Results

By type

          2022-05-13 11:31:29,610 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-05-13 11:31:35,006 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-05-13 11:31:38.518  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
May 13, 2022 11:31:49 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
May 13, 2022 11:31:49 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
May 13, 2022 11:31:49 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
May 13, 2022 11:31:49 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-05-13 11:31:51.523 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-05-13 11:31:53.020  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-05-13 11:31:53.914  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-05-13 11:31:57.326 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-05-13 11:31:57.406 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
2022-05-13 11:31:57.408 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-05-13 11:31:57.412 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-05-13 11:31:57.608 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2022-05-13 11:31:57.613 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
	{GET [/docs]}: redirectToUi(HttpServletRequest)
2022-05-13 11:31:58.208 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-05-13 11:32:03.118 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
May 13, 2022 11:32:06 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-05-13 11:32:07.915  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 42.1 seconds (JVM running for 50.171)
May 13, 2022 11:32:10 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-05-13 11:33:13.218  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-13 11:33:13.311 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-13 11:33:13.421 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-05-13 11:33:13.507 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-13 11:33:13.523  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-05-13 11:33:13.606  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-13 11:33:13.608  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-13 11:33:13.609 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-13 11:33:13.610 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-13 11:33:13.612 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-13 11:33:13.618 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-13 11:33:13.622 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-13 11:33:13.911 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-13 11:33:13.917 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-13 11:33:13.917 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-13 11:33:13.921 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-13 11:33:15.680  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-13 11:33:15.682  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-13 11:33:15.682 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-13 11:33:15.684 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-13 11:33:15.692  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-13 11:33:15.692  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-13 11:33:15.693 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-13 11:33:15.693 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-13 11:33:15.694 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-13 11:33:15.715 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-13 11:33:15.716 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-13 11:33:15.716 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-13 11:33:15.721 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-13 11:33:15.721 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-13 11:33:15.722 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-13 11:33:15.805 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-13 11:33:15.834 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 250495301442293134729163443788767687234862987196
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri May 13 11:27:39 UTC 2022
           Final Date: Wed May 12 11:27:38 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [1f:f2:38:94:64:fd:41:73:91:87:26:4a:73:84:eb:68:9e:49:3a:7e]
            modulus: b7b92678cd394a5737dc27bfa8414abaef6c2daab09aef4857c55252e5a9c5b5577d96a4a44cd4b58babbdfcbf6f5e0e47291d8cd2ca13cc546d8fc21e00dd59263b820da5176a794a3adc689a0d2d3c6ef13a43dd26e9e91d1fd3a1c066e28029d2418c35de0b7f7590e29b3cc1ee6bbd0305bf9ed1d70b83d51bc5c0936207431459109dd1a1b6bff928f06fae1bb2cbfaed3be31101ab0776e5bb0a51f29639ba7f5aabb48d01b04ffd7be7edb57261c057399144483c9f9e260a1a1cd88be41be3de8e9655976efcb228d9013a5f3f8d591880f73cdd91a0ff7fc9dabc72c65ab7b551188459dd6771560f32eb3fb9d6a13fa9748023f3e9b16553e6d5112581c4fe98448a6186f1f7fa2616091756244fa615605f4b155061802dd7f440dee4f54610b44bf5430d330992106a29b013b43646f10e427356e4e46bfdede4ed7c5812876f39ffe4422e73d79dbabd9f9734baa18a21fca190a1ec4fb92d9c758108e51224deeaaba62305fe300b94fdb43800681321cbc5da984a2c1adae3
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 98977b5ab7af97add6af5e935068287898f63b54
                       5d7811f1e7650069f0329687fce69291631abef0
                       48af143855d93c4035970a3ed6a7a2514ae70d22
                       348ef40a588a06efecd840859d5c8aa660c25ccd
                       e8c2900f4d2c681afab422c537327a3694cefdfe
                       555353b1351542772b0a168af9debcfdcb1e145f
                       cf1065498e2c040ecb3904d65a82a9e51b56ccf8
                       6e44a3e7af3f5d221be540f3a2e1393001685820
                       7a8423527a4a395411a69fa6847a9285d9864791
                       7f78322b39e9ddf8ee28af9ae69ff629b68a0598
