Results

By type

          2022-04-17 23:47:42,874 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-04-17 23:47:46,868 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-04-17 23:47:49.372  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Apr 17, 2022 11:47:57 PM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Apr 17, 2022 11:47:57 PM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Apr 17, 2022 11:47:57 PM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Apr 17, 2022 11:47:58 PM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-04-17 23:47:59.877 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-04-17 23:48:01.270  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-04-17 23:48:01.866  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-04-17 23:48:04.679 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-04-17 23:48:04.681 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
2022-04-17 23:48:04.683 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-04-17 23:48:04.685 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-04-17 23:48:04.875 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2022-04-17 23:48:04.878 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
	{GET [/docs]}: redirectToUi(HttpServletRequest)
2022-04-17 23:48:05.361 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-04-17 23:48:09.172 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Apr 17, 2022 11:48:11 PM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-04-17 23:48:12.864  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 32.701 seconds (JVM running for 39.27)
Apr 17, 2022 11:48:16 PM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-04-17 23:48:46.259  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-17 23:48:46.270 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-17 23:48:46.469 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-04-17 23:48:46.472 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-17 23:48:46.561  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-04-17 23:48:46.564  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-17 23:48:46.565  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-17 23:48:46.566 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-17 23:48:46.566 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-17 23:48:46.570 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-17 23:48:46.575 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-17 23:48:46.578 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-17 23:48:46.770 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-17 23:48:46.774 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-17 23:48:46.775 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-17 23:48:46.778 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-17 23:48:48.007  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-17 23:48:48.009  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-17 23:48:48.009 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-17 23:48:48.011 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-17 23:48:48.020  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-17 23:48:48.021  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-17 23:48:48.022 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-17 23:48:48.059 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-17 23:48:48.060 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-17 23:48:48.070 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-17 23:48:48.071 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-17 23:48:48.071 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-17 23:48:48.076 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-17 23:48:48.076 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-17 23:48:48.077 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-17 23:48:48.079 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-17 23:48:48.180 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 422766891058389418796721747963665650767154614076
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Apr 17 23:44:43 UTC 2022
           Final Date: Fri Apr 16 23:44:42 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [8f:d1:9c:6a:ec:45:9a:31:95:0f:10:74:4c:af:6a:3f:df:ed:f5:06]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1bbe0e0c96b48fdcb761032f6d8b27443b270acf
                       4928e0ef2f3079fd68fec3c6cc086425608f6ec7
                       fc5aa60556d0c9c0344614346d2a56ffc71cde31
                       8db30c1cd72c574052fdf6b75b38159684f5c56c
                       9a316dfb9ea81b3892700e813d4881cbbe60b8db
                       0c71931b7742efe38bc9d8657591f083aa56ad99
                       24564594f1b2642a888edaaced7ea4ee71cace43
                       57196c4d9a91843a9155c2e71589139e5db195d0
                       bc649ec0999ac61b85be76951a64ea97a493694b
                       1a4fe0130094e3de607812395cc1232a2c9eaf9e
                       67dce087430d5f442a21d5e842a719a5d82f112c
                       0e8d02d93038971798a6f51e21ce0a2361639aca
                       3deeeadb3e88247707227f113f5ba35ee92868c1
