e9def00cd5c05136ca5e375ea8525a58f3b03396
                       99c18b735350ab08f29a76d9288f7c0ef28be0f8
                       81c62a586787253b03c9280917963df57bbcbc23
                       71d1cacb10dd1158cd4172316d058f1f8cf2ccbd
                       b7217ec36ff0c7afe5ba7e063fdcf33cf533fced
                       ca93ffee4f348c073b3223f7c2355e3e625b4129
                       58e71dd95c71645ad30f8e08b5ca2672b18cda55
                       b470a0ae0c4b6de5e84c72050e02141b2e5afbfa
                       60499f8ed85e5cd0b4798e43be4d052494a65041
                       f58f8f6a6910d29d03218bdd17d4f3d1f0acc04f
                       9bf98e9ce631d032c969907bd15f799df2e6e84d
                       8827d774f2f0e322668f08b7737d90dab3d86f2e
                       fb450ccef3fce73eaf62e263826cc9c37713db1b
                       9761e746c60111fdba547fab43c98406a3f4ba1c
                       b58e0959
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [06:97:d1:ff:53:a8:6d:29:f9:87:ea:6b:e6:8f:cd:08:f8:de:90:1a]
            modulus: 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
    public exponent: 10001

] 
2022-05-07 03:24:02.223  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-07 03:24:02.224 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-07 03:24:02.225 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-07 03:24:02.226 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-07 03:24:02.226  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-07 03:24:02.227  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-07 03:24:02.227  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-07 03:24:02.227 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-07 03:24:02.227 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-07 03:24:02.228 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-07 03:24:02.232 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-07 03:24:02.232 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-07 03:24:02.232 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-07 03:24:02.233 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-07 03:24:02.324  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-07 03:24:02.325  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-07 03:24:02.325 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-07 03:24:02.325 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-07 03:24:02.326  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-07 03:24:02.326  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-07 03:24:02.327 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-07 03:24:02.327 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-07 03:24:02.327 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-07 03:24:02.328 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-07 03:24:02.328 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-07 03:24:02.328 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-07 03:24:02.329 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-07 03:24:02.329 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-07 03:24:02.329 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-07 03:24:02.330 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-07 03:24:02.332 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 725278196435670274915018592003497980231676416523
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat May 07 01:34:41 UTC 2022
           Final Date: Thu May 06 01:34:40 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [fb:b6:56:a3:6e:27:ce:49:16:04:58:60:52:ad:4e:20:ee:04:1a:39]
            modulus: ab2393350b4b2261d235305b2394ecff6d3ce0ce8b29b2c85e8cd091bf5dab6dd419dc5832a6bebda671f0968233bfcf9925fd04db11ed32c08d41fc21e349f0ea4c1f27b0d27587fef8cd064cc3fe2a8a454641cf554a5884801ff6e09086459b31bf4b4578178762296db93b7f091afa753b7b7bcee65d66841a67b5c3ac10f0c03616d922e353abdb5f03246d8083980e278e6f90d68c0c4635e420c0f0dfbc40ac79b55559608c40bbbac7bac8f897e6d5d42f6062b0269b69345aee48aae9fcf013912b4331bf56d2ca3f11bb8b7d1ced122cda5ebb2365aba1665ea73a40c38c542453f2f68924376fce176b38660847eb1e11354f075d89d985d4a5545543efa0efa7681dd4052962551b8d3743d4003304ae2227db473971139bfff7057098a875673f8d4336004bbdf353e31f0b999175680198f4e86f6911afde33609d65c24f45f67475498224618598aa567f2f2697483ad7723323a7c4312bf88de47b9aae85a688a838f201ee94edde6a06a087e07c64cd092bb5cbd0c12245
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 4772232574449cedf074174d954df4c8a63f0aa6
                       be6acd32017bb044337e368ffac6b94f0c068934
                       1e2140309eb0adc699a899892278a38de05465ac
                       490fa557220aa1a76e9e6d6f39a6966924920d5f
                       3f93337e5de051eb4f5eeaad78f7af643c3acef8
                       e9def00cd5c05136ca5e375ea8525a58f3b03396