                       a578ad69c7373ccba43fa928d32b71134fd92262
                       7876cf36a0c55387a7fc0823baaeb131b881ead3
                       e4ae0c6f3756f9cc2ad338bb40b83e2516fd5f38
                       3ba28904695adec57d8430f31fd80effa906ab40
                       13392e39882a2780621fea3b2d3401780f712651
                       6a1590a8b95a36d7370f578f5bd507a97d102418
                       7a7c67e59b797e2bfb472da5206b5815838bb1fe
                       3dbcf02ae00ad1231000a8372a765aa744ca823c
                       db9842181f44da03d60872dabc3167482ab76303
                       da89871f
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [db:96:95:f0:5d:3e:a9:91:88:48:67:c3:6a:18:df:49:fe:a9:e5:55]
            modulus: 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
    public exponent: 10001

] 
2022-05-13 14:35:10.005  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-13 14:35:10.007 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-13 14:35:10.009 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-13 14:35:10.010 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-13 14:35:10.012  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-13 14:35:10.013  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-13 14:35:10.013  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-13 14:35:10.014 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-13 14:35:10.014 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-13 14:35:10.015 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-13 14:35:10.024 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-13 14:35:10.025 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-13 14:35:10.025 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-13 14:35:10.025 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-13 14:35:10.242  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-13 14:35:10.243  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-13 14:35:10.243 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-13 14:35:10.244 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-13 14:35:10.313  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-13 14:35:10.313  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-13 14:35:10.314 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-13 14:35:10.314 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-13 14:35:10.314 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-13 14:35:10.315 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-13 14:35:10.316 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-13 14:35:10.316 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-13 14:35:10.317 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-13 14:35:10.317 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-13 14:35:10.317 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-13 14:35:10.319 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-13 14:35:10.330 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 250495301442293134729163443788767687234862987196
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri May 13 11:27:39 UTC 2022
           Final Date: Wed May 12 11:27:38 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [1f:f2:38:94:64:fd:41:73:91:87:26:4a:73:84:eb:68:9e:49:3a:7e]
            modulus: b7b92678cd394a5737dc27bfa8414abaef6c2daab09aef4857c55252e5a9c5b5577d96a4a44cd4b58babbdfcbf6f5e0e47291d8cd2ca13cc546d8fc21e00dd59263b820da5176a794a3adc689a0d2d3c6ef13a43dd26e9e91d1fd3a1c066e28029d2418c35de0b7f7590e29b3cc1ee6bbd0305bf9ed1d70b83d51bc5c0936207431459109dd1a1b6bff928f06fae1bb2cbfaed3be31101ab0776e5bb0a51f29639ba7f5aabb48d01b04ffd7be7edb57261c057399144483c9f9e260a1a1cd88be41be3de8e9655976efcb228d9013a5f3f8d591880f73cdd91a0ff7fc9dabc72c65ab7b551188459dd6771560f32eb3fb9d6a13fa9748023f3e9b16553e6d5112581c4fe98448a6186f1f7fa2616091756244fa615605f4b155061802dd7f440dee4f54610b44bf5430d330992106a29b013b43646f10e427356e4e46bfdede4ed7c5812876f39ffe4422e73d79dbabd9f9734baa18a21fca190a1ec4fb92d9c758108e51224deeaaba62305fe300b94fdb43800681321cbc5da984a2c1adae3
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 98977b5ab7af97add6af5e935068287898f63b54
                       5d7811f1e7650069f0329687fce69291631abef0
                       48af143855d93c4035970a3ed6a7a2514ae70d22
                       348ef40a588a06efecd840859d5c8aa660c25ccd
                       e8c2900f4d2c681afab422c537327a3694cefdfe
                       555353b1351542772b0a168af9debcfdcb1e145f
                       cf1065498e2c040ecb3904d65a82a9e51b56ccf8
                       6e44a3e7af3f5d221be540f3a2e1393001685820
                       7a8423527a4a395411a69fa6847a9285d9864791
                       7f78322b39e9ddf8ee28af9ae69ff629b68a0598
                       a578ad69c7373ccba43fa928d32b71134fd92262
                       7876cf36a0c55387a7fc0823baaeb131b881ead3
                       e4ae0c6f3756f9cc2ad338bb40b83e2516fd5f38
                       3ba28904695adec57d8430f31fd80effa906ab40
                       13392e39882a2780621fea3b2d3401780f712651
                       6a1590a8b95a36d7370f578f5bd507a97d102418
                       7a7c67e59b797e2bfb472da5206b5815838bb1fe
                       3dbcf02ae00ad1231000a8372a765aa744ca823c
                       db9842181f44da03d60872dabc3167482ab76303
                       da89871f
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [dc:94:cc:16:de:70:8b:52:67:8a:47:35:ea:3a:eb:75:d3:64:f2:dc]
            modulus: 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
    public exponent: 10001

] 