                       82a98528c0f714e8e1efb3d83ffb94f65393c300
                       684fb52265860fd3d122d5370db8ecfd2c0dc847
                       f8da79e133ec27f22db39e2e2fbe20cf0033c249
                       935c80b8251213ff88fdd87c095a7d0ba794f036
                       793eab77f245be8254943f1d3601a0d053c6f85e
                       48b22293c8875801c6b12a05ffb23de64a5d5db5
                       1ae19c32
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [a9:5c:98:81:e9:82:45:38:d8:0c:34:f3:f6:54:27:6c:5b:81:6f:7d]
            modulus: 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
    public exponent: 10001

] 
2022-04-18 04:09:19.797  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-18 04:09:19.799 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-18 04:09:19.800 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-18 04:09:19.802 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-18 04:09:19.803  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-18 04:09:19.804  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-18 04:09:19.805  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-18 04:09:19.805 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-18 04:09:19.806 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-18 04:09:19.807 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-18 04:09:19.816 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-18 04:09:19.817 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-18 04:09:19.818 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-18 04:09:19.818 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-18 04:09:20.050  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-18 04:09:20.051  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-18 04:09:20.051 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-18 04:09:20.051 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-18 04:09:20.054  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-18 04:09:20.054  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-18 04:09:20.054 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-18 04:09:20.055 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-18 04:09:20.055 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-18 04:09:20.056 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-18 04:09:20.056 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-18 04:09:20.057 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-18 04:09:20.057 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-18 04:09:20.058 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-18 04:09:20.058 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-18 04:09:20.059 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-18 04:09:20.063 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 422766891058389418796721747963665650767154614076
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Apr 17 23:44:43 UTC 2022
           Final Date: Fri Apr 16 23:44:42 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [8f:d1:9c:6a:ec:45:9a:31:95:0f:10:74:4c:af:6a:3f:df:ed:f5:06]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1bbe0e0c96b48fdcb761032f6d8b27443b270acf
                       4928e0ef2f3079fd68fec3c6cc086425608f6ec7
                       fc5aa60556d0c9c0344614346d2a56ffc71cde31
                       8db30c1cd72c574052fdf6b75b38159684f5c56c
                       9a316dfb9ea81b3892700e813d4881cbbe60b8db
                       0c71931b7742efe38bc9d8657591f083aa56ad99
                       24564594f1b2642a888edaaced7ea4ee71cace43
                       57196c4d9a91843a9155c2e71589139e5db195d0
                       bc649ec0999ac61b85be76951a64ea97a493694b
                       1a4fe0130094e3de607812395cc1232a2c9eaf9e
                       67dce087430d5f442a21d5e842a719a5d82f112c
                       0e8d02d93038971798a6f51e21ce0a2361639aca
                       3deeeadb3e88247707227f113f5ba35ee92868c1
                       82a98528c0f714e8e1efb3d83ffb94f65393c300
                       684fb52265860fd3d122d5370db8ecfd2c0dc847
                       f8da79e133ec27f22db39e2e2fbe20cf0033c249
                       935c80b8251213ff88fdd87c095a7d0ba794f036
                       793eab77f245be8254943f1d3601a0d053c6f85e
                       48b22293c8875801c6b12a05ffb23de64a5d5db5
                       1ae19c32
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [d4:81:15:00:8e:4f:9a:08:2a:f0:bd:30:b4:c2:3e:c0:b0:ab:88:8d]
            modulus: 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
    public exponent: 10001

] 