                       99c18b735350ab08f29a76d9288f7c0ef28be0f8
                       81c62a586787253b03c9280917963df57bbcbc23
                       71d1cacb10dd1158cd4172316d058f1f8cf2ccbd
                       b7217ec36ff0c7afe5ba7e063fdcf33cf533fced
                       ca93ffee4f348c073b3223f7c2355e3e625b4129
                       58e71dd95c71645ad30f8e08b5ca2672b18cda55
                       b470a0ae0c4b6de5e84c72050e02141b2e5afbfa
                       60499f8ed85e5cd0b4798e43be4d052494a65041
                       f58f8f6a6910d29d03218bdd17d4f3d1f0acc04f
                       9bf98e9ce631d032c969907bd15f799df2e6e84d
                       8827d774f2f0e322668f08b7737d90dab3d86f2e
                       fb450ccef3fce73eaf62e263826cc9c37713db1b
                       9761e746c60111fdba547fab43c98406a3f4ba1c
                       b58e0959
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [d0:41:68:df:85:d2:ce:44:dd:e1:1c:ca:61:f2:89:28:db:00:5e:3d]
            modulus: 929f430583936ebab87dfff5eb87b23ba1039765cb6c79aef9d00f659caff01c492dcab7c4e10d9a79606eb30e27ed742b604091cb78a34a07ca51c4e647d4342558ed8be38ff24711ccf133b34e60b0d870b6dd4024a8565f270a3c25afbeec435542257312fee5a8389d99a5817c3d6b42c45fc94719af066b52d62d77fa801707c59298675a38b02d31e1d746004d80bb438ef642b62fd05841af6e81a30c459b39cb70b31cb91e9b13f1a4ea1997256a8b1877954af9f03c9cc509063af4a6f796558d7a84dd41e73900a891c7992c9a3ccbf0015b9152ecd0669ee57fdda1a7ad62dde6020f7355c11348b8211678b13b164c4cf17e1e4a5bc405a349d9
    public exponent: 10001

] 
2022-05-07 03:27:03.109  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-07 03:27:03.111 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-07 03:27:03.112 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-05-07 03:27:03.113 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-07 03:27:03.113  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-05-07 03:27:03.114  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-07 03:27:03.114  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-07 03:27:03.115 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-07 03:27:03.115 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-07 03:27:03.115 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-07 03:27:03.122 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-07 03:27:03.122 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-07 03:27:03.123 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-07 03:27:03.123 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-07 03:27:03.218  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-07 03:27:03.218  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-07 03:27:03.218 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-07 03:27:03.219 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-07 03:27:03.219  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-07 03:27:03.220  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-07 03:27:03.220 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-07 03:27:03.220 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-07 03:27:03.220 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-07 03:27:03.221 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-07 03:27:03.221 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-07 03:27:03.221 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-07 03:27:03.222 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-07 03:27:03.222 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-07 03:27:03.222 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-07 03:27:03.222 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-07 03:27:03.225 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 725278196435670274915018592003497980231676416523
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat May 07 01:34:41 UTC 2022
           Final Date: Thu May 06 01:34:40 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [fb:b6:56:a3:6e:27:ce:49:16:04:58:60:52:ad:4e:20:ee:04:1a:39]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 4772232574449cedf074174d954df4c8a63f0aa6
                       be6acd32017bb044337e368ffac6b94f0c068934
                       1e2140309eb0adc699a899892278a38de05465ac
                       490fa557220aa1a76e9e6d6f39a6966924920d5f
                       3f93337e5de051eb4f5eeaad78f7af643c3acef8
                       e9def00cd5c05136ca5e375ea8525a58f3b03396
                       99c18b735350ab08f29a76d9288f7c0ef28be0f8
                       81c62a586787253b03c9280917963df57bbcbc23
                       71d1cacb10dd1158cd4172316d058f1f8cf2ccbd
                       b7217ec36ff0c7afe5ba7e063fdcf33cf533fced
                       ca93ffee4f348c073b3223f7c2355e3e625b4129
                       58e71dd95c71645ad30f8e08b5ca2672b18cda55