2022-05-13 14:38:54.440  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-13 14:38:54.442 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-13 14:38:54.443 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-13 14:38:54.444 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-13 14:38:54.445  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-13 14:38:54.446  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-13 14:38:54.446  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-13 14:38:54.447 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-13 14:38:54.447 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-13 14:38:54.448 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-13 14:38:54.455 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-13 14:38:54.455 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-13 14:38:54.456 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-13 14:38:54.456 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-13 14:38:54.607  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-13 14:38:54.608  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-13 14:38:54.608 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-13 14:38:54.609 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-13 14:38:54.612  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-13 14:38:54.613  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-13 14:38:54.614 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-13 14:38:54.614 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-13 14:38:54.615 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-13 14:38:54.616 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-13 14:38:54.616 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-13 14:38:54.617 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-13 14:38:54.618 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-13 14:38:54.619 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-13 14:38:54.619 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-13 14:38:54.620 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-13 14:38:54.624 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 250495301442293134729163443788767687234862987196
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri May 13 11:27:39 UTC 2022
           Final Date: Wed May 12 11:27:38 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [1f:f2:38:94:64:fd:41:73:91:87:26:4a:73:84:eb:68:9e:49:3a:7e]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 98977b5ab7af97add6af5e935068287898f63b54
                       5d7811f1e7650069f0329687fce69291631abef0
                       48af143855d93c4035970a3ed6a7a2514ae70d22
                       348ef40a588a06efecd840859d5c8aa660c25ccd
                       e8c2900f4d2c681afab422c537327a3694cefdfe
                       555353b1351542772b0a168af9debcfdcb1e145f
                       cf1065498e2c040ecb3904d65a82a9e51b56ccf8
                       6e44a3e7af3f5d221be540f3a2e1393001685820
                       7a8423527a4a395411a69fa6847a9285d9864791
                       7f78322b39e9ddf8ee28af9ae69ff629b68a0598
                       a578ad69c7373ccba43fa928d32b71134fd92262
                       7876cf36a0c55387a7fc0823baaeb131b881ead3
                       e4ae0c6f3756f9cc2ad338bb40b83e2516fd5f38
                       3ba28904695adec57d8430f31fd80effa906ab40
                       13392e39882a2780621fea3b2d3401780f712651
                       6a1590a8b95a36d7370f578f5bd507a97d102418
                       7a7c67e59b797e2bfb472da5206b5815838bb1fe
                       3dbcf02ae00ad1231000a8372a765aa744ca823c
                       db9842181f44da03d60872dabc3167482ab76303
                       da89871f
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [b6:d0:34:a3:3c:ee:97:0f:0b:3b:01:2d:1a:bc:99:26:5d:fa:67:62]
            modulus: c425a14b1516ce36931033607228bdc1b439b8f785b8410a1985cfe418c7c5f055d979bd1cd8899466d4b7d0614212ca99bd517c9b7da3f4de4d9fc304716c0b05465d1170c46bccb89e87210d31d0582e1bc472a915f82a7bec428e398d5b3ceea9d7ded28a39fa4829f8eb519bb67d1f6733e06b5d3974d7bd255a4402bc7e27d4290fce1dd9aa6c68226382757e30d20b98e4f41f3c114ac25cc8440888c95a7226f9c24c68f4041b2a800e69122a2578c9e45685f50851afab169f2dc2c7b9ffc13bf9e430eeae038467a8610fb5392fd498eda34fbb0060585a0873676b48bb367586f5f41f74cc60091de71a5c637150d7f6042d952ef7c387ec960543
    public exponent: 10001

] 
2022-05-13 14:40:59.631  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-13 14:40:59.632 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-13 14:40:59.634 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-05-13 14:40:59.634 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-13 14:40:59.635  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-05-13 14:40:59.635  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-13 14:40:59.636  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-13 14:40:59.636 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-13 14:40:59.636 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-13 14:40:59.637 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-13 14:40:59.646 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-13 14:40:59.646 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-13 14:40:59.647 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-13 14:40:59.647 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-13 14:40:59.804  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-13 14:40:59.805  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-13 14:40:59.805 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-13 14:40:59.805 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-13 14:40:59.807  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-13 14:40:59.808  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-13 14:40:59.808 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-13 14:40:59.808 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-13 14:40:59.808 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-13 14:40:59.809 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-13 14:40:59.809 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-13 14:40:59.809 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-13 14:40:59.810 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-13 14:40:59.810 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-13 14:40:59.810 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-13 14:40:59.811 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-13 14:40:59.814 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 250495301442293134729163443788767687234862987196
