Results

By type

          2022-05-26 11:27:12,372 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-05-26 11:27:13,479 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-05-26 11:27:14.293  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
May 26, 2022 11:27:16 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
May 26, 2022 11:27:16 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
May 26, 2022 11:27:16 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
May 26, 2022 11:27:16 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-05-26 11:27:16.980 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-05-26 11:27:17.302  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-05-26 11:27:17.479  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-05-26 11:27:18.287 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-05-26 11:27:18.292 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
2022-05-26 11:27:18.295 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-05-26 11:27:18.302 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-05-26 11:27:18.350 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2022-05-26 11:27:18.355 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/docs]}: redirectToUi(HttpServletRequest)
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
2022-05-26 11:27:18.500 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-05-26 11:27:19.144 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
May 26, 2022 11:27:19 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-05-26 11:27:20.270  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 8.769 seconds (JVM running for 10.753)
May 26, 2022 11:27:41 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-05-26 11:27:56.964  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-26 11:27:56.976 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-26 11:27:57.025 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-05-26 11:27:57.032 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-26 11:27:57.058  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-05-26 11:27:57.061  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-26 11:27:57.063  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-26 11:27:57.065 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-26 11:27:57.065 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-26 11:27:57.071 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-26 11:27:57.079 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-26 11:27:57.083 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-26 11:27:57.124 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-26 11:27:57.129 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-26 11:27:57.130 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-26 11:27:57.134 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-26 11:27:57.909  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-26 11:27:57.913  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-26 11:27:57.913 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-26 11:27:57.915 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-26 11:27:57.926  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-26 11:27:57.927  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-26 11:27:57.928 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-26 11:27:57.929 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-26 11:27:57.929 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-26 11:27:57.943 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-26 11:27:57.944 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-26 11:27:57.944 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-26 11:27:57.951 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-26 11:27:57.951 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-26 11:27:57.952 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-26 11:27:57.953 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-26 11:27:57.987 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 341874170106752460088332440103550214104572878976
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu May 26 11:24:02 UTC 2022
           Final Date: Tue May 25 11:24:01 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f6:30:53:d4:40:f8:6a:3e:32:f1:4f:77:f0:a6:d2:08:88:f8:14:76]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 2c38453627e1f87ec0061c73d8e601f87bbed631
                       d9262bfc7d92a60a1f54bd5ccc23d5001938c533
                       bcd17d9dbdae4a04bc86e45e52f7c25aaed64868
                       f2830766c3e1aa6ac37c8f9c8cf31b223637047e
                       21718766b31155dd3e166b49d0182a283789196f
                       e5e43290bd3ae5c563a8ed25f1409c3df3d421a7
                       2894759a5ab72d397fabcf84c8a80b9d1d44a05c
                       55f93ccbd259dc044c24c72b826a62c61addde3c
                       e91849296893b89918fe312241997d2e60c02783
                       29ca4d0ad81b5f4b1f720d83cb071ca45b431431
                       fee3c8866648ae8c7086f319a39e839a81da9252
                       194ef6eace72ef5aee41f53f9fce61c07018fcb0
                       d52c737333a8217863e6b46dfdacb1dff1034cb2
                       b7f3c953ea8b8cc9aae00bf645719e8cdc8c5335
                       921d8bbf2f96269bf43804826d7e3116722b928f
                       909e21379c5627041e1bbe80b66c4cd1012f72d0
                       a78c403dba5151b20c868c35244b61b3453e727e
                       d45277b0ff39a18f6d4bf5d79d51b5f631bbc893
                       87c41de3846d4bc7e674f9a617a18d6cdb4345ce
                       4cf222e3
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [c4:de:b4:5e:2e:6d:1d:43:a6:04:89:94:bf:c0:db:f6:00:72:ee:44]
            modulus: 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
    public exponent: 10001

] 
