Results

By type

          2022-08-19 03:23:56,512 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-08-19 03:23:57,389 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-08-19 03:23:58.313  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Aug 19, 2022 3:24:00 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Aug 19, 2022 3:24:00 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Aug 19, 2022 3:24:00 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Aug 19, 2022 3:24:00 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-08-19 03:24:00.828 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-08-19 03:24:01.127  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-08-19 03:24:01.290  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-08-19 03:24:02.062 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-08-19 03:24:02.066 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
2022-08-19 03:24:02.067 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-08-19 03:24:02.072 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-08-19 03:24:02.119 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2022-08-19 03:24:02.123 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/docs]}: redirectToUi(HttpServletRequest)
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
2022-08-19 03:24:02.268 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-08-19 03:24:03.006 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Aug 19, 2022 3:24:03 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-08-19 03:24:03.884  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 8.214 seconds (JVM running for 9.978)
Aug 19, 2022 3:24:27 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-08-19 03:24:53.347  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-08-19 03:24:53.355 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-08-19 03:24:53.400 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-08-19 03:24:53.404 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-08-19 03:24:53.429  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-08-19 03:24:53.432  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-08-19 03:24:53.433  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-08-19 03:24:53.435 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-08-19 03:24:53.435 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-19 03:24:53.440 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-08-19 03:24:53.447 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-08-19 03:24:53.450 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-08-19 03:24:53.491 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-08-19 03:24:53.497 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-19 03:24:53.498 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-19 03:24:53.502 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-19 03:24:54.221  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-08-19 03:24:54.223  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-08-19 03:24:54.224 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-08-19 03:24:54.225 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-19 03:24:54.235  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-08-19 03:24:54.236  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-08-19 03:24:54.237 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-19 03:24:54.238 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-19 03:24:54.238 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-19 03:24:54.252 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-19 03:24:54.252 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-19 03:24:54.253 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-19 03:24:54.262 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-19 03:24:54.263 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-19 03:24:54.263 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-19 03:24:54.265 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-08-19 03:24:54.310 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 693749581343008342262084600416440401927137021100
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Aug 19 03:21:11 UTC 2022
           Final Date: Wed Aug 18 03:21:10 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [8c:35:54:c5:01:f2:5c:72:08:ec:83:bd:85:6a:94:e2:e9:e8:70:44]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3379548e129b259a14d749a9d0ac2ed37847a53f
                       a021b1ec74887b0e58b388ec2ca39d23651be420
                       62836d04b7e04f0797d83c028d640933b60bfd2c
                       9a67e227c1c5f0b7b872fb08b99ebb32b98d66eb
                       230619a0789ace4d37e1dbb9362297fe1b555a64
                       ef8b5677d7f053a23721793ff29219562ade72b2
                       a91ba1dfbf9bb236c4e43e8a59497052c0fa8360
                       e9ae5a768c78a95eaf0fd60e7676bf92a57c5c36
                       7c1c2de0de9f7689adeb9d93f03c1d6c61380402
                       dc3c5bd4a77165a2497650087cf0eab01d20ed80
                       315637d160090eb05092902ae36b26c8015d3fc9
                       138df4080e0f485e744c617596afc3a54a1916cb
                       4fcb80be0e00d818d6c2ef3fc48c25ff609e718e
                       1ff486950051f77165b9769627deef0a48264659
                       c1b65e1f12d830dbb752b44d596daf223cdef57b
                       d22087a83653567657cf3542db80cb7953c8056c
                       543bbdc794eda8dbc1f9fae09ef454062bf0e938
                       e1dd493019b71cd8825c40d5350069c540d7e7d4
                       34ba740ba5d0c3db758e1bd356d99c38d4b06b40
                       f18d5f9b
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [94:ba:7f:3c:ed:71:c9:66:3c:c5:ab:52:97:06:d7:b5:62:05:f8:38]
            modulus: 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
    public exponent: 10001

] 
