Results

By type

          2022-12-02 11:19:27,481 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-12-02 11:19:28,660 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-12-02 11:19:29.421  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Dec 02, 2022 11:19:31 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Dec 02, 2022 11:19:31 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Dec 02, 2022 11:19:31 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Dec 02, 2022 11:19:31 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-12-02 11:19:32.396 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-12-02 11:19:32.729  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-12-02 11:19:32.917  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-12-02 11:19:33.749 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-12-02 11:19:33.751 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
2022-12-02 11:19:33.753 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-12-02 11:19:33.757 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-12-02 11:19:33.798 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2022-12-02 11:19:33.802 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/docs]}: redirectToUi(HttpServletRequest)
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
2022-12-02 11:19:33.934 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-12-02 11:19:34.710 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Dec 02, 2022 11:19:35 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-12-02 11:19:35.800  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 9.373 seconds (JVM running for 11.322)
Dec 02, 2022 11:20:01 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-12-02 11:20:23.283  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-02 11:20:23.292 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-02 11:20:23.338 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-12-02 11:20:23.342 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-02 11:20:23.359  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-12-02 11:20:23.362  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-02 11:20:23.363  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-02 11:20:23.364 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-02 11:20:23.364 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-02 11:20:23.368 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-02 11:20:23.378 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-02 11:20:23.384 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-02 11:20:23.448 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-02 11:20:23.454 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-02 11:20:23.454 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-02 11:20:23.457 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-02 11:20:24.023  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-02 11:20:24.027  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-02 11:20:24.028 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-02 11:20:24.030 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-02 11:20:24.040  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-02 11:20:24.042  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-02 11:20:24.043 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-02 11:20:24.043 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-02 11:20:24.044 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-02 11:20:24.058 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-02 11:20:24.059 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-02 11:20:24.059 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-02 11:20:24.065 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-02 11:20:24.066 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-02 11:20:24.066 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-02 11:20:24.068 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-02 11:20:24.099 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 457967233527840419901672367260100663139390335334
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Dec 02 11:17:05 UTC 2022
           Final Date: Wed Dec 01 11:17:04 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [9f:14:88:d5:19:94:1f:0e:44:7f:9b:44:7d:f4:ff:b2:b9:a0:64:82],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 9c479f0b6956894e00cbd74ed95e0c9f7c04ad28
                       dd29f65d05720978431235b1e16aea87e346d32f
                       812aeeea5c93cd4b731399e6e9bddf583357f60f
                       78c94cd3842091533643ea8a185624ad0094ffcf
                       208a97766948e23876116c11a322bba7f8f8a882
                       fe8c0dfadbc40b0b3a17d2001ec218282a3516bb
                       0d7323e186a3aafa519394abfe606b09ed0e0c22
                       463605c68233de9f79eab30e21a37657d7ca88a1
                       e84dd940fc29ea72089e5a421533f3e41bbe9b3d
                       1c5e79ff3bfb39e17c723517dc32789552f96b21
                       8952c7f46878f4fa7676f4bd7818d213a980a0e3
                       32561f383cbc879dfe552eb65e7608f3bbdaa99c
                       24af81a7cf13b064a33e565e31ad716bf2c1ed86
                       2d9194123cdb60ed3c810d6da67591fbff0550f3
                       95cbd5393297cf3bc312962eb7ba12498ac207cc
                       abb040742dd7ff73fcec6ad0206508a759c669d3
                       44264427a154daa18dc89e3769f773007746234a
                       f75c9bc065170bc1dc891af628553495900f007f
                       96b090eeeb3c94f2d096f3edb984d80543139a44
                       4d60fe49
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [55:b7:dd:60:68:33:60:53:96:4a:ed:01:78:28:ea:f0:f1:ce:31:ae],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-12-02 17:21:04.786  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-02 17:21:04.794 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-02 17:21:04.799 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-12-02 17:21:04.800 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-02 17:21:04.801  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-12-02 17:21:04.804  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-02 17:21:04.805  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-02 17:21:04.806 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-02 17:21:04.809 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-02 17:21:04.809 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-02 17:21:04.823 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-02 17:21:04.827 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-02 17:21:04.828 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-02 17:21:04.829 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-02 17:21:05.061  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-02 17:21:05.063  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-02 17:21:05.063 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-02 17:21:05.064 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-02 17:21:05.068  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-02 17:21:05.069  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-02 17:21:05.070 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-02 17:21:05.071 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-02 17:21:05.071 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-02 17:21:05.073 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-02 17:21:05.074 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-02 17:21:05.075 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-02 17:21:05.077 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-02 17:21:05.078 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-02 17:21:05.078 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-02 17:21:05.080 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-02 17:21:05.086 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 457967233527840419901672367260100663139390335334