                       b470a0ae0c4b6de5e84c72050e02141b2e5afbfa
                       60499f8ed85e5cd0b4798e43be4d052494a65041
                       f58f8f6a6910d29d03218bdd17d4f3d1f0acc04f
                       9bf98e9ce631d032c969907bd15f799df2e6e84d
                       8827d774f2f0e322668f08b7737d90dab3d86f2e
                       fb450ccef3fce73eaf62e263826cc9c37713db1b
                       9761e746c60111fdba547fab43c98406a3f4ba1c
                       b58e0959
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [83:1c:5d:73:2b:ad:e8:12:88:39:93:57:9b:fe:6c:03:a8:c5:06:a2]
            modulus: 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
    public exponent: 10001

] 
2022-05-07 03:27:58.805  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-07 03:27:58.806 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-07 03:27:58.807 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-05-07 03:27:58.807 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-07 03:27:58.807  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-05-07 03:27:58.808  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-07 03:27:58.808  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-07 03:27:58.808 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-07 03:27:58.808 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-07 03:27:58.809 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-07 03:27:58.813 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-07 03:27:58.813 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-07 03:27:58.813 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-07 03:27:58.814 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-07 03:27:58.912  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-07 03:27:58.913  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-07 03:27:58.913 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-07 03:27:58.913 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-07 03:27:58.915  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-07 03:27:58.915  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-07 03:27:58.915 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-07 03:27:58.915 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-07 03:27:58.915 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-07 03:27:58.916 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-07 03:27:58.916 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-07 03:27:58.916 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-07 03:27:58.917 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-07 03:27:58.917 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-07 03:27:58.917 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-07 03:27:58.918 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-07 03:27:58.938 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 725278196435670274915018592003497980231676416523
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat May 07 01:34:41 UTC 2022
           Final Date: Thu May 06 01:34:40 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [fb:b6:56:a3:6e:27:ce:49:16:04:58:60:52:ad:4e:20:ee:04:1a:39]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 4772232574449cedf074174d954df4c8a63f0aa6
                       be6acd32017bb044337e368ffac6b94f0c068934
                       1e2140309eb0adc699a899892278a38de05465ac
                       490fa557220aa1a76e9e6d6f39a6966924920d5f
                       3f93337e5de051eb4f5eeaad78f7af643c3acef8
                       e9def00cd5c05136ca5e375ea8525a58f3b03396
                       99c18b735350ab08f29a76d9288f7c0ef28be0f8
                       81c62a586787253b03c9280917963df57bbcbc23
                       71d1cacb10dd1158cd4172316d058f1f8cf2ccbd
                       b7217ec36ff0c7afe5ba7e063fdcf33cf533fced
                       ca93ffee4f348c073b3223f7c2355e3e625b4129
                       58e71dd95c71645ad30f8e08b5ca2672b18cda55
                       b470a0ae0c4b6de5e84c72050e02141b2e5afbfa
                       60499f8ed85e5cd0b4798e43be4d052494a65041
                       f58f8f6a6910d29d03218bdd17d4f3d1f0acc04f
                       9bf98e9ce631d032c969907bd15f799df2e6e84d
                       8827d774f2f0e322668f08b7737d90dab3d86f2e
                       fb450ccef3fce73eaf62e263826cc9c37713db1b
                       9761e746c60111fdba547fab43c98406a3f4ba1c
                       b58e0959
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [00:bb:0e:00:57:6f:fa:3c:7b:83:ea:fe:19:7a:f1:96:cb:7f:ed:02]