2022-05-26 14:28:08.024  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-26 14:28:08.031 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-26 14:28:08.035 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-26 14:28:08.037 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-26 14:28:08.038  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-26 14:28:08.039  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-26 14:28:08.040  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-26 14:28:08.041 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-26 14:28:08.042 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-26 14:28:08.043 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-26 14:28:08.053 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-26 14:28:08.055 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-26 14:28:08.055 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-26 14:28:08.056 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-26 14:28:08.253  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-26 14:28:08.254  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-26 14:28:08.254 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-26 14:28:08.254 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-26 14:28:08.259  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-26 14:28:08.259  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-26 14:28:08.260 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-26 14:28:08.261 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-26 14:28:08.261 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-26 14:28:08.263 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-26 14:28:08.264 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-26 14:28:08.265 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-26 14:28:08.266 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-26 14:28:08.267 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-26 14:28:08.267 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-26 14:28:08.269 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-26 14:28:08.278 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 341874170106752460088332440103550214104572878976
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu May 26 11:24:02 UTC 2022
           Final Date: Tue May 25 11:24:01 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f6:30:53:d4:40:f8:6a:3e:32:f1:4f:77:f0:a6:d2:08:88:f8:14:76]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 2c38453627e1f87ec0061c73d8e601f87bbed631
                       d9262bfc7d92a60a1f54bd5ccc23d5001938c533
                       bcd17d9dbdae4a04bc86e45e52f7c25aaed64868
                       f2830766c3e1aa6ac37c8f9c8cf31b223637047e
                       21718766b31155dd3e166b49d0182a283789196f
                       e5e43290bd3ae5c563a8ed25f1409c3df3d421a7
                       2894759a5ab72d397fabcf84c8a80b9d1d44a05c
                       55f93ccbd259dc044c24c72b826a62c61addde3c
                       e91849296893b89918fe312241997d2e60c02783
                       29ca4d0ad81b5f4b1f720d83cb071ca45b431431
                       fee3c8866648ae8c7086f319a39e839a81da9252
                       194ef6eace72ef5aee41f53f9fce61c07018fcb0
                       d52c737333a8217863e6b46dfdacb1dff1034cb2
                       b7f3c953ea8b8cc9aae00bf645719e8cdc8c5335
                       921d8bbf2f96269bf43804826d7e3116722b928f
                       909e21379c5627041e1bbe80b66c4cd1012f72d0
                       a78c403dba5151b20c868c35244b61b3453e727e
                       d45277b0ff39a18f6d4bf5d79d51b5f631bbc893
                       87c41de3846d4bc7e674f9a617a18d6cdb4345ce
                       4cf222e3
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [29:7e:87:39:b3:c7:18:66:d9:2c:fb:1d:21:60:21:68:7a:fb:3f:89]
            modulus: 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
    public exponent: 10001

] 
2022-05-26 14:29:56.051  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-26 14:29:56.052 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-26 14:29:56.054 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-05-26 14:29:56.055 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-26 14:29:56.056  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-05-26 14:29:56.057  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-26 14:29:56.057  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-26 14:29:56.058 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-26 14:29:56.058 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-26 14:29:56.059 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-26 14:29:56.068 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-26 14:29:56.068 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-26 14:29:56.069 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-26 14:29:56.069 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-26 14:29:56.311  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-26 14:29:56.312  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-26 14:29:56.312 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-26 14:29:56.313 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-26 14:29:56.315  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-26 14:29:56.316  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-26 14:29:56.316 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-26 14:29:56.317 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-26 14:29:56.317 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-26 14:29:56.318 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-26 14:29:56.319 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-26 14:29:56.319 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-26 14:29:56.320 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-26 14:29:56.321 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-26 14:29:56.321 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-26 14:29:56.322 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-26 14:29:56.326 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 341874170106752460088332440103550214104572878976
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu May 26 11:24:02 UTC 2022