2022-04-18 04:12:48.173  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-18 04:12:48.175 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-18 04:12:48.177 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-18 04:12:48.177 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-18 04:12:48.178  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-18 04:12:48.179  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-18 04:12:48.179  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-18 04:12:48.180 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-18 04:12:48.180 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-18 04:12:48.181 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-18 04:12:48.189 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-18 04:12:48.190 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-18 04:12:48.190 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-18 04:12:48.191 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-18 04:12:48.379  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-18 04:12:48.380  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-18 04:12:48.380 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-18 04:12:48.380 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-18 04:12:48.382  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-18 04:12:48.382  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-18 04:12:48.382 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-18 04:12:48.383 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-18 04:12:48.383 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-18 04:12:48.384 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-18 04:12:48.384 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-18 04:12:48.384 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-18 04:12:48.385 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-18 04:12:48.385 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-18 04:12:48.386 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-18 04:12:48.386 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-18 04:12:48.389 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 422766891058389418796721747963665650767154614076
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Apr 17 23:44:43 UTC 2022
           Final Date: Fri Apr 16 23:44:42 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [8f:d1:9c:6a:ec:45:9a:31:95:0f:10:74:4c:af:6a:3f:df:ed:f5:06]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1bbe0e0c96b48fdcb761032f6d8b27443b270acf
                       4928e0ef2f3079fd68fec3c6cc086425608f6ec7
                       fc5aa60556d0c9c0344614346d2a56ffc71cde31
                       8db30c1cd72c574052fdf6b75b38159684f5c56c
                       9a316dfb9ea81b3892700e813d4881cbbe60b8db
                       0c71931b7742efe38bc9d8657591f083aa56ad99
                       24564594f1b2642a888edaaced7ea4ee71cace43
                       57196c4d9a91843a9155c2e71589139e5db195d0
                       bc649ec0999ac61b85be76951a64ea97a493694b
                       1a4fe0130094e3de607812395cc1232a2c9eaf9e
                       67dce087430d5f442a21d5e842a719a5d82f112c
                       0e8d02d93038971798a6f51e21ce0a2361639aca
                       3deeeadb3e88247707227f113f5ba35ee92868c1
                       82a98528c0f714e8e1efb3d83ffb94f65393c300
                       684fb52265860fd3d122d5370db8ecfd2c0dc847
                       f8da79e133ec27f22db39e2e2fbe20cf0033c249
                       935c80b8251213ff88fdd87c095a7d0ba794f036
                       793eab77f245be8254943f1d3601a0d053c6f85e
                       48b22293c8875801c6b12a05ffb23de64a5d5db5
                       1ae19c32
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [f7:1d:6c:aa:61:a6:7f:fc:47:f8:c7:95:3e:56:ef:c2:3d:cd:81:fd]
            modulus: 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
    public exponent: 10001

] 
2022-04-18 04:14:56.842  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-18 04:14:56.842 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-18 04:14:56.844 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-04-18 04:14:56.844 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-18 04:14:56.846  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-04-18 04:14:56.847  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-18 04:14:56.847  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-18 04:14:56.847 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-18 04:14:56.848 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-18 04:14:56.848 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-18 04:14:56.852 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-18 04:14:56.852 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-18 04:14:56.853 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-18 04:14:56.853 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-18 04:14:56.944  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-18 04:14:56.944  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-18 04:14:56.945 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-18 04:14:56.945 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-18 04:14:56.960  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-18 04:14:56.960  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-18 04:14:56.960 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-18 04:14:56.961 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-18 04:14:56.961 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-18 04:14:56.962 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-18 04:14:56.962 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-18 04:14:56.962 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-18 04:14:56.963 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-18 04:14:56.963 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-18 04:14:56.963 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-18 04:14:56.964 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-18 04:14:56.967 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 422766891058389418796721747963665650767154614076