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri May 13 11:27:39 UTC 2022
           Final Date: Wed May 12 11:27:38 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [1f:f2:38:94:64:fd:41:73:91:87:26:4a:73:84:eb:68:9e:49:3a:7e]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 98977b5ab7af97add6af5e935068287898f63b54
                       5d7811f1e7650069f0329687fce69291631abef0
                       48af143855d93c4035970a3ed6a7a2514ae70d22
                       348ef40a588a06efecd840859d5c8aa660c25ccd
                       e8c2900f4d2c681afab422c537327a3694cefdfe
                       555353b1351542772b0a168af9debcfdcb1e145f
                       cf1065498e2c040ecb3904d65a82a9e51b56ccf8
                       6e44a3e7af3f5d221be540f3a2e1393001685820
                       7a8423527a4a395411a69fa6847a9285d9864791
                       7f78322b39e9ddf8ee28af9ae69ff629b68a0598
                       a578ad69c7373ccba43fa928d32b71134fd92262
                       7876cf36a0c55387a7fc0823baaeb131b881ead3
                       e4ae0c6f3756f9cc2ad338bb40b83e2516fd5f38
                       3ba28904695adec57d8430f31fd80effa906ab40
                       13392e39882a2780621fea3b2d3401780f712651
                       6a1590a8b95a36d7370f578f5bd507a97d102418
                       7a7c67e59b797e2bfb472da5206b5815838bb1fe
                       3dbcf02ae00ad1231000a8372a765aa744ca823c
                       db9842181f44da03d60872dabc3167482ab76303
                       da89871f
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [35:4e:cf:e1:c7:ec:0b:60:0b:cf:6c:5e:fe:f3:ea:51:18:3f:87:8f]
            modulus: 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
    public exponent: 10001

] 
2022-05-13 14:44:09.779  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-13 14:44:09.780 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-13 14:44:09.782 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-05-13 14:44:09.783 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-13 14:44:09.784  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-05-13 14:44:09.785  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-13 14:44:09.785  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-13 14:44:09.786 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-13 14:44:09.786 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-13 14:44:09.786 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-13 14:44:09.792 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-13 14:44:09.793 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-13 14:44:09.793 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-13 14:44:09.793 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-13 14:44:09.893  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-13 14:44:09.894  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-13 14:44:09.903 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-13 14:44:09.903 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-13 14:44:09.906  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-13 14:44:09.907  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-13 14:44:09.907 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-13 14:44:09.907 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-13 14:44:09.908 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-13 14:44:09.908 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-13 14:44:09.908 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-13 14:44:09.909 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-13 14:44:09.909 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-13 14:44:09.909 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-13 14:44:09.909 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-13 14:44:09.910 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-13 14:44:09.913 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 250495301442293134729163443788767687234862987196
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri May 13 11:27:39 UTC 2022
           Final Date: Wed May 12 11:27:38 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [1f:f2:38:94:64:fd:41:73:91:87:26:4a:73:84:eb:68:9e:49:3a:7e]
            modulus: b7b92678cd394a5737dc27bfa8414abaef6c2daab09aef4857c55252e5a9c5b5577d96a4a44cd4b58babbdfcbf6f5e0e47291d8cd2ca13cc546d8fc21e00dd59263b820da5176a794a3adc689a0d2d3c6ef13a43dd26e9e91d1fd3a1c066e28029d2418c35de0b7f7590e29b3cc1ee6bbd0305bf9ed1d70b83d51bc5c0936207431459109dd1a1b6bff928f06fae1bb2cbfaed3be31101ab0776e5bb0a51f29639ba7f5aabb48d01b04ffd7be7edb57261c057399144483c9f9e260a1a1cd88be41be3de8e9655976efcb228d9013a5f3f8d591880f73cdd91a0ff7fc9dabc72c65ab7b551188459dd6771560f32eb3fb9d6a13fa9748023f3e9b16553e6d5112581c4fe98448a6186f1f7fa2616091756244fa615605f4b155061802dd7f440dee4f54610b44bf5430d330992106a29b013b43646f10e427356e4e46bfdede4ed7c5812876f39ffe4422e73d79dbabd9f9734baa18a21fca190a1ec4fb92d9c758108e51224deeaaba62305fe300b94fdb43800681321cbc5da984a2c1adae3
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 98977b5ab7af97add6af5e935068287898f63b54