           Final Date: Tue May 25 11:24:01 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f6:30:53:d4:40:f8:6a:3e:32:f1:4f:77:f0:a6:d2:08:88:f8:14:76]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 2c38453627e1f87ec0061c73d8e601f87bbed631
                       d9262bfc7d92a60a1f54bd5ccc23d5001938c533
                       bcd17d9dbdae4a04bc86e45e52f7c25aaed64868
                       f2830766c3e1aa6ac37c8f9c8cf31b223637047e
                       21718766b31155dd3e166b49d0182a283789196f
                       e5e43290bd3ae5c563a8ed25f1409c3df3d421a7
                       2894759a5ab72d397fabcf84c8a80b9d1d44a05c
                       55f93ccbd259dc044c24c72b826a62c61addde3c
                       e91849296893b89918fe312241997d2e60c02783
                       29ca4d0ad81b5f4b1f720d83cb071ca45b431431
                       fee3c8866648ae8c7086f319a39e839a81da9252
                       194ef6eace72ef5aee41f53f9fce61c07018fcb0
                       d52c737333a8217863e6b46dfdacb1dff1034cb2
                       b7f3c953ea8b8cc9aae00bf645719e8cdc8c5335
                       921d8bbf2f96269bf43804826d7e3116722b928f
                       909e21379c5627041e1bbe80b66c4cd1012f72d0
                       a78c403dba5151b20c868c35244b61b3453e727e
                       d45277b0ff39a18f6d4bf5d79d51b5f631bbc893
                       87c41de3846d4bc7e674f9a617a18d6cdb4345ce
                       4cf222e3
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [fb:61:8b:9e:9e:c8:08:a3:db:ee:56:4b:d2:4c:bd:2c:15:0a:4f:5e]
            modulus: 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
    public exponent: 10001

] 
2022-05-26 14:30:53.632  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-26 14:30:53.633 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-26 14:30:53.635 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-05-26 14:30:53.637 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-26 14:30:53.638  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-05-26 14:30:53.639  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-26 14:30:53.640  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-26 14:30:53.641 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-26 14:30:53.641 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-26 14:30:53.642 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-26 14:30:53.653 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-26 14:30:53.654 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-26 14:30:53.654 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-26 14:30:53.655 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-26 14:30:53.816  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-26 14:30:53.817  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-26 14:30:53.817 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-26 14:30:53.818 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-26 14:30:53.820  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-26 14:30:53.821  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-26 14:30:53.822 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-26 14:30:53.822 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-26 14:30:53.823 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-26 14:30:53.823 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-26 14:30:53.823 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-26 14:30:53.824 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-26 14:30:53.824 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-26 14:30:53.825 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-26 14:30:53.825 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-26 14:30:53.826 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-26 14:30:53.829 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 341874170106752460088332440103550214104572878976
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu May 26 11:24:02 UTC 2022
           Final Date: Tue May 25 11:24:01 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f6:30:53:d4:40:f8:6a:3e:32:f1:4f:77:f0:a6:d2:08:88:f8:14:76]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 2c38453627e1f87ec0061c73d8e601f87bbed631
                       d9262bfc7d92a60a1f54bd5ccc23d5001938c533
                       bcd17d9dbdae4a04bc86e45e52f7c25aaed64868
                       f2830766c3e1aa6ac37c8f9c8cf31b223637047e
                       21718766b31155dd3e166b49d0182a283789196f
                       e5e43290bd3ae5c563a8ed25f1409c3df3d421a7
                       2894759a5ab72d397fabcf84c8a80b9d1d44a05c
                       55f93ccbd259dc044c24c72b826a62c61addde3c
                       e91849296893b89918fe312241997d2e60c02783
                       29ca4d0ad81b5f4b1f720d83cb071ca45b431431
                       fee3c8866648ae8c7086f319a39e839a81da9252
                       194ef6eace72ef5aee41f53f9fce61c07018fcb0
                       d52c737333a8217863e6b46dfdacb1dff1034cb2
                       b7f3c953ea8b8cc9aae00bf645719e8cdc8c5335
                       921d8bbf2f96269bf43804826d7e3116722b928f
                       909e21379c5627041e1bbe80b66c4cd1012f72d0
                       a78c403dba5151b20c868c35244b61b3453e727e
                       d45277b0ff39a18f6d4bf5d79d51b5f631bbc893
                       87c41de3846d4bc7e674f9a617a18d6cdb4345ce
                       4cf222e3
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [fe:b0:07:81:30:04:bc:a0:46:8c:ef:a4:e9:bd:e6:b4:b8:1d:8e:3c]
            modulus: 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
    public exponent: 10001

] 