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Dec 02 11:17:05 UTC 2022
           Final Date: Wed Dec 01 11:17:04 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [9f:14:88:d5:19:94:1f:0e:44:7f:9b:44:7d:f4:ff:b2:b9:a0:64:82],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 9c479f0b6956894e00cbd74ed95e0c9f7c04ad28
                       dd29f65d05720978431235b1e16aea87e346d32f
                       812aeeea5c93cd4b731399e6e9bddf583357f60f
                       78c94cd3842091533643ea8a185624ad0094ffcf
                       208a97766948e23876116c11a322bba7f8f8a882
                       fe8c0dfadbc40b0b3a17d2001ec218282a3516bb
                       0d7323e186a3aafa519394abfe606b09ed0e0c22
                       463605c68233de9f79eab30e21a37657d7ca88a1
                       e84dd940fc29ea72089e5a421533f3e41bbe9b3d
                       1c5e79ff3bfb39e17c723517dc32789552f96b21
                       8952c7f46878f4fa7676f4bd7818d213a980a0e3
                       32561f383cbc879dfe552eb65e7608f3bbdaa99c
                       24af81a7cf13b064a33e565e31ad716bf2c1ed86
                       2d9194123cdb60ed3c810d6da67591fbff0550f3
                       95cbd5393297cf3bc312962eb7ba12498ac207cc
                       abb040742dd7ff73fcec6ad0206508a759c669d3
                       44264427a154daa18dc89e3769f773007746234a
                       f75c9bc065170bc1dc891af628553495900f007f
                       96b090eeeb3c94f2d096f3edb984d80543139a44
                       4d60fe49
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [63:d7:bc:f9:42:3a:fe:ef:0c:10:6b:f1:c6:10:dd:31:22:9d:db:4b],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-12-02 17:22:42.181  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-02 17:22:42.182 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-02 17:22:42.185 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-12-02 17:22:42.185 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-02 17:22:42.186  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-12-02 17:22:42.186  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-02 17:22:42.187  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-02 17:22:42.187 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-02 17:22:42.188 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-02 17:22:42.191 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-02 17:22:42.202 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-02 17:22:42.203 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-02 17:22:42.203 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-02 17:22:42.204 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-02 17:22:42.365  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-02 17:22:42.367  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-02 17:22:42.367 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-02 17:22:42.368 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-02 17:22:42.371  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-02 17:22:42.372  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-02 17:22:42.372 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-02 17:22:42.373 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-02 17:22:42.373 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-02 17:22:42.374 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-02 17:22:42.375 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-02 17:22:42.375 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-02 17:22:42.376 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-02 17:22:42.377 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-02 17:22:42.377 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-02 17:22:42.378 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-02 17:22:42.382 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 457967233527840419901672367260100663139390335334
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Dec 02 11:17:05 UTC 2022
           Final Date: Wed Dec 01 11:17:04 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [9f:14:88:d5:19:94:1f:0e:44:7f:9b:44:7d:f4:ff:b2:b9:a0:64:82],[56:66:d1:a4]
        modulus: b88be0dfe1c383d41a52559bdea2d80cdff4a48b7a9c7c86381126b33629252bf9aa8f00a9ace56a73c0e9e5500f595c7ed2228160b81f8de61e9b09efe8825cb0d502194555f25b904a7c81537f9f55043013bc6fea2f26c677d8c2f593d3e5a4cd07db4b68e1fec77e0c009f384bdc1b206d637dc0b32bb569ab33d98ee3d7c4d39bf533752e193440f34408d2a361e71bef3d06ec2a8f157e7fc35902bdd2a15b59f4cdf3107d6e53235b2bf3d6e88270f3c7d9fa36bd57bd7f900335f1bf0fe8ca0131debef11218dc56a59147bf9a896e0c3a0d32a947daa1a2214829e987502790573214abea0bead3f5d46989e2c584d00e409856d2bfd7d25ae142bf586fb828805c4a29b058fbfaa15d5a29cf15aa3ea7bfce68e95d6fcf6c3ddbcaee79e9d5119c80791248fdbba4e51a3293415f41e120bcc1a00ee9b017845f9cc59ce1d0d7ba5f8930eda10e374da6987b56fd2a2206802ab127bcded5367a66e55390aa694e7ba7ef85977b80b2cd6553d7a608fc1b00c8540315bd6720624b
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 9c479f0b6956894e00cbd74ed95e0c9f7c04ad28
                       dd29f65d05720978431235b1e16aea87e346d32f
                       812aeeea5c93cd4b731399e6e9bddf583357f60f
                       78c94cd3842091533643ea8a185624ad0094ffcf
                       208a97766948e23876116c11a322bba7f8f8a882
                       fe8c0dfadbc40b0b3a17d2001ec218282a3516bb
                       0d7323e186a3aafa519394abfe606b09ed0e0c22
                       463605c68233de9f79eab30e21a37657d7ca88a1
                       e84dd940fc29ea72089e5a421533f3e41bbe9b3d
                       1c5e79ff3bfb39e17c723517dc32789552f96b21
                       8952c7f46878f4fa7676f4bd7818d213a980a0e3
                       32561f383cbc879dfe552eb65e7608f3bbdaa99c
                       24af81a7cf13b064a33e565e31ad716bf2c1ed86
                       2d9194123cdb60ed3c810d6da67591fbff0550f3
                       95cbd5393297cf3bc312962eb7ba12498ac207cc
                       abb040742dd7ff73fcec6ad0206508a759c669d3
                       44264427a154daa18dc89e3769f773007746234a
                       f75c9bc065170bc1dc891af628553495900f007f
                       96b090eeeb3c94f2d096f3edb984d80543139a44
                       4d60fe49
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [e5:fe:52:84:66:65:64:cd:35:5b:a7:d9:8f:92:b9:3e:a8:d0:78:db],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-12-02 17:24:28.880  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-02 17:24:28.882 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-02 17:24:28.883 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-12-02 17:24:28.884 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-02 17:24:28.884  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-12-02 17:24:28.885  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-02 17:24:28.885  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-02 17:24:28.885 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-02 17:24:28.886 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-02 17:24:28.886 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-02 17:24:28.890 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-02 17:24:28.890 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-02 17:24:28.891 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-02 17:24:28.891 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-02 17:24:29.025  