Results

By type

          2022-05-26 02:27:26,383 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-05-26 02:27:30,383 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-05-26 02:27:33.181  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
May 26, 2022 2:27:42 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
May 26, 2022 2:27:42 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
May 26, 2022 2:27:42 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
May 26, 2022 2:27:42 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-05-26 02:27:44.297 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-05-26 02:27:45.582  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-05-26 02:27:46.284  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-05-26 02:27:48.992 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-05-26 02:27:48.994 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
2022-05-26 02:27:48.996 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-05-26 02:27:49.076 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-05-26 02:27:49.196 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2022-05-26 02:27:49.275 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/docs]}: redirectToUi(HttpServletRequest)
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
2022-05-26 02:27:49.686 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-05-26 02:27:53.392 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
May 26, 2022 2:27:56 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-05-26 02:27:57.283  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 34.091 seconds (JVM running for 40.685)
May 26, 2022 2:27:59 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-05-26 02:28:46.994  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-26 02:28:47.078 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-26 02:28:47.190 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-05-26 02:28:47.193 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-26 02:28:47.284  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-05-26 02:28:47.287  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-26 02:28:47.288  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-26 02:28:47.289 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-26 02:28:47.289 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-26 02:28:47.293 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-26 02:28:47.379 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-26 02:28:47.382 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-26 02:28:47.491 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-26 02:28:47.496 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-26 02:28:47.496 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-26 02:28:47.577 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-26 02:28:49.386  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-26 02:28:49.389  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-26 02:28:49.389 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-26 02:28:49.391 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-26 02:28:49.479  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-26 02:28:49.480  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-26 02:28:49.481 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-26 02:28:49.481 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-26 02:28:49.482 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-26 02:28:49.492 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-26 02:28:49.492 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-26 02:28:49.493 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-26 02:28:49.498 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-26 02:28:49.575 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-26 02:28:49.575 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-26 02:28:49.577 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-26 02:28:49.684 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 651068095874550526366303973738960976074636226539
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu May 26 02:22:10 UTC 2022
           Final Date: Tue May 25 02:22:09 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [27:6f:f7:53:c0:ec:ac:96:53:cb:6e:2f:98:f6:1d:0f:14:41:8a:c4]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 24d5afa0cc5b5a2728fec1931a97a9e4649b231a
                       cafe00fc771b822ff9651707b7b69ddbd26e7410
                       5d862952b7168f295729bb9cc813e828bd0cba74
                       0ee67e21dc07b4ed8257036fbd06151df80f61ec
                       cfd5d85ea1f4b560786acc6ae23d0d36921074b6
                       1ca0a8a359b165450efc0e914718a367b67b0812
                       4acc2dc692aadaea6c361bd329bc3c6f2d89f4b3
                       ef53c5b61b124f43890afa90bd02d5b0590d6ea8
                       fc344bbdb78a99f21c26ead662a7667465978021
                       dbc24255248b91ed3818d0080b50de3509672e52
                       81670ab01fd20d358bc0bdbb11c7aee2f02756b9
                       9e75785620329f42819815db50f795d6e4f4b8d9
                       598b4392242eef21df18cd66d97d59d01de339a4
                       97e5bd659d2741e83355da3663f8955567b273b1
                       03c114efcde72bf3ed2c3451ea33bb982037f964
                       1aab1a1a270dc2b8d794b76566464f151f45d2e2
                       239a9c59c0ade11c08c6c6df3b276f28937a19d3
                       e93597750e41f905790beb4b6ab4f74bffba9c5d
                       e0a79271dddaae29542ff49a440fecdc53bbc76b
                       ba94b25e
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [59:f0:58:a3:7b:d1:d6:49:13:63:79:c7:4d:1c:4b:97:9c:11:d0:fa]
            modulus: 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
    public exponent: 10001

] 