2022-05-26 14:33:05.573  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-26 14:33:05.574 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-26 14:33:05.577 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-26 14:33:05.578 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-26 14:33:05.578  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-26 14:33:05.581  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-26 14:33:05.582  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-26 14:33:05.585 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-26 14:33:05.585 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-26 14:33:05.586 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-26 14:33:05.595 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-26 14:33:05.596 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-26 14:33:05.596 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-26 14:33:05.597 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-26 14:33:05.734  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-26 14:33:05.735  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-26 14:33:05.735 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-26 14:33:05.735 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-26 14:33:05.737  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-26 14:33:05.738  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-26 14:33:05.739 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-26 14:33:05.739 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-26 14:33:05.740 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-26 14:33:05.740 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-26 14:33:05.741 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-26 14:33:05.741 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-26 14:33:05.742 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-26 14:33:05.742 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-26 14:33:05.742 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-26 14:33:05.743 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-26 14:33:05.747 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 341874170106752460088332440103550214104572878976
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu May 26 11:24:02 UTC 2022
           Final Date: Tue May 25 11:24:01 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f6:30:53:d4:40:f8:6a:3e:32:f1:4f:77:f0:a6:d2:08:88:f8:14:76]
            modulus: bf76c61f1a81a56aafc0b8d388a08f10478f2c087b57477780a8ce5cf52134bf13cf8d0460bea91b8f1e3831a1d65b720672e7ea2ec380e26d547b95c599556cf3fad28a2c63d177a3db44ed5e8f87fc50aba430fa30d91cbe5fa8181557132baf3a83c0282849af008e38b56b0aaee5283d910c45b0a1f31ebf3c9cf0556646209195d98e093533de611f29db0025c44e851d8b0827213408c01339035143628cb0de2d57f581a31c910dc874df2987b9b4a86b6ece31f03ba37711d365632698464a72c1d2ae911f2a6228dc0c4091efd4b7b594ca129b140d82738ae2d8c05ed54038896f4e6b51349891f5e8b579ea0ec7c34d4e1533878c974c8622887ed0de71d86a5b2f6bc3392bfcb34ca90a0a098867f33a846e92a4b25cb74ba4cd610fcb5065e9d576fbeb53d9079a3c3eefd7b8317cf4e6e8ce100a7aa2e2c95eb593d23eeca77fb33699b62b5a6f1a7826f991370954373d5b6d210b45fc56783513cfc1dd38e7a83bb07f6d28568c9b55c8171658a9d80a51b63033f24de0a3
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 2c38453627e1f87ec0061c73d8e601f87bbed631
                       d9262bfc7d92a60a1f54bd5ccc23d5001938c533
                       bcd17d9dbdae4a04bc86e45e52f7c25aaed64868
                       f2830766c3e1aa6ac37c8f9c8cf31b223637047e
                       21718766b31155dd3e166b49d0182a283789196f
                       e5e43290bd3ae5c563a8ed25f1409c3df3d421a7
                       2894759a5ab72d397fabcf84c8a80b9d1d44a05c
                       55f93ccbd259dc044c24c72b826a62c61addde3c
                       e91849296893b89918fe312241997d2e60c02783
                       29ca4d0ad81b5f4b1f720d83cb071ca45b431431
                       fee3c8866648ae8c7086f319a39e839a81da9252
                       194ef6eace72ef5aee41f53f9fce61c07018fcb0
                       d52c737333a8217863e6b46dfdacb1dff1034cb2
                       b7f3c953ea8b8cc9aae00bf645719e8cdc8c5335
                       921d8bbf2f96269bf43804826d7e3116722b928f
                       909e21379c5627041e1bbe80b66c4cd1012f72d0
                       a78c403dba5151b20c868c35244b61b3453e727e
                       d45277b0ff39a18f6d4bf5d79d51b5f631bbc893
                       87c41de3846d4bc7e674f9a617a18d6cdb4345ce
                       4cf222e3
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [bb:92:57:35:fc:af:cc:4e:e2:67:ba:30:78:6e:c0:86:93:ac:0e:42]
            modulus: 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
    public exponent: 10001

] 
2022-05-26 15:31:04.643  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-26 15:31:04.647 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-26 15:31:04.650 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-05-26 15:31:04.651 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-26 15:31:04.652  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-05-26 15:31:04.653  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-26 15:31:04.654  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-26 15:31:04.654 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-26 15:31:04.655 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-26 15:31:04.655 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-26 15:31:04.663 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-26 15:31:04.664 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-26 15:31:04.665 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-26 15:31:04.665 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-26 15:31:04.916  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-26 15:31:04.917  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-26 15:31:04.917 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-26 15:31:04.918 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-26 15:31:04.919  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-26 15:31:04.920  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-26 15:31:04.920 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-26 15:31:04.921 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-26 15:31:04.921 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-26 15:31:04.922 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-26 15:31:04.922 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-26 15:31:04.922 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-26 15:31:04.923 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-26 15:31:04.924 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-26 15:31:04.924 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-26 15:31:04.925 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-26 15:31:04.930 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 341874170106752460088332440103550214104572878976