2022-08-19 04:51:52.397  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-08-19 04:51:52.402 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-08-19 04:51:52.405 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-08-19 04:51:52.407 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-08-19 04:51:52.407  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-08-19 04:51:52.409  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-08-19 04:51:52.409  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-08-19 04:51:52.410 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-08-19 04:51:52.411 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-08-19 04:51:52.411 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-08-19 04:51:52.425 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-08-19 04:51:52.428 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-19 04:51:52.428 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-19 04:51:52.429 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-19 04:51:52.741  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-08-19 04:51:52.742  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-08-19 04:51:52.743 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-08-19 04:51:52.743 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-19 04:51:52.747  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-08-19 04:51:52.748  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-08-19 04:51:52.749 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-19 04:51:52.749 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-19 04:51:52.750 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-19 04:51:52.751 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-19 04:51:52.751 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-19 04:51:52.752 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-19 04:51:52.757 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-19 04:51:52.757 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-19 04:51:52.758 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-19 04:51:52.760 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-08-19 04:51:52.768 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 693749581343008342262084600416440401927137021100
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Aug 19 03:21:11 UTC 2022
           Final Date: Wed Aug 18 03:21:10 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [8c:35:54:c5:01:f2:5c:72:08:ec:83:bd:85:6a:94:e2:e9:e8:70:44]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3379548e129b259a14d749a9d0ac2ed37847a53f
                       a021b1ec74887b0e58b388ec2ca39d23651be420
                       62836d04b7e04f0797d83c028d640933b60bfd2c
                       9a67e227c1c5f0b7b872fb08b99ebb32b98d66eb
                       230619a0789ace4d37e1dbb9362297fe1b555a64
                       ef8b5677d7f053a23721793ff29219562ade72b2
                       a91ba1dfbf9bb236c4e43e8a59497052c0fa8360
                       e9ae5a768c78a95eaf0fd60e7676bf92a57c5c36
                       7c1c2de0de9f7689adeb9d93f03c1d6c61380402
                       dc3c5bd4a77165a2497650087cf0eab01d20ed80
                       315637d160090eb05092902ae36b26c8015d3fc9
                       138df4080e0f485e744c617596afc3a54a1916cb
                       4fcb80be0e00d818d6c2ef3fc48c25ff609e718e
                       1ff486950051f77165b9769627deef0a48264659
                       c1b65e1f12d830dbb752b44d596daf223cdef57b
                       d22087a83653567657cf3542db80cb7953c8056c
                       543bbdc794eda8dbc1f9fae09ef454062bf0e938
                       e1dd493019b71cd8825c40d5350069c540d7e7d4
                       34ba740ba5d0c3db758e1bd356d99c38d4b06b40
                       f18d5f9b
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [80:69:c0:ca:91:46:1d:35:57:5c:87:f2:a6:66:42:91:54:35:e6:c6]
            modulus: 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
    public exponent: 10001

] 
2022-08-19 04:54:48.436  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-08-19 04:54:48.438 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-08-19 04:54:48.440 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-08-19 04:54:48.441 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-08-19 04:54:48.441  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-08-19 04:54:48.442  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-08-19 04:54:48.443  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-08-19 04:54:48.443 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-08-19 04:54:48.444 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-08-19 04:54:48.445 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-08-19 04:54:48.453 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-08-19 04:54:48.453 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-19 04:54:48.454 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-19 04:54:48.454 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-19 04:54:48.629  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-08-19 04:54:48.630  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-08-19 04:54:48.631 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-08-19 04:54:48.631 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-19 04:54:48.635  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-08-19 04:54:48.635  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-08-19 04:54:48.636 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-19 04:54:48.637 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-19 04:54:48.637 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-19 04:54:48.639 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-19 04:54:48.639 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-19 04:54:48.639 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-19 04:54:48.640 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-19 04:54:48.641 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-19 04:54:48.641 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-19 04:54:48.642 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-08-19 04:54:48.647 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 693749581343008342262084600416440401927137021100
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Aug 19 03:21:11 UTC 2022
           Final Date: Wed Aug 18 03:21:10 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [8c:35:54:c5:01:f2:5c:72:08:ec:83:bd:85:6a:94:e2:e9:e8:70:44]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3379548e129b259a14d749a9d0ac2ed37847a53f
                       a021b1ec74887b0e58b388ec2ca39d23651be420
                       62836d04b7e04f0797d83c028d640933b60bfd2c
                       9a67e227c1c5f0b7b872fb08b99ebb32b98d66eb
                       230619a0789ace4d37e1dbb9362297fe1b555a64
                       ef8b5677d7f053a23721793ff29219562ade72b2
                       a91ba1dfbf9bb236c4e43e8a59497052c0fa8360
                       e9ae5a768c78a95eaf0fd60e7676bf92a57c5c36
                       7c1c2de0de9f7689adeb9d93f03c1d6c61380402
                       dc3c5bd4a77165a2497650087cf0eab01d20ed80