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-02 17:24:29.025  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-02 17:24:29.026 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-02 17:24:29.026 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-02 17:24:29.028  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-02 17:24:29.028  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-02 17:24:29.029 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-02 17:24:29.029 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-02 17:24:29.030 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-02 17:24:29.030 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-02 17:24:29.031 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-02 17:24:29.031 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-02 17:24:29.032 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-02 17:24:29.032 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-02 17:24:29.032 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-02 17:24:29.033 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-02 17:24:29.037 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 457967233527840419901672367260100663139390335334
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Dec 02 11:17:05 UTC 2022
           Final Date: Wed Dec 01 11:17:04 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [9f:14:88:d5:19:94:1f:0e:44:7f:9b:44:7d:f4:ff:b2:b9:a0:64:82],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 9c479f0b6956894e00cbd74ed95e0c9f7c04ad28
                       dd29f65d05720978431235b1e16aea87e346d32f
                       812aeeea5c93cd4b731399e6e9bddf583357f60f
                       78c94cd3842091533643ea8a185624ad0094ffcf
                       208a97766948e23876116c11a322bba7f8f8a882
                       fe8c0dfadbc40b0b3a17d2001ec218282a3516bb
                       0d7323e186a3aafa519394abfe606b09ed0e0c22
                       463605c68233de9f79eab30e21a37657d7ca88a1
                       e84dd940fc29ea72089e5a421533f3e41bbe9b3d
                       1c5e79ff3bfb39e17c723517dc32789552f96b21
                       8952c7f46878f4fa7676f4bd7818d213a980a0e3
                       32561f383cbc879dfe552eb65e7608f3bbdaa99c
                       24af81a7cf13b064a33e565e31ad716bf2c1ed86
                       2d9194123cdb60ed3c810d6da67591fbff0550f3
                       95cbd5393297cf3bc312962eb7ba12498ac207cc
                       abb040742dd7ff73fcec6ad0206508a759c669d3
                       44264427a154daa18dc89e3769f773007746234a
                       f75c9bc065170bc1dc891af628553495900f007f
                       96b090eeeb3c94f2d096f3edb984d80543139a44
                       4d60fe49
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [e6:a7:83:dd:6b:27:47:16:75:49:34:23:93:c7:e5:7f:00:e6:f0:06],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-12-02 17:27:09.188  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-02 17:27:09.192 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-02 17:27:09.195 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-12-02 17:27:09.197 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-02 17:27:09.197  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-12-02 17:27:09.198  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-02 17:27:09.200  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-02 17:27:09.202 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-02 17:27:09.202 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-02 17:27:09.203 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-02 17:27:09.209 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-02 17:27:09.210 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-02 17:27:09.211 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-02 17:27:09.212 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-02 17:27:09.348  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-02 17:27:09.349  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-02 17:27:09.349 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-02 17:27:09.349 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-02 17:27:09.351  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-02 17:27:09.351  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-02 17:27:09.352 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-02 17:27:09.352 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-02 17:27:09.352 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-02 17:27:09.353 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-02 17:27:09.354 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-02 17:27:09.354 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-02 17:27:09.355 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-02 17:27:09.355 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-02 17:27:09.356 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-02 17:27:09.357 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-02 17:27:09.362 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 457967233527840419901672367260100663139390335334
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Dec 02 11:17:05 UTC 2022
           Final Date: Wed Dec 01 11:17:04 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [9f:14:88:d5:19:94:1f:0e:44:7f:9b:44:7d:f4:ff:b2:b9:a0:64:82],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 9c479f0b6956894e00cbd74ed95e0c9f7c04ad28
                       dd29f65d05720978431235b1e16aea87e346d32f
                       812aeeea5c93cd4b731399e6e9bddf583357f60f
                       78c94cd3842091533643ea8a185624ad0094ffcf
                       208a97766948e23876116c11a322bba7f8f8a882
                       fe8c0dfadbc40b0b3a17d2001ec218282a3516bb
                       0d7323e186a3aafa519394abfe606b09ed0e0c22
                       463605c68233de9f79eab30e21a37657d7ca88a1
                       e84dd940fc29ea72089e5a421533f3e41bbe9b3d
                       1c5e79ff3bfb39e17c723517dc32789552f96b21
                       8952c7f46878f4fa7676f4bd7818d213a980a0e3
                       32561f383cbc879dfe552eb65e7608f3bbdaa99c
                       24af81a7cf13b064a33e565e31ad716bf2c1ed86
                       2d9194123cdb60ed3c810d6da67591fbff0550f3
                       95cbd5393297cf3bc312962eb7ba12498ac207cc
                       abb040742dd7ff73fcec6ad0206508a759c669d3
                       44264427a154daa18dc89e3769f773007746234a
                       f75c9bc065170bc1dc891af628553495900f007f
                       96b090eeeb3c94f2d096f3edb984d80543139a44
                       4d60fe49