2022-05-26 03:58:53.345  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-26 03:58:53.346 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-26 03:58:53.348 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-26 03:58:53.349 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-26 03:58:53.350  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-26 03:58:53.351  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-26 03:58:53.351  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-26 03:58:53.352 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-26 03:58:53.352 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-26 03:58:53.353 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-26 03:58:53.379 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-26 03:58:53.380 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-26 03:58:53.381 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-26 03:58:53.381 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-26 03:58:53.585  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-26 03:58:53.586  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-26 03:58:53.586 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-26 03:58:53.587 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-26 03:58:53.590  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-26 03:58:53.590  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-26 03:58:53.591 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-26 03:58:53.591 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-26 03:58:53.591 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-26 03:58:53.593 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-26 03:58:53.593 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-26 03:58:53.593 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-26 03:58:53.594 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-26 03:58:53.594 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-26 03:58:53.595 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-26 03:58:53.596 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-26 03:58:53.677 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 651068095874550526366303973738960976074636226539
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu May 26 02:22:10 UTC 2022
           Final Date: Tue May 25 02:22:09 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [27:6f:f7:53:c0:ec:ac:96:53:cb:6e:2f:98:f6:1d:0f:14:41:8a:c4]
            modulus: d80d96ec937d303d844d21336db4647ee7dbb27f19368ea00e7d8864fd6a2b2142cd3bbeb543d07e6e4479f32d2143c0f4329d7c4893134e4177ce69582b572e0af6e24a0d767cc68bd5cd4e986b6131dfe8248db863822bc933036b0ae291f9d89e73792434006346a33ec6151bd75bd2324311e3e7bdd979fcf93cb4fea05d2a0a9ddef806a17dcc445a45239289621f5931afe4caa3c4e873b20517d156a2062b039b70d8b0a0d0497e3252e1f01af29de2346b6c45f8f240b27934bfaad2cc4fe3ea7d06acfc1bedb75680e20ef3eefe1526791fa077a6bb6513eba55416640fe941484ac1583f7974ab0988f73b4aeea1e75bda2458b6552a5c31cb738be1457f6d09efb4331e26c19d294a3aee81cc84a8c5e3e407ebd608f01bb24822d065eb719f7d777b3842d996fe16082f0502d3709bf86d2f2642e0e0b514d97da7a95be854daf8d75a73864fc656b664fd4df8d6c40431db2a8b8080add733bb50157e209454193c14d95a5b10886eca2a0453defd19c00bdec7d39def8a7471
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 24d5afa0cc5b5a2728fec1931a97a9e4649b231a
                       cafe00fc771b822ff9651707b7b69ddbd26e7410
                       5d862952b7168f295729bb9cc813e828bd0cba74
                       0ee67e21dc07b4ed8257036fbd06151df80f61ec
                       cfd5d85ea1f4b560786acc6ae23d0d36921074b6
                       1ca0a8a359b165450efc0e914718a367b67b0812
                       4acc2dc692aadaea6c361bd329bc3c6f2d89f4b3
                       ef53c5b61b124f43890afa90bd02d5b0590d6ea8
                       fc344bbdb78a99f21c26ead662a7667465978021
                       dbc24255248b91ed3818d0080b50de3509672e52
                       81670ab01fd20d358bc0bdbb11c7aee2f02756b9
                       9e75785620329f42819815db50f795d6e4f4b8d9
                       598b4392242eef21df18cd66d97d59d01de339a4
                       97e5bd659d2741e83355da3663f8955567b273b1
                       03c114efcde72bf3ed2c3451ea33bb982037f964
                       1aab1a1a270dc2b8d794b76566464f151f45d2e2
                       239a9c59c0ade11c08c6c6df3b276f28937a19d3
                       e93597750e41f905790beb4b6ab4f74bffba9c5d
                       e0a79271dddaae29542ff49a440fecdc53bbc76b
                       ba94b25e
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [fb:3f:7a:d4:f1:75:48:21:79:da:46:14:3f:53:be:69:51:d9:f0:5a]
            modulus: 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
    public exponent: 10001

] 
2022-05-26 04:02:58.593  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-26 04:02:58.594 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-26 04:02:58.596 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-26 04:02:58.597 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-26 04:02:58.597  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-26 04:02:58.598  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-26 04:02:58.598  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-26 04:02:58.599 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-26 04:02:58.599 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-26 04:02:58.599 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-26 04:02:58.605 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-26 04:02:58.605 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-26 04:02:58.606 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-26 04:02:58.606 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-26 04:02:58.805  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-26 04:02:58.806  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-26 04:02:58.806 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-26 04:02:58.807 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-26 04:02:58.808  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-26 04:02:58.809  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-26 04:02:58.809 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-26 04:02:58.809 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-26 04:02:58.810 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-26 04:02:58.810 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-26 04:02:58.810 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-26 04:02:58.811 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-26 04:02:58.811 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-26 04:02:58.811 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-26 04:02:58.812 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-26 04:02:58.812 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-26 04:02:58.876 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 651068095874550526366303973738960976074636226539
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu May 26 02:22:10 UTC 2022