                       315637d160090eb05092902ae36b26c8015d3fc9
                       138df4080e0f485e744c617596afc3a54a1916cb
                       4fcb80be0e00d818d6c2ef3fc48c25ff609e718e
                       1ff486950051f77165b9769627deef0a48264659
                       c1b65e1f12d830dbb752b44d596daf223cdef57b
                       d22087a83653567657cf3542db80cb7953c8056c
                       543bbdc794eda8dbc1f9fae09ef454062bf0e938
                       e1dd493019b71cd8825c40d5350069c540d7e7d4
                       34ba740ba5d0c3db758e1bd356d99c38d4b06b40
                       f18d5f9b
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [0c:f8:f9:81:19:6f:46:dd:4c:0a:9d:59:7b:c8:51:70:e4:61:44:d6]
            modulus: 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
    public exponent: 10001

] 
2022-08-19 04:56:36.284  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-08-19 04:56:36.288 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-08-19 04:56:36.291 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-08-19 04:56:36.293 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-08-19 04:56:36.293  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-08-19 04:56:36.294  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-08-19 04:56:36.295  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-08-19 04:56:36.295 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-08-19 04:56:36.296 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-08-19 04:56:36.296 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-08-19 04:56:36.304 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-08-19 04:56:36.305 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-19 04:56:36.306 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-19 04:56:36.306 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-19 04:56:36.576  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-08-19 04:56:36.576  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-08-19 04:56:36.577 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-08-19 04:56:36.577 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-19 04:56:36.580  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-08-19 04:56:36.580  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-08-19 04:56:36.581 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-19 04:56:36.581 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-19 04:56:36.582 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-19 04:56:36.583 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-19 04:56:36.583 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-19 04:56:36.584 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-19 04:56:36.584 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-19 04:56:36.585 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-19 04:56:36.585 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-19 04:56:36.586 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-08-19 04:56:36.593 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 693749581343008342262084600416440401927137021100
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Aug 19 03:21:11 UTC 2022
           Final Date: Wed Aug 18 03:21:10 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [8c:35:54:c5:01:f2:5c:72:08:ec:83:bd:85:6a:94:e2:e9:e8:70:44]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3379548e129b259a14d749a9d0ac2ed37847a53f
                       a021b1ec74887b0e58b388ec2ca39d23651be420
                       62836d04b7e04f0797d83c028d640933b60bfd2c
                       9a67e227c1c5f0b7b872fb08b99ebb32b98d66eb
                       230619a0789ace4d37e1dbb9362297fe1b555a64
                       ef8b5677d7f053a23721793ff29219562ade72b2
                       a91ba1dfbf9bb236c4e43e8a59497052c0fa8360
                       e9ae5a768c78a95eaf0fd60e7676bf92a57c5c36
                       7c1c2de0de9f7689adeb9d93f03c1d6c61380402
                       dc3c5bd4a77165a2497650087cf0eab01d20ed80
                       315637d160090eb05092902ae36b26c8015d3fc9
                       138df4080e0f485e744c617596afc3a54a1916cb
                       4fcb80be0e00d818d6c2ef3fc48c25ff609e718e
                       1ff486950051f77165b9769627deef0a48264659
                       c1b65e1f12d830dbb752b44d596daf223cdef57b
                       d22087a83653567657cf3542db80cb7953c8056c
                       543bbdc794eda8dbc1f9fae09ef454062bf0e938
                       e1dd493019b71cd8825c40d5350069c540d7e7d4
                       34ba740ba5d0c3db758e1bd356d99c38d4b06b40
                       f18d5f9b
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ac:52:f9:47:50:02:d3:78:5c:eb:e3:f2:9c:7b:73:f6:2c:fd:41:33]
            modulus: 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
    public exponent: 10001

] 
2022-08-19 04:58:55.578  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-08-19 04:58:55.580 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-08-19 04:58:55.583 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-08-19 04:58:55.584 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-08-19 04:58:55.585  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-08-19 04:58:55.587  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-08-19 04:58:55.588  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-08-19 04:58:55.588 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-08-19 04:58:55.589 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-08-19 04:58:55.589 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-08-19 04:58:55.597 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-08-19 04:58:55.598 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-19 04:58:55.599 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-19 04:58:55.599 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-19 04:58:55.969  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-08-19 04:58:55.970  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-08-19 04:58:55.970 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-08-19 04:58:55.970 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-19 04:58:55.972  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-08-19 04:58:55.973  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-08-19 04:58:55.974 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-19 04:58:55.974 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-19 04:58:55.974 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-19 04:58:55.975 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-19 04:58:55.975 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-19 04:58:55.976 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-19 04:58:55.977 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-19 04:58:55.977 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-19 04:58:55.977 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-19 04:58:55.978 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-08-19 04:58:55.983 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 693749581343008342262084600416440401927137021100