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [da:eb:48:fd:7e:c9:90:15:3c:4e:e7:19:82:2d:f3:cd:85:0e:27:2c],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-12-02 17:35:14.300  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-02 17:35:14.303 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-02 17:35:14.305 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-12-02 17:35:14.306 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-02 17:35:14.307  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-12-02 17:35:14.307  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-02 17:35:14.308  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-02 17:35:14.308 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-02 17:35:14.309 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-02 17:35:14.309 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-02 17:35:14.315 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-02 17:35:14.316 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-02 17:35:14.316 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-02 17:35:14.317 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-02 17:35:14.468  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-02 17:35:14.469  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-02 17:35:14.469 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-02 17:35:14.470 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-02 17:35:14.471  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-02 17:35:14.472  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-02 17:35:14.472 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-02 17:35:14.473 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-02 17:35:14.473 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-02 17:35:14.474 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-02 17:35:14.474 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-02 17:35:14.474 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-02 17:35:14.475 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-02 17:35:14.475 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-02 17:35:14.476 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-02 17:35:14.476 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-02 17:35:14.480 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 457967233527840419901672367260100663139390335334
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Dec 02 11:17:05 UTC 2022
           Final Date: Wed Dec 01 11:17:04 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [9f:14:88:d5:19:94:1f:0e:44:7f:9b:44:7d:f4:ff:b2:b9:a0:64:82],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 9c479f0b6956894e00cbd74ed95e0c9f7c04ad28
                       dd29f65d05720978431235b1e16aea87e346d32f
                       812aeeea5c93cd4b731399e6e9bddf583357f60f
                       78c94cd3842091533643ea8a185624ad0094ffcf
                       208a97766948e23876116c11a322bba7f8f8a882
                       fe8c0dfadbc40b0b3a17d2001ec218282a3516bb
                       0d7323e186a3aafa519394abfe606b09ed0e0c22
                       463605c68233de9f79eab30e21a37657d7ca88a1
                       e84dd940fc29ea72089e5a421533f3e41bbe9b3d
                       1c5e79ff3bfb39e17c723517dc32789552f96b21
                       8952c7f46878f4fa7676f4bd7818d213a980a0e3
                       32561f383cbc879dfe552eb65e7608f3bbdaa99c
                       24af81a7cf13b064a33e565e31ad716bf2c1ed86
                       2d9194123cdb60ed3c810d6da67591fbff0550f3
                       95cbd5393297cf3bc312962eb7ba12498ac207cc
                       abb040742dd7ff73fcec6ad0206508a759c669d3
                       44264427a154daa18dc89e3769f773007746234a
                       f75c9bc065170bc1dc891af628553495900f007f
                       96b090eeeb3c94f2d096f3edb984d80543139a44
                       4d60fe49
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [e0:1e:0c:cd:34:80:6d:60:9b:0f:f1:f2:5d:0f:09:83:b0:4e:8a:30],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-12-02 17:41:43.430  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-02 17:41:43.434 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-02 17:41:43.437 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-12-02 17:41:43.438 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-02 17:41:43.438  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-12-02 17:41:43.447  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-02 17:41:43.447  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-02 17:41:43.452 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-02 17:41:43.453 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-02 17:41:43.454 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-02 17:41:43.460 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-02 17:41:43.461 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-02 17:41:43.462 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-02 17:41:43.462 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-02 17:41:43.579  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-02 17:41:43.580  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-02 17:41:43.581 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-02 17:41:43.581 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-02 17:41:43.583  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-02 17:41:43.584  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-02 17:41:43.587 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-02 17:41:43.587 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-02 17:41:43.588 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-02 17:41:43.589 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-02 17:41:43.589 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-02 17:41:43.590 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-02 17:41:43.592 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-02 17:41:43.592 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-02 17:41:43.593 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-02 17:41:43.593 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-02 17:41:43.597 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 457967233527840419901672367260100663139390335334
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Dec 02 11:17:05 UTC 2022
           Final Date: Wed Dec 01 11:17:04 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [9f:14:88:d5:19:94:1f:0e:44:7f:9b:44:7d:f4:ff:b2:b9:a0:64:82],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 9c479f0b6956894e00cbd74ed95e0c9f7c04ad28
                       dd29f65d05720978431235b1e16aea87e346d32f
                       812aeeea5c93cd4b731399e6e9bddf583357f60f
                       78c94cd3842091533643ea8a185624ad0094ffcf
                       208a97766948e23876116c11a322bba7f8f8a882
                       fe8c0dfadbc40b0b3a17d2001ec218282a3516bb
                       0d7323e186a3aafa519394abfe606b09ed0e0c22
                       463605c68233de9f79eab30e21a37657d7ca88a1
                       e84dd940fc29ea72089e5a421533f3e41bbe9b3d
                       1c5e79ff3bfb39e17c723517dc32789552f96b21
                       8952c7f46878f4fa7676f4bd7818d213a980a0e3
                       32561f383cbc879dfe552eb65e7608f3bbdaa99c
                       24af81a7cf13b064a33e565e31ad716bf2c1ed86
                       2d9194123cdb60ed3c810d6da67591fbff0550f3
                       95cbd5393297cf3bc312962eb7ba12498ac207cc
                       abb040742dd7ff73fcec6ad0206508a759c669d3
                       44264427a154daa18dc89e3769f773007746234a
                       f75c9bc065170bc1dc891af628553495900f007f
                       96b090eeeb3c94f2d096f3edb984d80543139a44
                       4d60fe49
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [6f:ef:bf:48:56:79:7b:0c:4a:5f:ed:e9:39:99:d4:8c:df:23:f5:a3],[56:66:d1:a4]
        modulus: a1f8ca47ec36947972ab06fbc0933a284f95a1990f282fa7986da6237d4d4e918f098426b3f942dee0ccea15a4a04786f1035e38a32d8a4ad2ac88f657cbb4c764c7953c24e4a98a38c0396c088d353599d290682dd1391ca138c626fa3a485f7f53b6aad5a4532c5c8f73b1e427213885180e33df08b61db592c833269c770938ce9148470fa885f1b1012cd477fff7f389da6a4bd84f7243d9872c8e6cc2ad16f762e9ed65614625824e2d93bf5652e47dc3cfd948cc642e61ab8a545ef2c1dd03c84d40e1fecbc67243da8df3c933ce2a9ee38f9155b4d7ce1c2138d9759fa03c8eb7a7795e7e606473f2d401bc5d9b655666bff7b5203eaf8d6c254614a9
public exponent: 10001

] 