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Apr 17 23:44:43 UTC 2022
           Final Date: Fri Apr 16 23:44:42 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [8f:d1:9c:6a:ec:45:9a:31:95:0f:10:74:4c:af:6a:3f:df:ed:f5:06]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1bbe0e0c96b48fdcb761032f6d8b27443b270acf
                       4928e0ef2f3079fd68fec3c6cc086425608f6ec7
                       fc5aa60556d0c9c0344614346d2a56ffc71cde31
                       8db30c1cd72c574052fdf6b75b38159684f5c56c
                       9a316dfb9ea81b3892700e813d4881cbbe60b8db
                       0c71931b7742efe38bc9d8657591f083aa56ad99
                       24564594f1b2642a888edaaced7ea4ee71cace43
                       57196c4d9a91843a9155c2e71589139e5db195d0
                       bc649ec0999ac61b85be76951a64ea97a493694b
                       1a4fe0130094e3de607812395cc1232a2c9eaf9e
                       67dce087430d5f442a21d5e842a719a5d82f112c
                       0e8d02d93038971798a6f51e21ce0a2361639aca
                       3deeeadb3e88247707227f113f5ba35ee92868c1
                       82a98528c0f714e8e1efb3d83ffb94f65393c300
                       684fb52265860fd3d122d5370db8ecfd2c0dc847
                       f8da79e133ec27f22db39e2e2fbe20cf0033c249
                       935c80b8251213ff88fdd87c095a7d0ba794f036
                       793eab77f245be8254943f1d3601a0d053c6f85e
                       48b22293c8875801c6b12a05ffb23de64a5d5db5
                       1ae19c32
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [d5:f8:2d:ec:7b:b8:4c:86:9f:e8:02:de:7f:b9:55:dd:c3:08:93:05]
            modulus: a9352c439e00df235fc8b8e6141af191a27c0d9edc5ad7cc71a54be96ab38d86e3078e4f7f37ccf8c81c62606cad689b19b43d8a62aecba906989012439894c65ca38949e258d02a05bba37b8176b51064507596495a87c7973997371662786869a355e63df55e1c8834a433a1131e97d1254e6c140a5d50357b64fb6e735d4613ac2e6d54c9e0a91c7fc110928fef49f96a466cf3560acadede7aab3294564d8da2cc2b92adc11f3d6d76942851c951eb41dee0789661ab3ac82831711fab72e7e65e294cc35c4276db756db2051e2bd2a4bdae1e47e0da431973f5905759852c4c9b2b3797230096c07145faa5ff28204cb2439bd7351b3e6871e5d94808bf
    public exponent: 10001

] 
2022-04-18 04:16:44.886  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-18 04:16:44.887 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-18 04:16:44.888 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-04-18 04:16:44.889 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-18 04:16:44.889  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-04-18 04:16:44.889  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-18 04:16:44.890  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-18 04:16:44.890 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-18 04:16:44.890 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-18 04:16:44.890 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-18 04:16:44.894 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-18 04:16:44.895 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-18 04:16:44.895 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-18 04:16:44.895 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-18 04:16:45.002  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-18 04:16:45.059  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-18 04:16:45.060 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-18 04:16:45.060 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-18 04:16:45.061  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-18 04:16:45.062  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-18 04:16:45.062 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-18 04:16:45.062 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-18 04:16:45.062 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-18 04:16:45.063 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-18 04:16:45.063 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-18 04:16:45.063 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-18 04:16:45.064 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-18 04:16:45.064 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-18 04:16:45.064 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-18 04:16:45.065 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-18 04:16:45.067 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 422766891058389418796721747963665650767154614076
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Apr 17 23:44:43 UTC 2022
           Final Date: Fri Apr 16 23:44:42 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [8f:d1:9c:6a:ec:45:9a:31:95:0f:10:74:4c:af:6a:3f:df:ed:f5:06]