           Final Date: Tue May 25 02:22:09 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [27:6f:f7:53:c0:ec:ac:96:53:cb:6e:2f:98:f6:1d:0f:14:41:8a:c4]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 24d5afa0cc5b5a2728fec1931a97a9e4649b231a
                       cafe00fc771b822ff9651707b7b69ddbd26e7410
                       5d862952b7168f295729bb9cc813e828bd0cba74
                       0ee67e21dc07b4ed8257036fbd06151df80f61ec
                       cfd5d85ea1f4b560786acc6ae23d0d36921074b6
                       1ca0a8a359b165450efc0e914718a367b67b0812
                       4acc2dc692aadaea6c361bd329bc3c6f2d89f4b3
                       ef53c5b61b124f43890afa90bd02d5b0590d6ea8
                       fc344bbdb78a99f21c26ead662a7667465978021
                       dbc24255248b91ed3818d0080b50de3509672e52
                       81670ab01fd20d358bc0bdbb11c7aee2f02756b9
                       9e75785620329f42819815db50f795d6e4f4b8d9
                       598b4392242eef21df18cd66d97d59d01de339a4
                       97e5bd659d2741e83355da3663f8955567b273b1
                       03c114efcde72bf3ed2c3451ea33bb982037f964
                       1aab1a1a270dc2b8d794b76566464f151f45d2e2
                       239a9c59c0ade11c08c6c6df3b276f28937a19d3
                       e93597750e41f905790beb4b6ab4f74bffba9c5d
                       e0a79271dddaae29542ff49a440fecdc53bbc76b
                       ba94b25e
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [0c:fd:03:db:b3:4e:dc:81:23:db:86:b5:a5:81:cc:c7:ed:d7:78:95]
            modulus: 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
    public exponent: 10001

] 
2022-05-26 04:05:15.385  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-26 04:05:15.386 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-26 04:05:15.388 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-05-26 04:05:15.389 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-26 04:05:15.389  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-05-26 04:05:15.390  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-26 04:05:15.390  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-26 04:05:15.391 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-26 04:05:15.391 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-26 04:05:15.391 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-26 04:05:15.399 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-26 04:05:15.400 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-26 04:05:15.400 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-26 04:05:15.400 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-26 04:05:15.558  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-26 04:05:15.559  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-26 04:05:15.559 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-26 04:05:15.559 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-26 04:05:15.561  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-26 04:05:15.561  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-26 04:05:15.561 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-26 04:05:15.562 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-26 04:05:15.562 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-26 04:05:15.562 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-26 04:05:15.563 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-26 04:05:15.563 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-26 04:05:15.564 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-26 04:05:15.564 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-26 04:05:15.564 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-26 04:05:15.565 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-26 04:05:15.575 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 651068095874550526366303973738960976074636226539
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu May 26 02:22:10 UTC 2022
           Final Date: Tue May 25 02:22:09 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [27:6f:f7:53:c0:ec:ac:96:53:cb:6e:2f:98:f6:1d:0f:14:41:8a:c4]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 24d5afa0cc5b5a2728fec1931a97a9e4649b231a
                       cafe00fc771b822ff9651707b7b69ddbd26e7410
                       5d862952b7168f295729bb9cc813e828bd0cba74
                       0ee67e21dc07b4ed8257036fbd06151df80f61ec
                       cfd5d85ea1f4b560786acc6ae23d0d36921074b6
                       1ca0a8a359b165450efc0e914718a367b67b0812
                       4acc2dc692aadaea6c361bd329bc3c6f2d89f4b3
                       ef53c5b61b124f43890afa90bd02d5b0590d6ea8
                       fc344bbdb78a99f21c26ead662a7667465978021
                       dbc24255248b91ed3818d0080b50de3509672e52
                       81670ab01fd20d358bc0bdbb11c7aee2f02756b9
                       9e75785620329f42819815db50f795d6e4f4b8d9
                       598b4392242eef21df18cd66d97d59d01de339a4
                       97e5bd659d2741e83355da3663f8955567b273b1
                       03c114efcde72bf3ed2c3451ea33bb982037f964
                       1aab1a1a270dc2b8d794b76566464f151f45d2e2
                       239a9c59c0ade11c08c6c6df3b276f28937a19d3
                       e93597750e41f905790beb4b6ab4f74bffba9c5d
                       e0a79271dddaae29542ff49a440fecdc53bbc76b
                       ba94b25e
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [1f:7c:5b:7b:7d:4a:6a:9b:b9:e2:c2:40:60:67:4f:58:81:7e:24:1d]
            modulus: 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
    public exponent: 10001

] 