2022-12-02 17:48:49.082  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-02 17:48:49.086 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-02 17:48:49.089 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-12-02 17:48:49.090 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-02 17:48:49.090  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-12-02 17:48:49.091  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-02 17:48:49.091  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-02 17:48:49.092 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-02 17:48:49.092 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-02 17:48:49.093 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-02 17:48:49.097 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-02 17:48:49.098 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-02 17:48:49.098 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-02 17:48:49.098 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-02 17:48:49.279  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-02 17:48:49.280  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-02 17:48:49.280 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-02 17:48:49.281 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-02 17:48:49.282  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-02 17:48:49.283  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-02 17:48:49.283 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-02 17:48:49.284 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-02 17:48:49.284 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-02 17:48:49.285 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-02 17:48:49.285 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-02 17:48:49.286 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-02 17:48:49.287 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-02 17:48:49.287 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-02 17:48:49.287 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-02 17:48:49.288 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-02 17:48:49.293 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 457967233527840419901672367260100663139390335334
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Dec 02 11:17:05 UTC 2022
           Final Date: Wed Dec 01 11:17:04 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [9f:14:88:d5:19:94:1f:0e:44:7f:9b:44:7d:f4:ff:b2:b9:a0:64:82],[56:66:d1:a4]
        modulus: b88be0dfe1c383d41a52559bdea2d80cdff4a48b7a9c7c86381126b33629252bf9aa8f00a9ace56a73c0e9e5500f595c7ed2228160b81f8de61e9b09efe8825cb0d502194555f25b904a7c81537f9f55043013bc6fea2f26c677d8c2f593d3e5a4cd07db4b68e1fec77e0c009f384bdc1b206d637dc0b32bb569ab33d98ee3d7c4d39bf533752e193440f34408d2a361e71bef3d06ec2a8f157e7fc35902bdd2a15b59f4cdf3107d6e53235b2bf3d6e88270f3c7d9fa36bd57bd7f900335f1bf0fe8ca0131debef11218dc56a59147bf9a896e0c3a0d32a947daa1a2214829e987502790573214abea0bead3f5d46989e2c584d00e409856d2bfd7d25ae142bf586fb828805c4a29b058fbfaa15d5a29cf15aa3ea7bfce68e95d6fcf6c3ddbcaee79e9d5119c80791248fdbba4e51a3293415f41e120bcc1a00ee9b017845f9cc59ce1d0d7ba5f8930eda10e374da6987b56fd2a2206802ab127bcded5367a66e55390aa694e7ba7ef85977b80b2cd6553d7a608fc1b00c8540315bd6720624b
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 9c479f0b6956894e00cbd74ed95e0c9f7c04ad28
                       dd29f65d05720978431235b1e16aea87e346d32f
                       812aeeea5c93cd4b731399e6e9bddf583357f60f
                       78c94cd3842091533643ea8a185624ad0094ffcf
                       208a97766948e23876116c11a322bba7f8f8a882
                       fe8c0dfadbc40b0b3a17d2001ec218282a3516bb
                       0d7323e186a3aafa519394abfe606b09ed0e0c22
                       463605c68233de9f79eab30e21a37657d7ca88a1
                       e84dd940fc29ea72089e5a421533f3e41bbe9b3d
                       1c5e79ff3bfb39e17c723517dc32789552f96b21
                       8952c7f46878f4fa7676f4bd7818d213a980a0e3
                       32561f383cbc879dfe552eb65e7608f3bbdaa99c
                       24af81a7cf13b064a33e565e31ad716bf2c1ed86
                       2d9194123cdb60ed3c810d6da67591fbff0550f3
                       95cbd5393297cf3bc312962eb7ba12498ac207cc
                       abb040742dd7ff73fcec6ad0206508a759c669d3
                       44264427a154daa18dc89e3769f773007746234a
                       f75c9bc065170bc1dc891af628553495900f007f
                       96b090eeeb3c94f2d096f3edb984d80543139a44
                       4d60fe49
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [3a:8b:70:e2:0f:82:73:94:82:c8:33:15:23:3b:4d:00:ac:43:91:50],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-12-02 17:54:02.256  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-02 17:54:02.260 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-02 17:54:02.263 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-12-02 17:54:02.265 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-02 17:54:02.265  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-12-02 17:54:02.266  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-02 17:54:02.266  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-02 17:54:02.267 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-02 17:54:02.267 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-02 17:54:02.268 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-02 17:54:02.273 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-02 17:54:02.275 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-02 17:54:02.275 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-02 17:54:02.275 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-02 17:54:02.423  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-02 17:54:02.424  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-02 17:54:02.424 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-02 17:54:02.425 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-02 17:54:02.427  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-02 17:54:02.428  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-02 17:54:02.430 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-02 17:54:02.431 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-02 17:54:02.432 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-02 17:54:02.436 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-02 17:54:02.437 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-02 17:54:02.437 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-02 17:54:02.439 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-02 17:54:02.440 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-02 17:54:02.441 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-02 17:54:02.442 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-02 17:54:02.450 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 457967233527840419901672367260100663139390335334
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Dec 02 11:17:05 UTC 2022
           Final Date: Wed Dec 01 11:17:04 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [9f:14:88:d5:19:94:1f:0e:44:7f:9b:44:7d:f4:ff:b2:b9:a0:64:82],[56:66:d1:a4]
        modulus: b88be0dfe1c383d41a52559bdea2d80cdff4a48b7a9c7c86381126b33629252bf9aa8f00a9ace56a73c0e9e5500f595c7ed2228160b81f8de61e9b09efe8825cb0d502194555f25b904a7c81537f9f55043013bc6fea2f26c677d8c2f593d3e5a4cd07db4b68e1fec77e0c009f384bdc1b206d637dc0b32bb569ab33d98ee3d7c4d39bf533752e193440f34408d2a361e71bef3d06ec2a8f157e7fc35902bdd2a15b59f4cdf3107d6e53235b2bf3d6e88270f3c7d9fa36bd57bd7f900335f1bf0fe8ca0131debef11218dc56a59147bf9a896e0c3a0d32a947daa1a2214829e987502790573214abea0bead3f5d46989e2c584d00e409856d2bfd7d25ae142bf586fb828805c4a29b058fbfaa15d5a29cf15aa3ea7bfce68e95d6fcf6c3ddbcaee79e9d5119c80791248fdbba4e51a3293415f41e120bcc1a00ee9b017845f9cc59ce1d0d7ba5f8930eda10e374da6987b56fd2a2206802ab127bcded5367a66e55390aa694e7ba7ef85977b80b2cd6553d7a608fc1b00c8540315bd6720624b