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Aug 19 03:21:11 UTC 2022
           Final Date: Wed Aug 18 03:21:10 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [8c:35:54:c5:01:f2:5c:72:08:ec:83:bd:85:6a:94:e2:e9:e8:70:44]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3379548e129b259a14d749a9d0ac2ed37847a53f
                       a021b1ec74887b0e58b388ec2ca39d23651be420
                       62836d04b7e04f0797d83c028d640933b60bfd2c
                       9a67e227c1c5f0b7b872fb08b99ebb32b98d66eb
                       230619a0789ace4d37e1dbb9362297fe1b555a64
                       ef8b5677d7f053a23721793ff29219562ade72b2
                       a91ba1dfbf9bb236c4e43e8a59497052c0fa8360
                       e9ae5a768c78a95eaf0fd60e7676bf92a57c5c36
                       7c1c2de0de9f7689adeb9d93f03c1d6c61380402
                       dc3c5bd4a77165a2497650087cf0eab01d20ed80
                       315637d160090eb05092902ae36b26c8015d3fc9
                       138df4080e0f485e744c617596afc3a54a1916cb
                       4fcb80be0e00d818d6c2ef3fc48c25ff609e718e
                       1ff486950051f77165b9769627deef0a48264659
                       c1b65e1f12d830dbb752b44d596daf223cdef57b
                       d22087a83653567657cf3542db80cb7953c8056c
                       543bbdc794eda8dbc1f9fae09ef454062bf0e938
                       e1dd493019b71cd8825c40d5350069c540d7e7d4
                       34ba740ba5d0c3db758e1bd356d99c38d4b06b40
                       f18d5f9b
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [60:b5:fc:cc:40:f9:7c:3e:7d:ff:40:3a:75:16:e6:18:ba:94:07:11]
            modulus: b057f7e59e04ff0ca5121ade9ce12bf44b74aeeb64faa1d5c698ab3b7e2d1af4103a39c190e2ec23968e910e785628089110cf04006ca087f88173e7460a3fb755a6e1b6c095a50bf9443202a74b34624ac94330469f36422ca70a545585c450196af7c1c7ced0121cf9837c2aeb8944de311ea9ffc3f7567d684c0e32834dab0b8f7a2b2d966778b7f7879e50c65c9b6b7fce304db3664c97d17423808743670eaa89bb8eca44e354a855a16f5c22ed705075bd954ab0a03c8e7eaf9765af5032285750e3192ac418745077377ad3f5988312d203d48c2dc7f326fcd5d70df0393e8cd14bb372b50ea35a3ebe1fd2a214a085c3d74fea790e9f560a748ae09d
    public exponent: 10001

] 
2022-08-19 05:01:33.284  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-08-19 05:01:33.290 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-08-19 05:01:33.292 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-08-19 05:01:33.297 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-08-19 05:01:33.298  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-08-19 05:01:33.299  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-08-19 05:01:33.299  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-08-19 05:01:33.300 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-08-19 05:01:33.300 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-08-19 05:01:33.301 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-08-19 05:01:33.307 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-08-19 05:01:33.311 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-19 05:01:33.311 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-19 05:01:33.312 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-19 05:01:33.472  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-08-19 05:01:33.481  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-08-19 05:01:33.482 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-08-19 05:01:33.483 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-19 05:01:33.485  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-08-19 05:01:33.485  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-08-19 05:01:33.486 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-19 05:01:33.487 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-19 05:01:33.487 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-19 05:01:33.488 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-19 05:01:33.488 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-19 05:01:33.489 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-19 05:01:33.489 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-19 05:01:33.490 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-19 05:01:33.490 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-19 05:01:33.491 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-08-19 05:01:33.496 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 693749581343008342262084600416440401927137021100
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Aug 19 03:21:11 UTC 2022
           Final Date: Wed Aug 18 03:21:10 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [8c:35:54:c5:01:f2:5c:72:08:ec:83:bd:85:6a:94:e2:e9:e8:70:44]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3379548e129b259a14d749a9d0ac2ed37847a53f
                       a021b1ec74887b0e58b388ec2ca39d23651be420
                       62836d04b7e04f0797d83c028d640933b60bfd2c
                       9a67e227c1c5f0b7b872fb08b99ebb32b98d66eb
                       230619a0789ace4d37e1dbb9362297fe1b555a64
                       ef8b5677d7f053a23721793ff29219562ade72b2
                       a91ba1dfbf9bb236c4e43e8a59497052c0fa8360
                       e9ae5a768c78a95eaf0fd60e7676bf92a57c5c36
                       7c1c2de0de9f7689adeb9d93f03c1d6c61380402
                       dc3c5bd4a77165a2497650087cf0eab01d20ed80
                       315637d160090eb05092902ae36b26c8015d3fc9
                       138df4080e0f485e744c617596afc3a54a1916cb
                       4fcb80be0e00d818d6c2ef3fc48c25ff609e718e
                       1ff486950051f77165b9769627deef0a48264659
                       c1b65e1f12d830dbb752b44d596daf223cdef57b
                       d22087a83653567657cf3542db80cb7953c8056c
                       543bbdc794eda8dbc1f9fae09ef454062bf0e938
                       e1dd493019b71cd8825c40d5350069c540d7e7d4
                       34ba740ba5d0c3db758e1bd356d99c38d4b06b40