2022-05-26 04:08:13.801  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-26 04:08:13.803 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-26 04:08:13.804 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-26 04:08:13.804 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-26 04:08:13.805  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-26 04:08:13.805  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-26 04:08:13.805  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-26 04:08:13.806 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-26 04:08:13.806 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-26 04:08:13.806 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-26 04:08:13.811 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-26 04:08:13.812 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-26 04:08:13.812 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-26 04:08:13.812 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-26 04:08:13.901  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-26 04:08:13.902  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-26 04:08:13.902 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-26 04:08:13.902 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-26 04:08:13.904  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-26 04:08:13.904  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-26 04:08:13.905 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-26 04:08:13.905 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-26 04:08:13.905 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-26 04:08:13.906 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-26 04:08:13.906 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-26 04:08:13.906 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-26 04:08:13.907 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-26 04:08:13.907 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-26 04:08:13.908 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-26 04:08:13.908 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-26 04:08:13.976 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 651068095874550526366303973738960976074636226539
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu May 26 02:22:10 UTC 2022
           Final Date: Tue May 25 02:22:09 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [27:6f:f7:53:c0:ec:ac:96:53:cb:6e:2f:98:f6:1d:0f:14:41:8a:c4]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 24d5afa0cc5b5a2728fec1931a97a9e4649b231a
                       cafe00fc771b822ff9651707b7b69ddbd26e7410
                       5d862952b7168f295729bb9cc813e828bd0cba74
                       0ee67e21dc07b4ed8257036fbd06151df80f61ec
                       cfd5d85ea1f4b560786acc6ae23d0d36921074b6
                       1ca0a8a359b165450efc0e914718a367b67b0812
                       4acc2dc692aadaea6c361bd329bc3c6f2d89f4b3
                       ef53c5b61b124f43890afa90bd02d5b0590d6ea8
                       fc344bbdb78a99f21c26ead662a7667465978021
                       dbc24255248b91ed3818d0080b50de3509672e52
                       81670ab01fd20d358bc0bdbb11c7aee2f02756b9
                       9e75785620329f42819815db50f795d6e4f4b8d9
                       598b4392242eef21df18cd66d97d59d01de339a4
                       97e5bd659d2741e83355da3663f8955567b273b1
                       03c114efcde72bf3ed2c3451ea33bb982037f964
                       1aab1a1a270dc2b8d794b76566464f151f45d2e2
                       239a9c59c0ade11c08c6c6df3b276f28937a19d3
                       e93597750e41f905790beb4b6ab4f74bffba9c5d
                       e0a79271dddaae29542ff49a440fecdc53bbc76b
                       ba94b25e
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [6f:f9:94:97:84:21:f1:5c:91:ce:e3:08:97:49:25:1b:6a:b7:db:93]
            modulus: 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
    public exponent: 10001

] 
2022-05-26 04:12:04.566  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-26 04:12:04.567 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-26 04:12:04.569 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-05-26 04:12:04.570 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-26 04:12:04.570  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-05-26 04:12:04.570  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-26 04:12:04.571  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-26 04:12:04.571 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-26 04:12:04.571 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-26 04:12:04.572 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-26 04:12:04.576 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-26 04:12:04.577 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-26 04:12:04.577 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-26 04:12:04.577 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-26 04:12:04.669  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-26 04:12:04.670  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-26 04:12:04.675 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-26 04:12:04.675 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-26 04:12:04.677  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-26 04:12:04.677  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-26 04:12:04.677 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-26 04:12:04.678 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-26 04:12:04.678 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-26 04:12:04.679 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-26 04:12:04.679 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-26 04:12:04.679 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-26 04:12:04.680 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-26 04:12:04.680 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-26 04:12:04.680 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-26 04:12:04.681 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-26 04:12:04.683 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 651068095874550526366303973738960976074636226539
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu May 26 02:22:10 UTC 2022
           Final Date: Tue May 25 02:22:09 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [27:6f:f7:53:c0:ec:ac:96:53:cb:6e:2f:98:f6:1d:0f:14:41:8a:c4]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 24d5afa0cc5b5a2728fec1931a97a9e4649b231a
                       cafe00fc771b822ff9651707b7b69ddbd26e7410
                       5d862952b7168f295729bb9cc813e828bd0cba74
                       0ee67e21dc07b4ed8257036fbd06151df80f61ec
                       cfd5d85ea1f4b560786acc6ae23d0d36921074b6
                       1ca0a8a359b165450efc0e914718a367b67b0812
                       4acc2dc692aadaea6c361bd329bc3c6f2d89f4b3
                       ef53c5b61b124f43890afa90bd02d5b0590d6ea8
                       fc344bbdb78a99f21c26ead662a7667465978021
                       dbc24255248b91ed3818d0080b50de3509672e52
                       81670ab01fd20d358bc0bdbb11c7aee2f02756b9
                       9e75785620329f42819815db50f795d6e4f4b8d9