                       5d7811f1e7650069f0329687fce69291631abef0
                       48af143855d93c4035970a3ed6a7a2514ae70d22
                       348ef40a588a06efecd840859d5c8aa660c25ccd
                       e8c2900f4d2c681afab422c537327a3694cefdfe
                       555353b1351542772b0a168af9debcfdcb1e145f
                       cf1065498e2c040ecb3904d65a82a9e51b56ccf8
                       6e44a3e7af3f5d221be540f3a2e1393001685820
                       7a8423527a4a395411a69fa6847a9285d9864791
                       7f78322b39e9ddf8ee28af9ae69ff629b68a0598
                       a578ad69c7373ccba43fa928d32b71134fd92262
                       7876cf36a0c55387a7fc0823baaeb131b881ead3
                       e4ae0c6f3756f9cc2ad338bb40b83e2516fd5f38
                       3ba28904695adec57d8430f31fd80effa906ab40
                       13392e39882a2780621fea3b2d3401780f712651
                       6a1590a8b95a36d7370f578f5bd507a97d102418
                       7a7c67e59b797e2bfb472da5206b5815838bb1fe
                       3dbcf02ae00ad1231000a8372a765aa744ca823c
                       db9842181f44da03d60872dabc3167482ab76303
                       da89871f
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [14:df:9f:74:ec:d0:bb:f9:37:06:94:4a:73:3a:d4:5d:2a:8a:64:a1]
            modulus: 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
    public exponent: 10001

] 
2022-05-13 14:48:01.156  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-13 14:48:01.158 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-13 14:48:01.164 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-13 14:48:01.165 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-13 14:48:01.165  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-13 14:48:01.166  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-13 14:48:01.166  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-13 14:48:01.167 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-13 14:48:01.167 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-13 14:48:01.167 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-13 14:48:01.172 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-13 14:48:01.172 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-13 14:48:01.172 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-13 14:48:01.173 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-13 14:48:01.294  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-13 14:48:01.303  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-13 14:48:01.304 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-13 14:48:01.304 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-13 14:48:01.306  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-13 14:48:01.307  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-13 14:48:01.307 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-13 14:48:01.308 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-13 14:48:01.308 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-13 14:48:01.309 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-13 14:48:01.309 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-13 14:48:01.310 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-13 14:48:01.310 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-13 14:48:01.311 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-13 14:48:01.311 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-13 14:48:01.311 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-13 14:48:01.314 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 250495301442293134729163443788767687234862987196
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri May 13 11:27:39 UTC 2022
           Final Date: Wed May 12 11:27:38 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [1f:f2:38:94:64:fd:41:73:91:87:26:4a:73:84:eb:68:9e:49:3a:7e]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 98977b5ab7af97add6af5e935068287898f63b54
                       5d7811f1e7650069f0329687fce69291631abef0
                       48af143855d93c4035970a3ed6a7a2514ae70d22
                       348ef40a588a06efecd840859d5c8aa660c25ccd
                       e8c2900f4d2c681afab422c537327a3694cefdfe
                       555353b1351542772b0a168af9debcfdcb1e145f
                       cf1065498e2c040ecb3904d65a82a9e51b56ccf8
                       6e44a3e7af3f5d221be540f3a2e1393001685820
                       7a8423527a4a395411a69fa6847a9285d9864791
                       7f78322b39e9ddf8ee28af9ae69ff629b68a0598
                       a578ad69c7373ccba43fa928d32b71134fd92262
                       7876cf36a0c55387a7fc0823baaeb131b881ead3
                       e4ae0c6f3756f9cc2ad338bb40b83e2516fd5f38
                       3ba28904695adec57d8430f31fd80effa906ab40
                       13392e39882a2780621fea3b2d3401780f712651
                       6a1590a8b95a36d7370f578f5bd507a97d102418
                       7a7c67e59b797e2bfb472da5206b5815838bb1fe
                       3dbcf02ae00ad1231000a8372a765aa744ca823c
                       db9842181f44da03d60872dabc3167482ab76303
                       da89871f
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [0e:33:35:47:ec:f1:20:e9:eb:c9:c5:b1:7a:71:09:b6:f8:14:32:cc]
            modulus: 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
    public exponent: 10001

] 