                       f18d5f9b
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [cc:8e:77:90:aa:08:7a:a5:57:19:cc:2f:fd:c0:62:9f:43:0e:cf:c7]
            modulus: a73137d2f8dcbdbfa3e7b0034bfedb7e5b2f4a1bb9c342cc99da2fa767b069115b4e6104b433fe3fd6a42025151a904d12ccf8dcb46f45dde79e7eaa7c95dde16367fe42d32e46b027eea4ca6c95322769f6a44ef1bec8ebe303c8a4f244655120ebd2e05f17120c569aabc2c897799829e682847daf9196a6c1ba40520930e4667834f401e58e82e02d7a2a2c6467bd71ff767b266ca34240faa875ed3f0271ee40bc1bf4cb136911d022576dfc6edd69b4f2b51ab1e2f4551c1c5e0bbe9a9a3fd1c4d1fbd2a09e5a04968a955c54a84f88eed29a88f0d8370ff3f75a89aa66eba5e9abdc6434b89e21585ad8435239d5ad4626b9362c890c8c8a779651d941
    public exponent: 10001

] 
2022-08-19 05:03:19.357  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-08-19 05:03:19.359 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-08-19 05:03:19.362 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-08-19 05:03:19.363 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-08-19 05:03:19.363  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-08-19 05:03:19.364  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-08-19 05:03:19.364  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-08-19 05:03:19.365 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-08-19 05:03:19.365 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-08-19 05:03:19.366 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-08-19 05:03:19.370 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-08-19 05:03:19.371 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-19 05:03:19.372 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-19 05:03:19.373 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-19 05:03:19.561  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-08-19 05:03:19.562  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-08-19 05:03:19.563 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-08-19 05:03:19.563 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-19 05:03:19.566  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-08-19 05:03:19.566  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-08-19 05:03:19.567 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-19 05:03:19.567 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-19 05:03:19.568 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-19 05:03:19.569 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-19 05:03:19.570 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-19 05:03:19.571 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-19 05:03:19.572 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-19 05:03:19.572 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-19 05:03:19.573 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-19 05:03:19.574 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-08-19 05:03:19.578 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 693749581343008342262084600416440401927137021100
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Aug 19 03:21:11 UTC 2022
           Final Date: Wed Aug 18 03:21:10 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [8c:35:54:c5:01:f2:5c:72:08:ec:83:bd:85:6a:94:e2:e9:e8:70:44]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3379548e129b259a14d749a9d0ac2ed37847a53f
                       a021b1ec74887b0e58b388ec2ca39d23651be420
                       62836d04b7e04f0797d83c028d640933b60bfd2c
                       9a67e227c1c5f0b7b872fb08b99ebb32b98d66eb
                       230619a0789ace4d37e1dbb9362297fe1b555a64
                       ef8b5677d7f053a23721793ff29219562ade72b2
                       a91ba1dfbf9bb236c4e43e8a59497052c0fa8360
                       e9ae5a768c78a95eaf0fd60e7676bf92a57c5c36
                       7c1c2de0de9f7689adeb9d93f03c1d6c61380402
                       dc3c5bd4a77165a2497650087cf0eab01d20ed80
                       315637d160090eb05092902ae36b26c8015d3fc9
                       138df4080e0f485e744c617596afc3a54a1916cb
                       4fcb80be0e00d818d6c2ef3fc48c25ff609e718e
                       1ff486950051f77165b9769627deef0a48264659
                       c1b65e1f12d830dbb752b44d596daf223cdef57b
                       d22087a83653567657cf3542db80cb7953c8056c
                       543bbdc794eda8dbc1f9fae09ef454062bf0e938
                       e1dd493019b71cd8825c40d5350069c540d7e7d4
                       34ba740ba5d0c3db758e1bd356d99c38d4b06b40
                       f18d5f9b
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [d6:e1:16:59:1f:61:18:61:c6:e4:3c:5b:0b:70:cb:cf:be:f6:cf:4f]
            modulus: deaa2cecaa1660aa60f25b1cb1bf3cb888e6ae39a14917d26382d0d2fac2e94e38649e128a3538eda1068090a486f6b3610a52d1186ac4a6a8aa53a6b6ea261ed3245a356e59f0402b97daeacb369d9c3706578251ffbd0a0a78ef7e919c820f3f8d9cd8ed9a25550ab5ecf75480176b56020754f1d8e8e44f4575e60936967a97f78067fb36328da2be99c94d99ac7cbeaf03753605929985c7ef2684859d599f288a995e858ad0a740df29a81897f3b48ff4d2990038c7111f01ea902ea413693046d731e69d7a7b9136b258d2e307b6886a8657d93e156fd5fb4e1f6b2a5926b08a771fa44b83e380396f581740394aa5ab0650017182a714e1539ef81d0b
    public exponent: 10001

] 
2022-08-19 05:05:44.966  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-08-19 05:05:44.972 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-08-19 05:05:44.975 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-08-19 05:05:44.978 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-08-19 05:05:44.979  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-08-19 05:05:44.979  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-08-19 05:05:44.980  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-08-19 05:05:44.980 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-08-19 05:05:44.981 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-08-19 05:05:44.982 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-08-19 05:05:44.987 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-08-19 05:05:44.989 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-19 05:05:44.989 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-19 05:05:44.990 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-19 05:05:45.219  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-08-19 05:05:45.220  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-08-19 05:05:45.220 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-08-19 05:05:45.220 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-19 05:05:45.222  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-08-19 05:05:45.222  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-08-19 05:05:45.223 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-19 05:05:45.223 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-19 05:05:45.223 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-19 05:05:45.224 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-19 05:05:45.224 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-19 05:05:45.225 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-19 05:05:45.226 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-19 05:05:45.226 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-19 05:05:45.226 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-19 05:05:45.227 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-08-19 05:05:45.231 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 693749581343008342262084600416440401927137021100