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 9c479f0b6956894e00cbd74ed95e0c9f7c04ad28
                       dd29f65d05720978431235b1e16aea87e346d32f
                       812aeeea5c93cd4b731399e6e9bddf583357f60f
                       78c94cd3842091533643ea8a185624ad0094ffcf
                       208a97766948e23876116c11a322bba7f8f8a882
                       fe8c0dfadbc40b0b3a17d2001ec218282a3516bb
                       0d7323e186a3aafa519394abfe606b09ed0e0c22
                       463605c68233de9f79eab30e21a37657d7ca88a1
                       e84dd940fc29ea72089e5a421533f3e41bbe9b3d
                       1c5e79ff3bfb39e17c723517dc32789552f96b21
                       8952c7f46878f4fa7676f4bd7818d213a980a0e3
                       32561f383cbc879dfe552eb65e7608f3bbdaa99c
                       24af81a7cf13b064a33e565e31ad716bf2c1ed86
                       2d9194123cdb60ed3c810d6da67591fbff0550f3
                       95cbd5393297cf3bc312962eb7ba12498ac207cc
                       abb040742dd7ff73fcec6ad0206508a759c669d3
                       44264427a154daa18dc89e3769f773007746234a
                       f75c9bc065170bc1dc891af628553495900f007f
                       96b090eeeb3c94f2d096f3edb984d80543139a44
                       4d60fe49
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [08:27:f4:4d:ca:c6:44:83:2f:3a:4b:f8:54:cc:63:fd:d0:97:67:00],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-12-02 18:01:40.611  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-02 18:01:40.612 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-02 18:01:40.614 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-12-02 18:01:40.615 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-02 18:01:40.615  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-12-02 18:01:40.616  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-02 18:01:40.616  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-02 18:01:40.618 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-02 18:01:40.618 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-02 18:01:40.619 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-02 18:01:40.627 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-02 18:01:40.628 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-02 18:01:40.628 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-02 18:01:40.629 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-02 18:01:40.804  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-02 18:01:40.804  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-02 18:01:40.805 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-02 18:01:40.805 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-02 18:01:40.806  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-02 18:01:40.807  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-02 18:01:40.807 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-02 18:01:40.807 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-02 18:01:40.807 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-02 18:01:40.808 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-02 18:01:40.809 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-02 18:01:40.809 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-02 18:01:40.809 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-02 18:01:40.810 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-02 18:01:40.810 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-02 18:01:40.811 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-02 18:01:40.814 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 457967233527840419901672367260100663139390335334
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Dec 02 11:17:05 UTC 2022
           Final Date: Wed Dec 01 11:17:04 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [9f:14:88:d5:19:94:1f:0e:44:7f:9b:44:7d:f4:ff:b2:b9:a0:64:82],[56:66:d1:a4]
        modulus: b88be0dfe1c383d41a52559bdea2d80cdff4a48b7a9c7c86381126b33629252bf9aa8f00a9ace56a73c0e9e5500f595c7ed2228160b81f8de61e9b09efe8825cb0d502194555f25b904a7c81537f9f55043013bc6fea2f26c677d8c2f593d3e5a4cd07db4b68e1fec77e0c009f384bdc1b206d637dc0b32bb569ab33d98ee3d7c4d39bf533752e193440f34408d2a361e71bef3d06ec2a8f157e7fc35902bdd2a15b59f4cdf3107d6e53235b2bf3d6e88270f3c7d9fa36bd57bd7f900335f1bf0fe8ca0131debef11218dc56a59147bf9a896e0c3a0d32a947daa1a2214829e987502790573214abea0bead3f5d46989e2c584d00e409856d2bfd7d25ae142bf586fb828805c4a29b058fbfaa15d5a29cf15aa3ea7bfce68e95d6fcf6c3ddbcaee79e9d5119c80791248fdbba4e51a3293415f41e120bcc1a00ee9b017845f9cc59ce1d0d7ba5f8930eda10e374da6987b56fd2a2206802ab127bcded5367a66e55390aa694e7ba7ef85977b80b2cd6553d7a608fc1b00c8540315bd6720624b
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 9c479f0b6956894e00cbd74ed95e0c9f7c04ad28
                       dd29f65d05720978431235b1e16aea87e346d32f
                       812aeeea5c93cd4b731399e6e9bddf583357f60f
                       78c94cd3842091533643ea8a185624ad0094ffcf
                       208a97766948e23876116c11a322bba7f8f8a882
                       fe8c0dfadbc40b0b3a17d2001ec218282a3516bb
                       0d7323e186a3aafa519394abfe606b09ed0e0c22
                       463605c68233de9f79eab30e21a37657d7ca88a1
                       e84dd940fc29ea72089e5a421533f3e41bbe9b3d
                       1c5e79ff3bfb39e17c723517dc32789552f96b21
                       8952c7f46878f4fa7676f4bd7818d213a980a0e3
                       32561f383cbc879dfe552eb65e7608f3bbdaa99c
                       24af81a7cf13b064a33e565e31ad716bf2c1ed86
                       2d9194123cdb60ed3c810d6da67591fbff0550f3
                       95cbd5393297cf3bc312962eb7ba12498ac207cc
                       abb040742dd7ff73fcec6ad0206508a759c669d3
                       44264427a154daa18dc89e3769f773007746234a
                       f75c9bc065170bc1dc891af628553495900f007f
                       96b090eeeb3c94f2d096f3edb984d80543139a44
                       4d60fe49
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [c8:88:2d:88:64:e8:e2:d4:55:b2:bf:29:24:32:58:94:ac:aa:cf:7f],[56:66:d1:a4]
        modulus: b376d4dd7148b2e6ffb9e90e0b41402aa6895765ea49e52ebb15ac904617692e83a4bd4e43804acf484001cf0b8bcf08b763cae3ec2c1e4467ae6ff15c19a6cc4f2fb634405c0a47627d252e73d40a31861ee9c4ab63a611fafde732bceb8a27ffdfcf9bd9507ebb747c3cc16f10976b46faa876fd8c19523d77e8b4596ce67e14aa809e3c96fc70745328c773b99594307857a454df1bd154db3110ad5768bc0df4226bcdf03d2b5310113d9293a7d2e739ead47cefa28dca9d3e770157716ae0166e8285d68f1c1f44879c855c444fe9aea41aa606c72f5ef6ccdb94f9f6a1d790476bf6a9b2fc67d0acb4300dbac780eeaf60bc2a4c60cd77bbfc14d02b9b
public exponent: 10001

] 