            modulus: db69bf8c3f2609cc6d3c6cc804b550faf12201c323c2d4b2d0a42a4205b09b3bf3b65caaa6b2143fd22fa10a9c9e438c334f97ff6e3c1c5f97f1155c4ff7c2bb595d93dd0e377335f29162c0ab4e25bd2f72e9338b7ec747796dee71c4c2f3b6225f533e8694d791f45db8ef02e204aeae3b244f1e72bfb2fcbf0b965e9e71b9d266da258020656ce82bff1a91f457fb3b3dd10c5f7996f926f9866bf0237be3c0b3f3e4e8e13df05b5e2b7df10e59a6ed867bbfde4a95a9e0593c920018ed73708fae5d3d4199b9777fc16732cc2a35e8aa2708379a150992d88af288d3213905295568d8e6981ce3fefab5815395c66c17b22521596af0127bf91fab116da1
    public exponent: 10001

] 
2022-05-07 03:30:26.296  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-07 03:30:26.296 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-07 03:30:26.297 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-07 03:30:26.298 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-07 03:30:26.298  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-07 03:30:26.298  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-07 03:30:26.298  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-07 03:30:26.299 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-07 03:30:26.299 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-07 03:30:26.299 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-07 03:30:26.303 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-07 03:30:26.303 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-07 03:30:26.304 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-07 03:30:26.304 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-07 03:30:26.397  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-07 03:30:26.398  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-07 03:30:26.398 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-07 03:30:26.398 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-07 03:30:26.399  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-07 03:30:26.399  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-07 03:30:26.400 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-07 03:30:26.400 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-07 03:30:26.400 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-07 03:30:26.400 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-07 03:30:26.400 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-07 03:30:26.401 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-07 03:30:26.401 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-07 03:30:26.401 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-07 03:30:26.401 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-07 03:30:26.402 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-07 03:30:26.404 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 725278196435670274915018592003497980231676416523
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat May 07 01:34:41 UTC 2022
           Final Date: Thu May 06 01:34:40 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [fb:b6:56:a3:6e:27:ce:49:16:04:58:60:52:ad:4e:20:ee:04:1a:39]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 4772232574449cedf074174d954df4c8a63f0aa6
                       be6acd32017bb044337e368ffac6b94f0c068934
                       1e2140309eb0adc699a899892278a38de05465ac
                       490fa557220aa1a76e9e6d6f39a6966924920d5f
                       3f93337e5de051eb4f5eeaad78f7af643c3acef8
                       e9def00cd5c05136ca5e375ea8525a58f3b03396
                       99c18b735350ab08f29a76d9288f7c0ef28be0f8
                       81c62a586787253b03c9280917963df57bbcbc23
                       71d1cacb10dd1158cd4172316d058f1f8cf2ccbd
                       b7217ec36ff0c7afe5ba7e063fdcf33cf533fced
                       ca93ffee4f348c073b3223f7c2355e3e625b4129
                       58e71dd95c71645ad30f8e08b5ca2672b18cda55
                       b470a0ae0c4b6de5e84c72050e02141b2e5afbfa
                       60499f8ed85e5cd0b4798e43be4d052494a65041
                       f58f8f6a6910d29d03218bdd17d4f3d1f0acc04f
                       9bf98e9ce631d032c969907bd15f799df2e6e84d
                       8827d774f2f0e322668f08b7737d90dab3d86f2e
                       fb450ccef3fce73eaf62e263826cc9c37713db1b
                       9761e746c60111fdba547fab43c98406a3f4ba1c
                       b58e0959
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [5c:29:19:29:64:12:a6:2d:5c:0d:6c:61:e8:a5:80:54:93:d4:05:88]
            modulus: c95622edf10898d20c4c0691e3fc830c9531ae82473ab18ca31c3ee280ae00d295a3a1ec49b56708a89eed6babb1212fa2abe12305a5bfd6673e630ac5b0604a969651196d63ac14ac07490522a6ab1279bf9890f4e9b08fa391ed56c3eb1d7dca2c900a263c3f267a5d729582b4970d875f8a3ee2544862b5ce90d4fd6746aa59f67a528dd81436b1e29a128e8b80748bbe5c1a6072bfc568ba586904e355d7356bca323b064507daa636f6b396e80008a2506387d147662a8f20c70c628288636834f02706b28b77526ff6094e93ca128835d729c33fb64f0dd0b84009a33a3d5ef515d55878cdb81c797bd5e14702f8bd2a5ca1196370186eedf10ec50b4f
    public exponent: 10001

]