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Aug 19 03:21:11 UTC 2022
           Final Date: Wed Aug 18 03:21:10 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [8c:35:54:c5:01:f2:5c:72:08:ec:83:bd:85:6a:94:e2:e9:e8:70:44]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3379548e129b259a14d749a9d0ac2ed37847a53f
                       a021b1ec74887b0e58b388ec2ca39d23651be420
                       62836d04b7e04f0797d83c028d640933b60bfd2c
                       9a67e227c1c5f0b7b872fb08b99ebb32b98d66eb
                       230619a0789ace4d37e1dbb9362297fe1b555a64
                       ef8b5677d7f053a23721793ff29219562ade72b2
                       a91ba1dfbf9bb236c4e43e8a59497052c0fa8360
                       e9ae5a768c78a95eaf0fd60e7676bf92a57c5c36
                       7c1c2de0de9f7689adeb9d93f03c1d6c61380402
                       dc3c5bd4a77165a2497650087cf0eab01d20ed80
                       315637d160090eb05092902ae36b26c8015d3fc9
                       138df4080e0f485e744c617596afc3a54a1916cb
                       4fcb80be0e00d818d6c2ef3fc48c25ff609e718e
                       1ff486950051f77165b9769627deef0a48264659
                       c1b65e1f12d830dbb752b44d596daf223cdef57b
                       d22087a83653567657cf3542db80cb7953c8056c
                       543bbdc794eda8dbc1f9fae09ef454062bf0e938
                       e1dd493019b71cd8825c40d5350069c540d7e7d4
                       34ba740ba5d0c3db758e1bd356d99c38d4b06b40
                       f18d5f9b
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [38:77:38:8c:7b:27:7b:a6:5b:7e:5e:ce:fe:1b:c6:f3:32:44:f5:ce]
            modulus: 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
    public exponent: 10001

] 
2022-08-19 05:07:22.151  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-08-19 05:07:22.155 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-08-19 05:07:22.157 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-08-19 05:07:22.158 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-08-19 05:07:22.158  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-08-19 05:07:22.159  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-08-19 05:07:22.160  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-08-19 05:07:22.160 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-08-19 05:07:22.161 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-08-19 05:07:22.161 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-08-19 05:07:22.166 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-08-19 05:07:22.167 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-19 05:07:22.167 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-19 05:07:22.168 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-19 05:07:22.404  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-08-19 05:07:22.405  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-08-19 05:07:22.406 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-08-19 05:07:22.406 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-19 05:07:22.408  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-08-19 05:07:22.409  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-08-19 05:07:22.409 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-19 05:07:22.410 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-19 05:07:22.410 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-19 05:07:22.411 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-19 05:07:22.411 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-19 05:07:22.412 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-19 05:07:22.413 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-19 05:07:22.413 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-19 05:07:22.413 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-19 05:07:22.414 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-08-19 05:07:22.420 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 693749581343008342262084600416440401927137021100
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Aug 19 03:21:11 UTC 2022
           Final Date: Wed Aug 18 03:21:10 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [8c:35:54:c5:01:f2:5c:72:08:ec:83:bd:85:6a:94:e2:e9:e8:70:44]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3379548e129b259a14d749a9d0ac2ed37847a53f
                       a021b1ec74887b0e58b388ec2ca39d23651be420
                       62836d04b7e04f0797d83c028d640933b60bfd2c
                       9a67e227c1c5f0b7b872fb08b99ebb32b98d66eb
                       230619a0789ace4d37e1dbb9362297fe1b555a64
                       ef8b5677d7f053a23721793ff29219562ade72b2
                       a91ba1dfbf9bb236c4e43e8a59497052c0fa8360
                       e9ae5a768c78a95eaf0fd60e7676bf92a57c5c36
                       7c1c2de0de9f7689adeb9d93f03c1d6c61380402
                       dc3c5bd4a77165a2497650087cf0eab01d20ed80
                       315637d160090eb05092902ae36b26c8015d3fc9
                       138df4080e0f485e744c617596afc3a54a1916cb
                       4fcb80be0e00d818d6c2ef3fc48c25ff609e718e
                       1ff486950051f77165b9769627deef0a48264659
                       c1b65e1f12d830dbb752b44d596daf223cdef57b
                       d22087a83653567657cf3542db80cb7953c8056c
                       543bbdc794eda8dbc1f9fae09ef454062bf0e938
                       e1dd493019b71cd8825c40d5350069c540d7e7d4
                       34ba740ba5d0c3db758e1bd356d99c38d4b06b40
                       f18d5f9b
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [e5:7e:0e:87:9a:80:d9:cd:8d:63:df:44:54:d4:01:cf:02:71:95:01]