2022-12-02 18:08:13.329  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-02 18:08:13.332 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-02 18:08:13.334 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-12-02 18:08:13.335 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-02 18:08:13.335  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-12-02 18:08:13.336  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-02 18:08:13.336  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-02 18:08:13.337 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-02 18:08:13.337 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-02 18:08:13.337 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-02 18:08:13.341 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-02 18:08:13.343 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-02 18:08:13.344 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-02 18:08:13.344 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-02 18:08:13.489  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-02 18:08:13.490  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-02 18:08:13.490 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-02 18:08:13.491 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-02 18:08:13.493  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-02 18:08:13.493  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-02 18:08:13.494 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-02 18:08:13.494 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-02 18:08:13.495 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-02 18:08:13.496 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-02 18:08:13.496 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-02 18:08:13.497 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-02 18:08:13.498 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-02 18:08:13.498 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-02 18:08:13.498 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-02 18:08:13.499 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-02 18:08:13.504 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 457967233527840419901672367260100663139390335334
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Dec 02 11:17:05 UTC 2022
           Final Date: Wed Dec 01 11:17:04 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [9f:14:88:d5:19:94:1f:0e:44:7f:9b:44:7d:f4:ff:b2:b9:a0:64:82],[56:66:d1:a4]
        modulus: b88be0dfe1c383d41a52559bdea2d80cdff4a48b7a9c7c86381126b33629252bf9aa8f00a9ace56a73c0e9e5500f595c7ed2228160b81f8de61e9b09efe8825cb0d502194555f25b904a7c81537f9f55043013bc6fea2f26c677d8c2f593d3e5a4cd07db4b68e1fec77e0c009f384bdc1b206d637dc0b32bb569ab33d98ee3d7c4d39bf533752e193440f34408d2a361e71bef3d06ec2a8f157e7fc35902bdd2a15b59f4cdf3107d6e53235b2bf3d6e88270f3c7d9fa36bd57bd7f900335f1bf0fe8ca0131debef11218dc56a59147bf9a896e0c3a0d32a947daa1a2214829e987502790573214abea0bead3f5d46989e2c584d00e409856d2bfd7d25ae142bf586fb828805c4a29b058fbfaa15d5a29cf15aa3ea7bfce68e95d6fcf6c3ddbcaee79e9d5119c80791248fdbba4e51a3293415f41e120bcc1a00ee9b017845f9cc59ce1d0d7ba5f8930eda10e374da6987b56fd2a2206802ab127bcded5367a66e55390aa694e7ba7ef85977b80b2cd6553d7a608fc1b00c8540315bd6720624b
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 9c479f0b6956894e00cbd74ed95e0c9f7c04ad28
                       dd29f65d05720978431235b1e16aea87e346d32f
                       812aeeea5c93cd4b731399e6e9bddf583357f60f
                       78c94cd3842091533643ea8a185624ad0094ffcf
                       208a97766948e23876116c11a322bba7f8f8a882
                       fe8c0dfadbc40b0b3a17d2001ec218282a3516bb
                       0d7323e186a3aafa519394abfe606b09ed0e0c22
                       463605c68233de9f79eab30e21a37657d7ca88a1
                       e84dd940fc29ea72089e5a421533f3e41bbe9b3d
                       1c5e79ff3bfb39e17c723517dc32789552f96b21
                       8952c7f46878f4fa7676f4bd7818d213a980a0e3
                       32561f383cbc879dfe552eb65e7608f3bbdaa99c
                       24af81a7cf13b064a33e565e31ad716bf2c1ed86
                       2d9194123cdb60ed3c810d6da67591fbff0550f3
                       95cbd5393297cf3bc312962eb7ba12498ac207cc
                       abb040742dd7ff73fcec6ad0206508a759c669d3
                       44264427a154daa18dc89e3769f773007746234a
                       f75c9bc065170bc1dc891af628553495900f007f
                       96b090eeeb3c94f2d096f3edb984d80543139a44
                       4d60fe49
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [b1:98:68:9e:86:93:10:79:38:ca:18:be:fd:ba:69:f2:0e:00:bc:d8],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-12-02 18:08:34.772  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-02 18:08:34.773 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-02 18:08:34.775 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-12-02 18:08:34.775 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-02 18:08:34.776  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-12-02 18:08:34.776  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-02 18:08:34.777  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-02 18:08:34.777 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-02 18:08:34.777 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-02 18:08:34.778 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-02 18:08:34.781 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-02 18:08:34.782 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-02 18:08:34.782 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-02 18:08:34.783 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-02 18:08:34.867  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-02 18:08:34.867  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-02 18:08:34.868 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-02 18:08:34.868 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-02 18:08:34.869  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-02 18:08:34.870  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-02 18:08:34.870 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-02 18:08:34.871 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-02 18:08:34.871 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-02 18:08:34.872 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-02 18:08:34.872 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-02 18:08:34.872 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-02 18:08:34.873 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-02 18:08:34.874 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-02 18:08:34.874 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-02 18:08:34.875 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-02 18:08:34.878 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 457967233527840419901672367260100663139390335334
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Dec 02 11:17:05 UTC 2022
           Final Date: Wed Dec 01 11:17:04 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [9f:14:88:d5:19:94:1f:0e:44:7f:9b:44:7d:f4:ff:b2:b9:a0:64:82],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 9c479f0b6956894e00cbd74ed95e0c9f7c04ad28
                       dd29f65d05720978431235b1e16aea87e346d32f
                       812aeeea5c93cd4b731399e6e9bddf583357f60f
                       78c94cd3842091533643ea8a185624ad0094ffcf
                       208a97766948e23876116c11a322bba7f8f8a882
                       fe8c0dfadbc40b0b3a17d2001ec218282a3516bb
                       0d7323e186a3aafa519394abfe606b09ed0e0c22
                       463605c68233de9f79eab30e21a37657d7ca88a1
                       e84dd940fc29ea72089e5a421533f3e41bbe9b3d
                       1c5e79ff3bfb39e17c723517dc32789552f96b21
                       8952c7f46878f4fa7676f4bd7818d213a980a0e3
                       32561f383cbc879dfe552eb65e7608f3bbdaa99c
                       24af81a7cf13b064a33e565e31ad716bf2c1ed86
                       2d9194123cdb60ed3c810d6da67591fbff0550f3
                       95cbd5393297cf3bc312962eb7ba12498ac207cc
                       abb040742dd7ff73fcec6ad0206508a759c669d3
                       44264427a154daa18dc89e3769f773007746234a
                       f75c9bc065170bc1dc891af628553495900f007f
                       96b090eeeb3c94f2d096f3edb984d80543139a44
                       4d60fe49