            modulus: b3f13fa599b0adb38b3ab744b4b73819d8b5b2184c8767d24b4656cdb36972a16d392b8039586eba07f2f718179673104ca3526a7fdba991349d118720992804fdd8eaf896b1dc5497db6e5b02135f9a7cbb87901fdb1f7975750fe2384d89dfbddd0e91a3bfe79f1891854b1d28a55d8ba9664dfee2dd4e4b7028f6d17daedbcd3b9c9982ed7fdeefd55ad85a5ad2516825e99e756a26d1b8955baca73d8958573afe5d57deb668b6c3b990244a70dd3eff94b97f7a327a198cf9e6c0fb115b386d3735f92b048e312ae4fdead341157b91a101c11f5f2d7ede358e4b16eaa3a8c08245c9dfa6221a788739ee48494b2f29ca955c44c1e70df610b300d1630c2574121f530a97096e54e503fc75b69d7317a844566289c96b3d0ab5b3e1e4e89dc67a44bf0eccdf5016fa84d14b9f0761faf993fbf2b7f88baee0190b1e91c54e47612b7559dd1e659e37d9de2a5fdbff7e8e2ea6bd0b17feed2bb6e3728704b25f67b7ac9c73ea20c9cd2c6ad6fb34eaeeab7041dd0e17b8ca68d8035c3b1d
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1bbe0e0c96b48fdcb761032f6d8b27443b270acf
                       4928e0ef2f3079fd68fec3c6cc086425608f6ec7
                       fc5aa60556d0c9c0344614346d2a56ffc71cde31
                       8db30c1cd72c574052fdf6b75b38159684f5c56c
                       9a316dfb9ea81b3892700e813d4881cbbe60b8db
                       0c71931b7742efe38bc9d8657591f083aa56ad99
                       24564594f1b2642a888edaaced7ea4ee71cace43
                       57196c4d9a91843a9155c2e71589139e5db195d0
                       bc649ec0999ac61b85be76951a64ea97a493694b
                       1a4fe0130094e3de607812395cc1232a2c9eaf9e
                       67dce087430d5f442a21d5e842a719a5d82f112c
                       0e8d02d93038971798a6f51e21ce0a2361639aca
                       3deeeadb3e88247707227f113f5ba35ee92868c1
                       82a98528c0f714e8e1efb3d83ffb94f65393c300
                       684fb52265860fd3d122d5370db8ecfd2c0dc847
                       f8da79e133ec27f22db39e2e2fbe20cf0033c249
                       935c80b8251213ff88fdd87c095a7d0ba794f036
                       793eab77f245be8254943f1d3601a0d053c6f85e
                       48b22293c8875801c6b12a05ffb23de64a5d5db5
                       1ae19c32
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [74:e6:02:ef:5c:42:68:87:d2:08:4f:1f:16:fa:3b:a0:23:98:e8:a0]
            modulus: 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
    public exponent: 10001

] 
2022-04-18 04:20:14.388  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-18 04:20:14.390 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-18 04:20:14.391 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-18 04:20:14.391 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-18 04:20:14.392  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-04-18 04:20:14.393  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-18 04:20:14.393  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-18 04:20:14.393 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-18 04:20:14.394 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-18 04:20:14.394 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-18 04:20:14.400 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-18 04:20:14.401 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-18 04:20:14.401 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-18 04:20:14.401 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-18 04:20:14.507  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-18 04:20:14.507  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-18 04:20:14.508 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-18 04:20:14.508 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-18 04:20:14.509  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-18 04:20:14.509  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-18 04:20:14.510 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-18 04:20:14.510 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-18 04:20:14.510 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-18 04:20:14.510 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-18 04:20:14.511 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-18 04:20:14.511 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-18 04:20:14.511 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-18 04:20:14.511 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-18 04:20:14.512 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-18 04:20:14.512 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-18 04:20:14.515 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 422766891058389418796721747963665650767154614076
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Apr 17 23:44:43 UTC 2022
           Final Date: Fri Apr 16 23:44:42 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [8f:d1:9c:6a:ec:45:9a:31:95:0f:10:74:4c:af:6a:3f:df:ed:f5:06]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1bbe0e0c96b48fdcb761032f6d8b27443b270acf
                       4928e0ef2f3079fd68fec3c6cc086425608f6ec7
                       fc5aa60556d0c9c0344614346d2a56ffc71cde31
                       8db30c1cd72c574052fdf6b75b38159684f5c56c
                       9a316dfb9ea81b3892700e813d4881cbbe60b8db