            modulus: 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
    public exponent: 10001

] 
2022-08-19 05:11:31.343  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-08-19 05:11:31.347 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-08-19 05:11:31.350 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-08-19 05:11:31.352 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-08-19 05:11:31.352  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-08-19 05:11:31.353  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-08-19 05:11:31.354  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-08-19 05:11:31.354 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-08-19 05:11:31.355 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-08-19 05:11:31.355 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-08-19 05:11:31.361 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-08-19 05:11:31.362 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-19 05:11:31.362 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-19 05:11:31.363 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-19 05:11:31.553  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-08-19 05:11:31.554  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-08-19 05:11:31.555 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-08-19 05:11:31.555 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-19 05:11:31.557  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-08-19 05:11:31.558  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-08-19 05:11:31.559 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-19 05:11:31.559 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-19 05:11:31.560 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-19 05:11:31.561 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-19 05:11:31.562 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-19 05:11:31.562 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-19 05:11:31.563 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-19 05:11:31.564 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-19 05:11:31.564 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-19 05:11:31.565 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-08-19 05:11:31.571 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 693749581343008342262084600416440401927137021100
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Aug 19 03:21:11 UTC 2022
           Final Date: Wed Aug 18 03:21:10 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [8c:35:54:c5:01:f2:5c:72:08:ec:83:bd:85:6a:94:e2:e9:e8:70:44]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3379548e129b259a14d749a9d0ac2ed37847a53f
                       a021b1ec74887b0e58b388ec2ca39d23651be420
                       62836d04b7e04f0797d83c028d640933b60bfd2c
                       9a67e227c1c5f0b7b872fb08b99ebb32b98d66eb
                       230619a0789ace4d37e1dbb9362297fe1b555a64
                       ef8b5677d7f053a23721793ff29219562ade72b2
                       a91ba1dfbf9bb236c4e43e8a59497052c0fa8360
                       e9ae5a768c78a95eaf0fd60e7676bf92a57c5c36
                       7c1c2de0de9f7689adeb9d93f03c1d6c61380402
                       dc3c5bd4a77165a2497650087cf0eab01d20ed80
                       315637d160090eb05092902ae36b26c8015d3fc9
                       138df4080e0f485e744c617596afc3a54a1916cb
                       4fcb80be0e00d818d6c2ef3fc48c25ff609e718e
                       1ff486950051f77165b9769627deef0a48264659
                       c1b65e1f12d830dbb752b44d596daf223cdef57b
                       d22087a83653567657cf3542db80cb7953c8056c
                       543bbdc794eda8dbc1f9fae09ef454062bf0e938
                       e1dd493019b71cd8825c40d5350069c540d7e7d4
                       34ba740ba5d0c3db758e1bd356d99c38d4b06b40
                       f18d5f9b
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [8d:0d:a3:35:0d:af:8d:6f:7d:78:a2:a6:2a:01:5e:01:b5:eb:65:a0]
            modulus: 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
    public exponent: 10001

] 
2022-08-19 05:13:03.185  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-08-19 05:13:03.186 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-08-19 05:13:03.188 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-08-19 05:13:03.188 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-08-19 05:13:03.189  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-08-19 05:13:03.189  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-08-19 05:13:03.190  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-08-19 05:13:03.190 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-08-19 05:13:03.191 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-08-19 05:13:03.191 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-08-19 05:13:03.196 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-08-19 05:13:03.197 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-19 05:13:03.197 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-19 05:13:03.197 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-19 05:13:03.392  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-08-19 05:13:03.392  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-08-19 05:13:03.393 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-08-19 05:13:03.393 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-19 05:13:03.395  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-08-19 05:13:03.395  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-08-19 05:13:03.395 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-19 05:13:03.396 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-19 05:13:03.396 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-19 05:13:03.397 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-19 05:13:03.397 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-19 05:13:03.397 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-19 05:13:03.398 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-19 05:13:03.399 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-19 05:13:03.399 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-19 05:13:03.400 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-08-19 05:13:03.404 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 693749581343008342262084600416440401927137021100
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Aug 19 03:21:11 UTC 2022