2022-05-13 14:52:36.011  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-13 14:52:36.012 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-13 14:52:36.014 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-05-13 14:52:36.014 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-13 14:52:36.015  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-05-13 14:52:36.015  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-13 14:52:36.016  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-13 14:52:36.016 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-13 14:52:36.016 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-13 14:52:36.016 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-13 14:52:36.021 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-13 14:52:36.021 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-13 14:52:36.021 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-13 14:52:36.022 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-13 14:52:36.125  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-13 14:52:36.125  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-13 14:52:36.126 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-13 14:52:36.126 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-13 14:52:36.127  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-13 14:52:36.127  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-13 14:52:36.128 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-13 14:52:36.128 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-13 14:52:36.128 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-13 14:52:36.129 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-13 14:52:36.129 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-13 14:52:36.129 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-13 14:52:36.130 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-13 14:52:36.130 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-13 14:52:36.131 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-13 14:52:36.131 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-13 14:52:36.134 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 250495301442293134729163443788767687234862987196
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri May 13 11:27:39 UTC 2022
           Final Date: Wed May 12 11:27:38 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [1f:f2:38:94:64:fd:41:73:91:87:26:4a:73:84:eb:68:9e:49:3a:7e]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 98977b5ab7af97add6af5e935068287898f63b54
                       5d7811f1e7650069f0329687fce69291631abef0
                       48af143855d93c4035970a3ed6a7a2514ae70d22
                       348ef40a588a06efecd840859d5c8aa660c25ccd
                       e8c2900f4d2c681afab422c537327a3694cefdfe
                       555353b1351542772b0a168af9debcfdcb1e145f
                       cf1065498e2c040ecb3904d65a82a9e51b56ccf8
                       6e44a3e7af3f5d221be540f3a2e1393001685820
                       7a8423527a4a395411a69fa6847a9285d9864791
                       7f78322b39e9ddf8ee28af9ae69ff629b68a0598
                       a578ad69c7373ccba43fa928d32b71134fd92262
                       7876cf36a0c55387a7fc0823baaeb131b881ead3
                       e4ae0c6f3756f9cc2ad338bb40b83e2516fd5f38
                       3ba28904695adec57d8430f31fd80effa906ab40
                       13392e39882a2780621fea3b2d3401780f712651
                       6a1590a8b95a36d7370f578f5bd507a97d102418
                       7a7c67e59b797e2bfb472da5206b5815838bb1fe
                       3dbcf02ae00ad1231000a8372a765aa744ca823c
                       db9842181f44da03d60872dabc3167482ab76303
                       da89871f
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [7e:3d:d8:e8:65:b4:c0:16:2f:5c:c2:ed:3d:d4:ee:9d:22:3d:90:be]
            modulus: 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
    public exponent: 10001

] 
2022-05-13 15:02:20.284  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-13 15:02:20.286 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-13 15:02:20.288 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-05-13 15:02:20.289 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-13 15:02:20.289  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-05-13 15:02:20.290  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-13 15:02:20.290  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-13 15:02:20.290 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-13 15:02:20.291 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-13 15:02:20.291 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-13 15:02:20.296 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-13 15:02:20.297 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-13 15:02:20.297 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-13 15:02:20.297 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-13 15:02:20.422  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-13 15:02:20.423  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-13 15:02:20.424 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-13 15:02:20.424 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-13 15:02:20.426  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-13 15:02:20.426  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-13 15:02:20.427 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-13 15:02:20.427 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-13 15:02:20.427 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-13 15:02:20.431 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-13 15:02:20.431 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-13 15:02:20.432 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-13 15:02:20.432 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-13 15:02:20.433 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-13 15:02:20.433 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-13 15:02:20.434 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-13 15:02:20.438 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 250495301442293134729163443788767687234862987196