                       0c71931b7742efe38bc9d8657591f083aa56ad99
                       24564594f1b2642a888edaaced7ea4ee71cace43
                       57196c4d9a91843a9155c2e71589139e5db195d0
                       bc649ec0999ac61b85be76951a64ea97a493694b
                       1a4fe0130094e3de607812395cc1232a2c9eaf9e
                       67dce087430d5f442a21d5e842a719a5d82f112c
                       0e8d02d93038971798a6f51e21ce0a2361639aca
                       3deeeadb3e88247707227f113f5ba35ee92868c1
                       82a98528c0f714e8e1efb3d83ffb94f65393c300
                       684fb52265860fd3d122d5370db8ecfd2c0dc847
                       f8da79e133ec27f22db39e2e2fbe20cf0033c249
                       935c80b8251213ff88fdd87c095a7d0ba794f036
                       793eab77f245be8254943f1d3601a0d053c6f85e
                       48b22293c8875801c6b12a05ffb23de64a5d5db5
                       1ae19c32
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ad:4a:d6:70:ed:38:3d:52:14:fd:c1:74:19:90:1d:02:d6:15:8b:82]
            modulus: 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
    public exponent: 10001

] 
2022-04-18 04:24:22.708  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-18 04:24:22.709 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-18 04:24:22.710 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-04-18 04:24:22.711 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-18 04:24:22.711  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-04-18 04:24:22.712  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-18 04:24:22.712  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-18 04:24:22.712 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-18 04:24:22.712 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-18 04:24:22.713 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-18 04:24:22.717 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-18 04:24:22.717 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-18 04:24:22.717 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-18 04:24:22.718 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-18 04:24:22.809  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-18 04:24:22.810  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-18 04:24:22.810 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-18 04:24:22.810 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-18 04:24:22.811  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-18 04:24:22.811  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-18 04:24:22.812 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-18 04:24:22.812 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-18 04:24:22.812 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-18 04:24:22.813 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-18 04:24:22.813 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-18 04:24:22.813 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-18 04:24:22.814 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-18 04:24:22.814 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-18 04:24:22.814 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-18 04:24:22.814 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-18 04:24:22.818 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 422766891058389418796721747963665650767154614076
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Apr 17 23:44:43 UTC 2022
           Final Date: Fri Apr 16 23:44:42 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [8f:d1:9c:6a:ec:45:9a:31:95:0f:10:74:4c:af:6a:3f:df:ed:f5:06]
            modulus: b3f13fa599b0adb38b3ab744b4b73819d8b5b2184c8767d24b4656cdb36972a16d392b8039586eba07f2f718179673104ca3526a7fdba991349d118720992804fdd8eaf896b1dc5497db6e5b02135f9a7cbb87901fdb1f7975750fe2384d89dfbddd0e91a3bfe79f1891854b1d28a55d8ba9664dfee2dd4e4b7028f6d17daedbcd3b9c9982ed7fdeefd55ad85a5ad2516825e99e756a26d1b8955baca73d8958573afe5d57deb668b6c3b990244a70dd3eff94b97f7a327a198cf9e6c0fb115b386d3735f92b048e312ae4fdead341157b91a101c11f5f2d7ede358e4b16eaa3a8c08245c9dfa6221a788739ee48494b2f29ca955c44c1e70df610b300d1630c2574121f530a97096e54e503fc75b69d7317a844566289c96b3d0ab5b3e1e4e89dc67a44bf0eccdf5016fa84d14b9f0761faf993fbf2b7f88baee0190b1e91c54e47612b7559dd1e659e37d9de2a5fdbff7e8e2ea6bd0b17feed2bb6e3728704b25f67b7ac9c73ea20c9cd2c6ad6fb34eaeeab7041dd0e17b8ca68d8035c3b1d
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1bbe0e0c96b48fdcb761032f6d8b27443b270acf
                       4928e0ef2f3079fd68fec3c6cc086425608f6ec7
                       fc5aa60556d0c9c0344614346d2a56ffc71cde31
                       8db30c1cd72c574052fdf6b75b38159684f5c56c
                       9a316dfb9ea81b3892700e813d4881cbbe60b8db
                       0c71931b7742efe38bc9d8657591f083aa56ad99
                       24564594f1b2642a888edaaced7ea4ee71cace43
                       57196c4d9a91843a9155c2e71589139e5db195d0
                       bc649ec0999ac61b85be76951a64ea97a493694b
                       1a4fe0130094e3de607812395cc1232a2c9eaf9e
                       67dce087430d5f442a21d5e842a719a5d82f112c