                       598b4392242eef21df18cd66d97d59d01de339a4
                       97e5bd659d2741e83355da3663f8955567b273b1
                       03c114efcde72bf3ed2c3451ea33bb982037f964
                       1aab1a1a270dc2b8d794b76566464f151f45d2e2
                       239a9c59c0ade11c08c6c6df3b276f28937a19d3
                       e93597750e41f905790beb4b6ab4f74bffba9c5d
                       e0a79271dddaae29542ff49a440fecdc53bbc76b
                       ba94b25e
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [40:19:7c:d5:bd:df:87:df:cd:c3:58:cf:9b:f2:d7:aa:11:b9:8f:17]
            modulus: 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
    public exponent: 10001

] 
2022-05-26 04:15:49.172  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-26 04:15:49.173 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-26 04:15:49.174 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-05-26 04:15:49.175 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-26 04:15:49.175  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-05-26 04:15:49.176  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-26 04:15:49.176  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-26 04:15:49.176 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-26 04:15:49.176 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-26 04:15:49.177 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-26 04:15:49.181 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-26 04:15:49.181 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-26 04:15:49.181 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-26 04:15:49.182 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-26 04:15:49.268  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-26 04:15:49.268  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-26 04:15:49.269 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-26 04:15:49.269 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-26 04:15:49.270  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-26 04:15:49.271  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-26 04:15:49.271 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-26 04:15:49.272 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-26 04:15:49.272 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-26 04:15:49.273 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-26 04:15:49.273 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-26 04:15:49.273 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-26 04:15:49.274 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-26 04:15:49.275 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-26 04:15:49.275 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-26 04:15:49.276 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-26 04:15:49.279 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 651068095874550526366303973738960976074636226539
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu May 26 02:22:10 UTC 2022
           Final Date: Tue May 25 02:22:09 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [27:6f:f7:53:c0:ec:ac:96:53:cb:6e:2f:98:f6:1d:0f:14:41:8a:c4]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 24d5afa0cc5b5a2728fec1931a97a9e4649b231a
                       cafe00fc771b822ff9651707b7b69ddbd26e7410
                       5d862952b7168f295729bb9cc813e828bd0cba74
                       0ee67e21dc07b4ed8257036fbd06151df80f61ec
                       cfd5d85ea1f4b560786acc6ae23d0d36921074b6
                       1ca0a8a359b165450efc0e914718a367b67b0812
                       4acc2dc692aadaea6c361bd329bc3c6f2d89f4b3
                       ef53c5b61b124f43890afa90bd02d5b0590d6ea8
                       fc344bbdb78a99f21c26ead662a7667465978021
                       dbc24255248b91ed3818d0080b50de3509672e52
                       81670ab01fd20d358bc0bdbb11c7aee2f02756b9
                       9e75785620329f42819815db50f795d6e4f4b8d9
                       598b4392242eef21df18cd66d97d59d01de339a4
                       97e5bd659d2741e83355da3663f8955567b273b1
                       03c114efcde72bf3ed2c3451ea33bb982037f964
                       1aab1a1a270dc2b8d794b76566464f151f45d2e2
                       239a9c59c0ade11c08c6c6df3b276f28937a19d3
                       e93597750e41f905790beb4b6ab4f74bffba9c5d
                       e0a79271dddaae29542ff49a440fecdc53bbc76b
                       ba94b25e
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [61:64:55:3f:74:86:f6:53:9d:d3:9e:85:bc:34:8f:b2:90:52:2d:dd]
            modulus: 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
    public exponent: 10001

] 
2022-05-26 04:17:17.299  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-26 04:17:17.300 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-26 04:17:17.301 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-26 04:17:17.301 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-26 04:17:17.301  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-26 04:17:17.302  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-26 04:17:17.302  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-26 04:17:17.302 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-26 04:17:17.302 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-26 04:17:17.303 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-26 04:17:17.307 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-26 04:17:17.307 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-26 04:17:17.307 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-26 04:17:17.308 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-26 04:17:17.389  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-26 04:17:17.389  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-26 04:17:17.390 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-26 04:17:17.390 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-26 04:17:17.392  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-26 04:17:17.392  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-26 04:17:17.392 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-26 04:17:17.392 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-26 04:17:17.393 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-26 04:17:17.393 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-26 04:17:17.394 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-26 04:17:17.394 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-26 04:17:17.394 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-26 04:17:17.395 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-26 04:17:17.395 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-26 04:17:17.396 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-26 04:17:17.400 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 651068095874550526366303973738960976074636226539