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri May 13 11:27:39 UTC 2022
           Final Date: Wed May 12 11:27:38 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [1f:f2:38:94:64:fd:41:73:91:87:26:4a:73:84:eb:68:9e:49:3a:7e]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 98977b5ab7af97add6af5e935068287898f63b54
                       5d7811f1e7650069f0329687fce69291631abef0
                       48af143855d93c4035970a3ed6a7a2514ae70d22
                       348ef40a588a06efecd840859d5c8aa660c25ccd
                       e8c2900f4d2c681afab422c537327a3694cefdfe
                       555353b1351542772b0a168af9debcfdcb1e145f
                       cf1065498e2c040ecb3904d65a82a9e51b56ccf8
                       6e44a3e7af3f5d221be540f3a2e1393001685820
                       7a8423527a4a395411a69fa6847a9285d9864791
                       7f78322b39e9ddf8ee28af9ae69ff629b68a0598
                       a578ad69c7373ccba43fa928d32b71134fd92262
                       7876cf36a0c55387a7fc0823baaeb131b881ead3
                       e4ae0c6f3756f9cc2ad338bb40b83e2516fd5f38
                       3ba28904695adec57d8430f31fd80effa906ab40
                       13392e39882a2780621fea3b2d3401780f712651
                       6a1590a8b95a36d7370f578f5bd507a97d102418
                       7a7c67e59b797e2bfb472da5206b5815838bb1fe
                       3dbcf02ae00ad1231000a8372a765aa744ca823c
                       db9842181f44da03d60872dabc3167482ab76303
                       da89871f
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [9a:55:17:ca:05:ab:bd:86:47:42:e9:99:38:da:2c:64:61:8a:25:d0]
            modulus: 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
    public exponent: 10001

] 
2022-05-13 15:03:58.356  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-13 15:03:58.357 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-13 15:03:58.359 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-05-13 15:03:58.359 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-13 15:03:58.359  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-05-13 15:03:58.360  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-13 15:03:58.360  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-13 15:03:58.360 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-13 15:03:58.361 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-13 15:03:58.361 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-13 15:03:58.366 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-13 15:03:58.367 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-13 15:03:58.367 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-13 15:03:58.367 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-13 15:03:58.453  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-13 15:03:58.453  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-13 15:03:58.454 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-13 15:03:58.454 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-13 15:03:58.455  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-13 15:03:58.456  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-13 15:03:58.456 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-13 15:03:58.456 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-13 15:03:58.457 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-13 15:03:58.457 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-13 15:03:58.457 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-13 15:03:58.458 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-13 15:03:58.459 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-13 15:03:58.459 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-13 15:03:58.459 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-13 15:03:58.460 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-13 15:03:58.462 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 250495301442293134729163443788767687234862987196
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri May 13 11:27:39 UTC 2022
           Final Date: Wed May 12 11:27:38 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [1f:f2:38:94:64:fd:41:73:91:87:26:4a:73:84:eb:68:9e:49:3a:7e]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 98977b5ab7af97add6af5e935068287898f63b54
                       5d7811f1e7650069f0329687fce69291631abef0
                       48af143855d93c4035970a3ed6a7a2514ae70d22
                       348ef40a588a06efecd840859d5c8aa660c25ccd
                       e8c2900f4d2c681afab422c537327a3694cefdfe
                       555353b1351542772b0a168af9debcfdcb1e145f
                       cf1065498e2c040ecb3904d65a82a9e51b56ccf8
                       6e44a3e7af3f5d221be540f3a2e1393001685820
                       7a8423527a4a395411a69fa6847a9285d9864791
                       7f78322b39e9ddf8ee28af9ae69ff629b68a0598
                       a578ad69c7373ccba43fa928d32b71134fd92262
                       7876cf36a0c55387a7fc0823baaeb131b881ead3
                       e4ae0c6f3756f9cc2ad338bb40b83e2516fd5f38
                       3ba28904695adec57d8430f31fd80effa906ab40
                       13392e39882a2780621fea3b2d3401780f712651
                       6a1590a8b95a36d7370f578f5bd507a97d102418
                       7a7c67e59b797e2bfb472da5206b5815838bb1fe
                       3dbcf02ae00ad1231000a8372a765aa744ca823c
                       db9842181f44da03d60872dabc3167482ab76303
                       da89871f
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [9a:fd:c3:ad:8c:1a:81:ee:62:69:b8:c0:ae:7a:67:09:3e:de:2e:b5]
            modulus: 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
    public exponent: 10001

]