                       0e8d02d93038971798a6f51e21ce0a2361639aca
                       3deeeadb3e88247707227f113f5ba35ee92868c1
                       82a98528c0f714e8e1efb3d83ffb94f65393c300
                       684fb52265860fd3d122d5370db8ecfd2c0dc847
                       f8da79e133ec27f22db39e2e2fbe20cf0033c249
                       935c80b8251213ff88fdd87c095a7d0ba794f036
                       793eab77f245be8254943f1d3601a0d053c6f85e
                       48b22293c8875801c6b12a05ffb23de64a5d5db5
                       1ae19c32
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [1b:a7:66:88:2d:64:e3:0c:7e:ff:92:b8:df:b0:06:b4:4e:ea:99:ab]
            modulus: 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
    public exponent: 10001

] 
2022-04-18 04:30:46.311  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-18 04:30:46.312 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-18 04:30:46.313 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-04-18 04:30:46.314 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-18 04:30:46.314  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-04-18 04:30:46.314  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-18 04:30:46.314  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-18 04:30:46.315 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-18 04:30:46.315 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-18 04:30:46.315 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-18 04:30:46.319 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-18 04:30:46.320 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-18 04:30:46.320 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-18 04:30:46.320 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-18 04:30:46.427  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-18 04:30:46.428  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-18 04:30:46.428 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-18 04:30:46.428 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-18 04:30:46.429  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-18 04:30:46.429  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-18 04:30:46.430 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-18 04:30:46.433 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-18 04:30:46.433 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-18 04:30:46.434 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-18 04:30:46.434 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-18 04:30:46.434 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-18 04:30:46.434 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-18 04:30:46.435 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-18 04:30:46.435 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-18 04:30:46.435 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-18 04:30:46.438 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 422766891058389418796721747963665650767154614076
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Apr 17 23:44:43 UTC 2022
           Final Date: Fri Apr 16 23:44:42 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [8f:d1:9c:6a:ec:45:9a:31:95:0f:10:74:4c:af:6a:3f:df:ed:f5:06]
            modulus: b3f13fa599b0adb38b3ab744b4b73819d8b5b2184c8767d24b4656cdb36972a16d392b8039586eba07f2f718179673104ca3526a7fdba991349d118720992804fdd8eaf896b1dc5497db6e5b02135f9a7cbb87901fdb1f7975750fe2384d89dfbddd0e91a3bfe79f1891854b1d28a55d8ba9664dfee2dd4e4b7028f6d17daedbcd3b9c9982ed7fdeefd55ad85a5ad2516825e99e756a26d1b8955baca73d8958573afe5d57deb668b6c3b990244a70dd3eff94b97f7a327a198cf9e6c0fb115b386d3735f92b048e312ae4fdead341157b91a101c11f5f2d7ede358e4b16eaa3a8c08245c9dfa6221a788739ee48494b2f29ca955c44c1e70df610b300d1630c2574121f530a97096e54e503fc75b69d7317a844566289c96b3d0ab5b3e1e4e89dc67a44bf0eccdf5016fa84d14b9f0761faf993fbf2b7f88baee0190b1e91c54e47612b7559dd1e659e37d9de2a5fdbff7e8e2ea6bd0b17feed2bb6e3728704b25f67b7ac9c73ea20c9cd2c6ad6fb34eaeeab7041dd0e17b8ca68d8035c3b1d
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1bbe0e0c96b48fdcb761032f6d8b27443b270acf
                       4928e0ef2f3079fd68fec3c6cc086425608f6ec7
                       fc5aa60556d0c9c0344614346d2a56ffc71cde31
                       8db30c1cd72c574052fdf6b75b38159684f5c56c
                       9a316dfb9ea81b3892700e813d4881cbbe60b8db
                       0c71931b7742efe38bc9d8657591f083aa56ad99
                       24564594f1b2642a888edaaced7ea4ee71cace43
                       57196c4d9a91843a9155c2e71589139e5db195d0
                       bc649ec0999ac61b85be76951a64ea97a493694b
                       1a4fe0130094e3de607812395cc1232a2c9eaf9e
                       67dce087430d5f442a21d5e842a719a5d82f112c
                       0e8d02d93038971798a6f51e21ce0a2361639aca
                       3deeeadb3e88247707227f113f5ba35ee92868c1
                       82a98528c0f714e8e1efb3d83ffb94f65393c300
                       684fb52265860fd3d122d5370db8ecfd2c0dc847
                       f8da79e133ec27f22db39e2e2fbe20cf0033c249
                       935c80b8251213ff88fdd87c095a7d0ba794f036