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu May 26 02:22:10 UTC 2022
           Final Date: Tue May 25 02:22:09 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [27:6f:f7:53:c0:ec:ac:96:53:cb:6e:2f:98:f6:1d:0f:14:41:8a:c4]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 24d5afa0cc5b5a2728fec1931a97a9e4649b231a
                       cafe00fc771b822ff9651707b7b69ddbd26e7410
                       5d862952b7168f295729bb9cc813e828bd0cba74
                       0ee67e21dc07b4ed8257036fbd06151df80f61ec
                       cfd5d85ea1f4b560786acc6ae23d0d36921074b6
                       1ca0a8a359b165450efc0e914718a367b67b0812
                       4acc2dc692aadaea6c361bd329bc3c6f2d89f4b3
                       ef53c5b61b124f43890afa90bd02d5b0590d6ea8
                       fc344bbdb78a99f21c26ead662a7667465978021
                       dbc24255248b91ed3818d0080b50de3509672e52
                       81670ab01fd20d358bc0bdbb11c7aee2f02756b9
                       9e75785620329f42819815db50f795d6e4f4b8d9
                       598b4392242eef21df18cd66d97d59d01de339a4
                       97e5bd659d2741e83355da3663f8955567b273b1
                       03c114efcde72bf3ed2c3451ea33bb982037f964
                       1aab1a1a270dc2b8d794b76566464f151f45d2e2
                       239a9c59c0ade11c08c6c6df3b276f28937a19d3
                       e93597750e41f905790beb4b6ab4f74bffba9c5d
                       e0a79271dddaae29542ff49a440fecdc53bbc76b
                       ba94b25e
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [86:ce:40:1c:d0:dc:fd:ea:ee:1c:f0:d1:83:b0:03:4f:f1:e0:ca:d7]
            modulus: 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
    public exponent: 10001

] 
2022-05-26 04:23:15.565  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-26 04:23:15.566 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-26 04:23:15.568 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-26 04:23:15.568 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-26 04:23:15.569  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-26 04:23:15.569  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-26 04:23:15.570  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-26 04:23:15.570 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-26 04:23:15.570 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-26 04:23:15.571 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-26 04:23:15.576 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-26 04:23:15.577 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-26 04:23:15.577 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-26 04:23:15.578 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-26 04:23:15.671  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-26 04:23:15.672  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-26 04:23:15.672 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-26 04:23:15.672 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-26 04:23:15.674  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-26 04:23:15.674  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-26 04:23:15.674 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-26 04:23:15.675 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-26 04:23:15.675 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-26 04:23:15.676 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-26 04:23:15.677 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-26 04:23:15.677 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-26 04:23:15.678 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-26 04:23:15.678 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-26 04:23:15.678 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-26 04:23:15.679 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-26 04:23:15.682 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 651068095874550526366303973738960976074636226539
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu May 26 02:22:10 UTC 2022
           Final Date: Tue May 25 02:22:09 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [27:6f:f7:53:c0:ec:ac:96:53:cb:6e:2f:98:f6:1d:0f:14:41:8a:c4]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 24d5afa0cc5b5a2728fec1931a97a9e4649b231a
                       cafe00fc771b822ff9651707b7b69ddbd26e7410
                       5d862952b7168f295729bb9cc813e828bd0cba74
                       0ee67e21dc07b4ed8257036fbd06151df80f61ec
                       cfd5d85ea1f4b560786acc6ae23d0d36921074b6
                       1ca0a8a359b165450efc0e914718a367b67b0812
                       4acc2dc692aadaea6c361bd329bc3c6f2d89f4b3
                       ef53c5b61b124f43890afa90bd02d5b0590d6ea8
                       fc344bbdb78a99f21c26ead662a7667465978021
                       dbc24255248b91ed3818d0080b50de3509672e52
                       81670ab01fd20d358bc0bdbb11c7aee2f02756b9
                       9e75785620329f42819815db50f795d6e4f4b8d9
                       598b4392242eef21df18cd66d97d59d01de339a4
                       97e5bd659d2741e83355da3663f8955567b273b1
                       03c114efcde72bf3ed2c3451ea33bb982037f964
                       1aab1a1a270dc2b8d794b76566464f151f45d2e2
                       239a9c59c0ade11c08c6c6df3b276f28937a19d3
                       e93597750e41f905790beb4b6ab4f74bffba9c5d
                       e0a79271dddaae29542ff49a440fecdc53bbc76b
                       ba94b25e
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [1e:a1:7f:5a:88:0c:2f:da:7e:4f:7d:d0:6c:b7:c9:c8:44:a2:fe:4a]
            modulus: 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
    public exponent: 10001

] 