           Final Date: Wed Aug 18 03:21:10 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [8c:35:54:c5:01:f2:5c:72:08:ec:83:bd:85:6a:94:e2:e9:e8:70:44]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3379548e129b259a14d749a9d0ac2ed37847a53f
                       a021b1ec74887b0e58b388ec2ca39d23651be420
                       62836d04b7e04f0797d83c028d640933b60bfd2c
                       9a67e227c1c5f0b7b872fb08b99ebb32b98d66eb
                       230619a0789ace4d37e1dbb9362297fe1b555a64
                       ef8b5677d7f053a23721793ff29219562ade72b2
                       a91ba1dfbf9bb236c4e43e8a59497052c0fa8360
                       e9ae5a768c78a95eaf0fd60e7676bf92a57c5c36
                       7c1c2de0de9f7689adeb9d93f03c1d6c61380402
                       dc3c5bd4a77165a2497650087cf0eab01d20ed80
                       315637d160090eb05092902ae36b26c8015d3fc9
                       138df4080e0f485e744c617596afc3a54a1916cb
                       4fcb80be0e00d818d6c2ef3fc48c25ff609e718e
                       1ff486950051f77165b9769627deef0a48264659
                       c1b65e1f12d830dbb752b44d596daf223cdef57b
                       d22087a83653567657cf3542db80cb7953c8056c
                       543bbdc794eda8dbc1f9fae09ef454062bf0e938
                       e1dd493019b71cd8825c40d5350069c540d7e7d4
                       34ba740ba5d0c3db758e1bd356d99c38d4b06b40
                       f18d5f9b
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [42:0f:b5:63:33:44:4f:40:b5:73:b1:67:18:ff:e4:ba:ec:d7:4b:70]
            modulus: abe0d09668689319dd208be786826b437582ab5f2ed5c04c6e6a8af2017fec0e7cda3d3afd4070d7b11c96450106becea6dc0385a9ecadbe1db220a004763c03a8f409e170b4424fa88b1b366ce0d1b66741285087f713c0b8a88afb3d03277cf1472c3121f1ad655eba6002cab8a9e8abd6e0b7e3e692c7419a374e33354fb2aecd8e9dafa00f107b86b017c5e5f79a227eb191f0fde7e21070398643c113e95dfe0fe08640048c2b7dfe6227a9223257eefe135350bc1e0260fb21acbb0c6efd19ec275e2864b22244ba95bd44d8061dcd375df9845359d3ea8f866e4de161a405e300bffe1a65190a81d7c8ceeeac1b6bd7839e3c0d1439a81aaed9baf623
    public exponent: 10001

] 
2022-08-19 05:13:24.390  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-08-19 05:13:24.391 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-08-19 05:13:24.392 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-08-19 05:13:24.393 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-08-19 05:13:24.393  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-08-19 05:13:24.394  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-08-19 05:13:24.394  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-08-19 05:13:24.395 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-08-19 05:13:24.395 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-08-19 05:13:24.396 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-08-19 05:13:24.400 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-08-19 05:13:24.401 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-19 05:13:24.402 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-19 05:13:24.402 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-19 05:13:24.575  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-08-19 05:13:24.575  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-08-19 05:13:24.576 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-08-19 05:13:24.576 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-19 05:13:24.578  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-08-19 05:13:24.579  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-08-19 05:13:24.579 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-19 05:13:24.579 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-19 05:13:24.580 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-19 05:13:24.581 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-19 05:13:24.581 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-19 05:13:24.582 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-19 05:13:24.583 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-19 05:13:24.583 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-19 05:13:24.583 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-19 05:13:24.584 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-08-19 05:13:24.589 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 693749581343008342262084600416440401927137021100
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Aug 19 03:21:11 UTC 2022
           Final Date: Wed Aug 18 03:21:10 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [8c:35:54:c5:01:f2:5c:72:08:ec:83:bd:85:6a:94:e2:e9:e8:70:44]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3379548e129b259a14d749a9d0ac2ed37847a53f
                       a021b1ec74887b0e58b388ec2ca39d23651be420
                       62836d04b7e04f0797d83c028d640933b60bfd2c
                       9a67e227c1c5f0b7b872fb08b99ebb32b98d66eb
                       230619a0789ace4d37e1dbb9362297fe1b555a64
                       ef8b5677d7f053a23721793ff29219562ade72b2
                       a91ba1dfbf9bb236c4e43e8a59497052c0fa8360
                       e9ae5a768c78a95eaf0fd60e7676bf92a57c5c36
                       7c1c2de0de9f7689adeb9d93f03c1d6c61380402
                       dc3c5bd4a77165a2497650087cf0eab01d20ed80
                       315637d160090eb05092902ae36b26c8015d3fc9
                       138df4080e0f485e744c617596afc3a54a1916cb
                       4fcb80be0e00d818d6c2ef3fc48c25ff609e718e
                       1ff486950051f77165b9769627deef0a48264659
                       c1b65e1f12d830dbb752b44d596daf223cdef57b
                       d22087a83653567657cf3542db80cb7953c8056c
                       543bbdc794eda8dbc1f9fae09ef454062bf0e938
                       e1dd493019b71cd8825c40d5350069c540d7e7d4
                       34ba740ba5d0c3db758e1bd356d99c38d4b06b40
                       f18d5f9b
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [21:44:22:1b:06:81:f4:19:ae:eb:1d:3c:6b:06:a2:80:c0:3e:4d:0d]
            modulus: cd8a19b810a521ec4177f1dfbacf34fd1ddb9ef976fa00b6e33dd24034a527f29202d7d05557063a19204565c5505b0f5a93462d9dcc558da1c1b3cd85a8863abefef803c242799b9a778bce8cd6a11204c2d0431b76643282671fc1e627343ee134b5bcd1da3d554d3a78fa49894a90b413a5a416a838040aa86e130ca59cf68c50bb4db430dd6f0d9fc28b0e9ff4725f5d20169656b7e1ff6ba7f2cd69b76c7409757b21bcadc7bb46b4e4ceb1cba60f08e8ad9684f602ce4fcaacb30f72ccccb5e8d098964ab63e14c12da3d70b5db4699d415c560cf583f63f12893bdb27861a6abea4e339e193421f465f449df7e8e70e3dc31502270d6b47f69de94be1
    public exponent: 10001

]