                       793eab77f245be8254943f1d3601a0d053c6f85e
                       48b22293c8875801c6b12a05ffb23de64a5d5db5
                       1ae19c32
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [2b:a1:ab:45:8b:ff:f2:63:e0:7f:8d:5b:92:f6:44:b1:0a:ea:d6:38]
            modulus: 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
    public exponent: 10001

] 
2022-04-18 04:31:38.367  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-18 04:31:38.368 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-18 04:31:38.369 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-04-18 04:31:38.369 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-18 04:31:38.370  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-04-18 04:31:38.370  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-18 04:31:38.370  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-18 04:31:38.371 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-18 04:31:38.371 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-18 04:31:38.371 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-18 04:31:38.377 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-18 04:31:38.378 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-18 04:31:38.378 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-18 04:31:38.378 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-18 04:31:38.480  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-18 04:31:38.481  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-18 04:31:38.481 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-18 04:31:38.481 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-18 04:31:38.482  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-18 04:31:38.482  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-18 04:31:38.483 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-18 04:31:38.483 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-18 04:31:38.483 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-18 04:31:38.483 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-18 04:31:38.484 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-18 04:31:38.484 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-18 04:31:38.484 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-18 04:31:38.484 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-18 04:31:38.485 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-18 04:31:38.485 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-18 04:31:38.487 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 422766891058389418796721747963665650767154614076
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Apr 17 23:44:43 UTC 2022
           Final Date: Fri Apr 16 23:44:42 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [8f:d1:9c:6a:ec:45:9a:31:95:0f:10:74:4c:af:6a:3f:df:ed:f5:06]
            modulus: b3f13fa599b0adb38b3ab744b4b73819d8b5b2184c8767d24b4656cdb36972a16d392b8039586eba07f2f718179673104ca3526a7fdba991349d118720992804fdd8eaf896b1dc5497db6e5b02135f9a7cbb87901fdb1f7975750fe2384d89dfbddd0e91a3bfe79f1891854b1d28a55d8ba9664dfee2dd4e4b7028f6d17daedbcd3b9c9982ed7fdeefd55ad85a5ad2516825e99e756a26d1b8955baca73d8958573afe5d57deb668b6c3b990244a70dd3eff94b97f7a327a198cf9e6c0fb115b386d3735f92b048e312ae4fdead341157b91a101c11f5f2d7ede358e4b16eaa3a8c08245c9dfa6221a788739ee48494b2f29ca955c44c1e70df610b300d1630c2574121f530a97096e54e503fc75b69d7317a844566289c96b3d0ab5b3e1e4e89dc67a44bf0eccdf5016fa84d14b9f0761faf993fbf2b7f88baee0190b1e91c54e47612b7559dd1e659e37d9de2a5fdbff7e8e2ea6bd0b17feed2bb6e3728704b25f67b7ac9c73ea20c9cd2c6ad6fb34eaeeab7041dd0e17b8ca68d8035c3b1d
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 1bbe0e0c96b48fdcb761032f6d8b27443b270acf
                       4928e0ef2f3079fd68fec3c6cc086425608f6ec7
                       fc5aa60556d0c9c0344614346d2a56ffc71cde31
                       8db30c1cd72c574052fdf6b75b38159684f5c56c
                       9a316dfb9ea81b3892700e813d4881cbbe60b8db
                       0c71931b7742efe38bc9d8657591f083aa56ad99
                       24564594f1b2642a888edaaced7ea4ee71cace43
                       57196c4d9a91843a9155c2e71589139e5db195d0
                       bc649ec0999ac61b85be76951a64ea97a493694b
                       1a4fe0130094e3de607812395cc1232a2c9eaf9e
                       67dce087430d5f442a21d5e842a719a5d82f112c
                       0e8d02d93038971798a6f51e21ce0a2361639aca
                       3deeeadb3e88247707227f113f5ba35ee92868c1
                       82a98528c0f714e8e1efb3d83ffb94f65393c300
                       684fb52265860fd3d122d5370db8ecfd2c0dc847
                       f8da79e133ec27f22db39e2e2fbe20cf0033c249
                       935c80b8251213ff88fdd87c095a7d0ba794f036
                       793eab77f245be8254943f1d3601a0d053c6f85e
                       48b22293c8875801c6b12a05ffb23de64a5d5db5
                       1ae19c32
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [05:86:e5:36:7a:5d:42:2c:3d:dc:df:a4:76:db:02:db:a9:84:26:a3]
            modulus: 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
    public exponent: 10001

]