2022-05-26 04:26:16.305  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-26 04:26:16.306 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-26 04:26:16.307 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-05-26 04:26:16.307 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-26 04:26:16.308  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-05-26 04:26:16.308  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-26 04:26:16.308  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-26 04:26:16.308 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-26 04:26:16.309 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-26 04:26:16.309 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-26 04:26:16.313 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-26 04:26:16.313 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-26 04:26:16.314 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-26 04:26:16.314 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-26 04:26:16.391  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-26 04:26:16.392  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-26 04:26:16.392 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-26 04:26:16.392 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-26 04:26:16.393  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-26 04:26:16.393  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-26 04:26:16.394 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-26 04:26:16.394 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-26 04:26:16.394 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-26 04:26:16.395 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-26 04:26:16.395 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-26 04:26:16.395 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-26 04:26:16.396 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-26 04:26:16.396 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-26 04:26:16.396 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-26 04:26:16.397 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-26 04:26:16.399 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 651068095874550526366303973738960976074636226539
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu May 26 02:22:10 UTC 2022
           Final Date: Tue May 25 02:22:09 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [27:6f:f7:53:c0:ec:ac:96:53:cb:6e:2f:98:f6:1d:0f:14:41:8a:c4]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 24d5afa0cc5b5a2728fec1931a97a9e4649b231a
                       cafe00fc771b822ff9651707b7b69ddbd26e7410
                       5d862952b7168f295729bb9cc813e828bd0cba74
                       0ee67e21dc07b4ed8257036fbd06151df80f61ec
                       cfd5d85ea1f4b560786acc6ae23d0d36921074b6
                       1ca0a8a359b165450efc0e914718a367b67b0812
                       4acc2dc692aadaea6c361bd329bc3c6f2d89f4b3
                       ef53c5b61b124f43890afa90bd02d5b0590d6ea8
                       fc344bbdb78a99f21c26ead662a7667465978021
                       dbc24255248b91ed3818d0080b50de3509672e52
                       81670ab01fd20d358bc0bdbb11c7aee2f02756b9
                       9e75785620329f42819815db50f795d6e4f4b8d9
                       598b4392242eef21df18cd66d97d59d01de339a4
                       97e5bd659d2741e83355da3663f8955567b273b1
                       03c114efcde72bf3ed2c3451ea33bb982037f964
                       1aab1a1a270dc2b8d794b76566464f151f45d2e2
                       239a9c59c0ade11c08c6c6df3b276f28937a19d3
                       e93597750e41f905790beb4b6ab4f74bffba9c5d
                       e0a79271dddaae29542ff49a440fecdc53bbc76b
                       ba94b25e
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [c7:34:ad:db:b0:34:cb:bf:2b:02:e3:05:8b:58:c5:e2:ba:c3:aa:7b]
            modulus: a71602eba9948e5ce45dea0da36f27c084a491c82eba088fa697b13697ef87ed90e0bc57e078515ef61a2ae5b1e54b17b6c418ab2bfa4229f3d375cfc28b8e0559000dccdb71f9ff10f30b149dc769abcfd03ba3b29c0de9e04e15fdd8af6762f34be0bcca4962df0a5fa47b3c37080d8494335afbfdefc66fc9acec7b49b871da3cfcd16c4bf87c361406193923b1a722cfef77e755b64132466f487223a0693753f040dd73fd7778eca9788f54eba4bf9beeda7ab8075fda2fe78ade653cb76d4e65a6448620aaf405e9ceb53f81e8604735789d33261f848392d8d83e441bce0521472865ff790cdeac7b504dda9ba119fd22d899455993c875ceacaeaf31
    public exponent: 10001

] 
2022-05-26 04:27:43.934  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-26 04:27:43.935 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-26 04:27:43.937 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-05-26 04:27:43.937 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-26 04:27:43.938  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-05-26 04:27:43.938  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-26 04:27:43.938  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-26 04:27:43.939 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-26 04:27:43.939 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-26 04:27:43.939 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-26 04:27:43.944 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-26 04:27:43.944 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-26 04:27:43.944 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-26 04:27:43.944 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-26 04:27:44.044  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-26 04:27:44.045  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-26 04:27:44.045 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-26 04:27:44.045 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-26 04:27:44.050  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-26 04:27:44.050  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-26 04:27:44.051 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-26 04:27:44.051 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-26 04:27:44.051 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-26 04:27:44.052 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-26 04:27:44.052 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-26 04:27:44.052 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-26 04:27:44.053 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-26 04:27:44.053 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-26 04:27:44.053 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-26 04:27:44.054 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-26 04:27:44.058 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 651068095874550526366303973738960976074636226539
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu May 26 02:22:10 UTC 2022