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [62:f9:ea:75:ce:10:82:46:d6:38:20:0e:c7:fd:e0:f8:95:df:36:7f],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-12-02 18:35:18.545  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-02 18:35:18.550 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-02 18:35:18.554 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-12-02 18:35:18.556 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-02 18:35:18.557  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-12-02 18:35:18.557  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-02 18:35:18.558  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-02 18:35:18.558 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-02 18:35:18.559 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-02 18:35:18.560 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-02 18:35:18.565 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-02 18:35:18.566 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-02 18:35:18.567 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-02 18:35:18.567 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-02 18:35:18.720  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-02 18:35:18.721  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-02 18:35:18.722 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-02 18:35:18.722 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-02 18:35:18.724  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-02 18:35:18.725  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-02 18:35:18.725 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-02 18:35:18.726 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-02 18:35:18.726 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-02 18:35:18.727 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-02 18:35:18.728 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-02 18:35:18.728 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-02 18:35:18.729 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-02 18:35:18.729 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-02 18:35:18.729 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-02 18:35:18.730 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-02 18:35:18.734 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 457967233527840419901672367260100663139390335334
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Dec 02 11:17:05 UTC 2022
           Final Date: Wed Dec 01 11:17:04 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [9f:14:88:d5:19:94:1f:0e:44:7f:9b:44:7d:f4:ff:b2:b9:a0:64:82],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 9c479f0b6956894e00cbd74ed95e0c9f7c04ad28
                       dd29f65d05720978431235b1e16aea87e346d32f
                       812aeeea5c93cd4b731399e6e9bddf583357f60f
                       78c94cd3842091533643ea8a185624ad0094ffcf
                       208a97766948e23876116c11a322bba7f8f8a882
                       fe8c0dfadbc40b0b3a17d2001ec218282a3516bb
                       0d7323e186a3aafa519394abfe606b09ed0e0c22
                       463605c68233de9f79eab30e21a37657d7ca88a1
                       e84dd940fc29ea72089e5a421533f3e41bbe9b3d
                       1c5e79ff3bfb39e17c723517dc32789552f96b21
                       8952c7f46878f4fa7676f4bd7818d213a980a0e3
                       32561f383cbc879dfe552eb65e7608f3bbdaa99c
                       24af81a7cf13b064a33e565e31ad716bf2c1ed86
                       2d9194123cdb60ed3c810d6da67591fbff0550f3
                       95cbd5393297cf3bc312962eb7ba12498ac207cc
                       abb040742dd7ff73fcec6ad0206508a759c669d3
                       44264427a154daa18dc89e3769f773007746234a
                       f75c9bc065170bc1dc891af628553495900f007f
                       96b090eeeb3c94f2d096f3edb984d80543139a44
                       4d60fe49
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ee:0f:84:b2:15:df:5c:b5:3f:8b:dd:51:87:ec:9d:81:73:4c:2c:e4],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-12-02 18:35:25.495  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-02 18:35:25.497 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-02 18:35:25.499 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-12-02 18:35:25.503 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-02 18:35:25.504  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-12-02 18:35:25.504  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-02 18:35:25.505  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-02 18:35:25.505 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-02 18:35:25.506 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-02 18:35:25.506 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-02 18:35:25.510 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-02 18:35:25.511 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-02 18:35:25.511 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-02 18:35:25.512 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-02 18:35:25.629  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-02 18:35:25.631  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-02 18:35:25.631 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-02 18:35:25.631 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-02 18:35:25.633  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-02 18:35:25.633  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-02 18:35:25.633 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-02 18:35:25.634 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-02 18:35:25.635 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-02 18:35:25.635 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-02 18:35:25.636 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-02 18:35:25.636 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-02 18:35:25.637 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-02 18:35:25.637 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-02 18:35:25.637 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-02 18:35:25.638 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-02 18:35:25.641 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 457967233527840419901672367260100663139390335334
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Dec 02 11:17:05 UTC 2022
           Final Date: Wed Dec 01 11:17:04 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [9f:14:88:d5:19:94:1f:0e:44:7f:9b:44:7d:f4:ff:b2:b9:a0:64:82],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 9c479f0b6956894e00cbd74ed95e0c9f7c04ad28
                       dd29f65d05720978431235b1e16aea87e346d32f
                       812aeeea5c93cd4b731399e6e9bddf583357f60f
                       78c94cd3842091533643ea8a185624ad0094ffcf
                       208a97766948e23876116c11a322bba7f8f8a882
                       fe8c0dfadbc40b0b3a17d2001ec218282a3516bb
                       0d7323e186a3aafa519394abfe606b09ed0e0c22
                       463605c68233de9f79eab30e21a37657d7ca88a1
                       e84dd940fc29ea72089e5a421533f3e41bbe9b3d
                       1c5e79ff3bfb39e17c723517dc32789552f96b21
                       8952c7f46878f4fa7676f4bd7818d213a980a0e3
                       32561f383cbc879dfe552eb65e7608f3bbdaa99c
                       24af81a7cf13b064a33e565e31ad716bf2c1ed86
                       2d9194123cdb60ed3c810d6da67591fbff0550f3
                       95cbd5393297cf3bc312962eb7ba12498ac207cc
                       abb040742dd7ff73fcec6ad0206508a759c669d3
                       44264427a154daa18dc89e3769f773007746234a
                       f75c9bc065170bc1dc891af628553495900f007f
                       96b090eeeb3c94f2d096f3edb984d80543139a44
                       4d60fe49
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [71:93:ea:b4:a1:6f:9e:c3:55:7e:f3:df:94:62:b9:0d:e3:48:b4:ff],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

]