           Final Date: Tue May 25 02:22:09 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [27:6f:f7:53:c0:ec:ac:96:53:cb:6e:2f:98:f6:1d:0f:14:41:8a:c4]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 24d5afa0cc5b5a2728fec1931a97a9e4649b231a
                       cafe00fc771b822ff9651707b7b69ddbd26e7410
                       5d862952b7168f295729bb9cc813e828bd0cba74
                       0ee67e21dc07b4ed8257036fbd06151df80f61ec
                       cfd5d85ea1f4b560786acc6ae23d0d36921074b6
                       1ca0a8a359b165450efc0e914718a367b67b0812
                       4acc2dc692aadaea6c361bd329bc3c6f2d89f4b3
                       ef53c5b61b124f43890afa90bd02d5b0590d6ea8
                       fc344bbdb78a99f21c26ead662a7667465978021
                       dbc24255248b91ed3818d0080b50de3509672e52
                       81670ab01fd20d358bc0bdbb11c7aee2f02756b9
                       9e75785620329f42819815db50f795d6e4f4b8d9
                       598b4392242eef21df18cd66d97d59d01de339a4
                       97e5bd659d2741e83355da3663f8955567b273b1
                       03c114efcde72bf3ed2c3451ea33bb982037f964
                       1aab1a1a270dc2b8d794b76566464f151f45d2e2
                       239a9c59c0ade11c08c6c6df3b276f28937a19d3
                       e93597750e41f905790beb4b6ab4f74bffba9c5d
                       e0a79271dddaae29542ff49a440fecdc53bbc76b
                       ba94b25e
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [7d:49:4c:d0:21:44:96:e8:f5:69:e3:aa:37:4f:48:84:6d:5c:a3:de]
            modulus: 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
    public exponent: 10001

] 
2022-05-26 04:31:51.328  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-26 04:31:51.329 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-26 04:31:51.330 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-26 04:31:51.331 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-26 04:31:51.331  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-26 04:31:51.331  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-26 04:31:51.332  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-26 04:31:51.332 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-26 04:31:51.332 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-26 04:31:51.332 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-26 04:31:51.336 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-26 04:31:51.337 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-26 04:31:51.337 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-26 04:31:51.337 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-26 04:31:51.421  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-26 04:31:51.422  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-26 04:31:51.422 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-26 04:31:51.422 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-26 04:31:51.423  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-26 04:31:51.423  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-26 04:31:51.423 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-26 04:31:51.423 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-26 04:31:51.424 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-26 04:31:51.424 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-26 04:31:51.424 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-26 04:31:51.424 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-26 04:31:51.425 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-26 04:31:51.425 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-26 04:31:51.425 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-26 04:31:51.426 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-26 04:31:51.428 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 651068095874550526366303973738960976074636226539
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu May 26 02:22:10 UTC 2022
           Final Date: Tue May 25 02:22:09 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [27:6f:f7:53:c0:ec:ac:96:53:cb:6e:2f:98:f6:1d:0f:14:41:8a:c4]
            modulus: d80d96ec937d303d844d21336db4647ee7dbb27f19368ea00e7d8864fd6a2b2142cd3bbeb543d07e6e4479f32d2143c0f4329d7c4893134e4177ce69582b572e0af6e24a0d767cc68bd5cd4e986b6131dfe8248db863822bc933036b0ae291f9d89e73792434006346a33ec6151bd75bd2324311e3e7bdd979fcf93cb4fea05d2a0a9ddef806a17dcc445a45239289621f5931afe4caa3c4e873b20517d156a2062b039b70d8b0a0d0497e3252e1f01af29de2346b6c45f8f240b27934bfaad2cc4fe3ea7d06acfc1bedb75680e20ef3eefe1526791fa077a6bb6513eba55416640fe941484ac1583f7974ab0988f73b4aeea1e75bda2458b6552a5c31cb738be1457f6d09efb4331e26c19d294a3aee81cc84a8c5e3e407ebd608f01bb24822d065eb719f7d777b3842d996fe16082f0502d3709bf86d2f2642e0e0b514d97da7a95be854daf8d75a73864fc656b664fd4df8d6c40431db2a8b8080add733bb50157e209454193c14d95a5b10886eca2a0453defd19c00bdec7d39def8a7471
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 24d5afa0cc5b5a2728fec1931a97a9e4649b231a
                       cafe00fc771b822ff9651707b7b69ddbd26e7410
                       5d862952b7168f295729bb9cc813e828bd0cba74
                       0ee67e21dc07b4ed8257036fbd06151df80f61ec
                       cfd5d85ea1f4b560786acc6ae23d0d36921074b6
                       1ca0a8a359b165450efc0e914718a367b67b0812
                       4acc2dc692aadaea6c361bd329bc3c6f2d89f4b3
                       ef53c5b61b124f43890afa90bd02d5b0590d6ea8
                       fc344bbdb78a99f21c26ead662a7667465978021
                       dbc24255248b91ed3818d0080b50de3509672e52
                       81670ab01fd20d358bc0bdbb11c7aee2f02756b9
                       9e75785620329f42819815db50f795d6e4f4b8d9
                       598b4392242eef21df18cd66d97d59d01de339a4
                       97e5bd659d2741e83355da3663f8955567b273b1
                       03c114efcde72bf3ed2c3451ea33bb982037f964
                       1aab1a1a270dc2b8d794b76566464f151f45d2e2
                       239a9c59c0ade11c08c6c6df3b276f28937a19d3
                       e93597750e41f905790beb4b6ab4f74bffba9c5d
                       e0a79271dddaae29542ff49a440fecdc53bbc76b
                       ba94b25e
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [88:ec:e5:67:73:6c:1b:d3:ea:18:54:ac:0f:77:cd:ef:ce:87:87:3f]
            modulus: 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
    public exponent: 10001

]