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu May 26 11:24:02 UTC 2022
           Final Date: Tue May 25 11:24:01 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f6:30:53:d4:40:f8:6a:3e:32:f1:4f:77:f0:a6:d2:08:88:f8:14:76]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 2c38453627e1f87ec0061c73d8e601f87bbed631
                       d9262bfc7d92a60a1f54bd5ccc23d5001938c533
                       bcd17d9dbdae4a04bc86e45e52f7c25aaed64868
                       f2830766c3e1aa6ac37c8f9c8cf31b223637047e
                       21718766b31155dd3e166b49d0182a283789196f
                       e5e43290bd3ae5c563a8ed25f1409c3df3d421a7
                       2894759a5ab72d397fabcf84c8a80b9d1d44a05c
                       55f93ccbd259dc044c24c72b826a62c61addde3c
                       e91849296893b89918fe312241997d2e60c02783
                       29ca4d0ad81b5f4b1f720d83cb071ca45b431431
                       fee3c8866648ae8c7086f319a39e839a81da9252
                       194ef6eace72ef5aee41f53f9fce61c07018fcb0
                       d52c737333a8217863e6b46dfdacb1dff1034cb2
                       b7f3c953ea8b8cc9aae00bf645719e8cdc8c5335
                       921d8bbf2f96269bf43804826d7e3116722b928f
                       909e21379c5627041e1bbe80b66c4cd1012f72d0
                       a78c403dba5151b20c868c35244b61b3453e727e
                       d45277b0ff39a18f6d4bf5d79d51b5f631bbc893
                       87c41de3846d4bc7e674f9a617a18d6cdb4345ce
                       4cf222e3
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [5d:4c:83:7b:da:df:a1:34:85:dd:68:e0:d7:00:b0:e3:a2:a3:47:1d]
            modulus: be04519bc8b724578ca510458b6b4915265999492753f8ae9803bd72410ced7eda45a23d88240e1a3b9ca515fec49159d36fc5d1c6885ceb500bc6b7274241dd05636f536c28509174bf9a874e2302f6285193927cc6df1650ebf82bcd7fa2b135dda53fc070a8e144034b0558bae1be86f9f59ac0a5839685abacf359cb77932b20fc4014eb8d4f47898a8431fcb196f36ba39adec968fd74cbe888c7c444538dc2a6e7268d4350316085637de3382ceb5cc8e1300fdfdb9df7694ba761b7809515d30f57e3bc4603ba29c88cd306dc8c2ba83fdd877b123c1c4e7b15de966e83743f13c2e0c1d74c68fde94197088db86ede9ef632b027f710db9f6179ee31
    public exponent: 10001

] 
2022-05-26 15:40:18.581  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-26 15:40:18.584 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-26 15:40:18.586 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-05-26 15:40:18.587 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-26 15:40:18.588  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-05-26 15:40:18.589  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-26 15:40:18.590  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-26 15:40:18.590 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-26 15:40:18.591 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-26 15:40:18.591 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-26 15:40:18.597 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-26 15:40:18.598 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-26 15:40:18.598 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-26 15:40:18.599 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-26 15:40:18.770  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-26 15:40:18.771  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-26 15:40:18.771 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-26 15:40:18.772 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-26 15:40:18.775  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-26 15:40:18.775  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-26 15:40:18.776 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-26 15:40:18.776 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-26 15:40:18.776 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-26 15:40:18.777 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-26 15:40:18.777 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-26 15:40:18.778 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-26 15:40:18.778 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-26 15:40:18.779 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-26 15:40:18.779 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-26 15:40:18.780 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-26 15:40:18.784 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 341874170106752460088332440103550214104572878976
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu May 26 11:24:02 UTC 2022
           Final Date: Tue May 25 11:24:01 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f6:30:53:d4:40:f8:6a:3e:32:f1:4f:77:f0:a6:d2:08:88:f8:14:76]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 2c38453627e1f87ec0061c73d8e601f87bbed631
                       d9262bfc7d92a60a1f54bd5ccc23d5001938c533
                       bcd17d9dbdae4a04bc86e45e52f7c25aaed64868
                       f2830766c3e1aa6ac37c8f9c8cf31b223637047e
                       21718766b31155dd3e166b49d0182a283789196f
                       e5e43290bd3ae5c563a8ed25f1409c3df3d421a7
                       2894759a5ab72d397fabcf84c8a80b9d1d44a05c
                       55f93ccbd259dc044c24c72b826a62c61addde3c
                       e91849296893b89918fe312241997d2e60c02783
                       29ca4d0ad81b5f4b1f720d83cb071ca45b431431
                       fee3c8866648ae8c7086f319a39e839a81da9252
                       194ef6eace72ef5aee41f53f9fce61c07018fcb0
                       d52c737333a8217863e6b46dfdacb1dff1034cb2
                       b7f3c953ea8b8cc9aae00bf645719e8cdc8c5335
                       921d8bbf2f96269bf43804826d7e3116722b928f
                       909e21379c5627041e1bbe80b66c4cd1012f72d0
                       a78c403dba5151b20c868c35244b61b3453e727e
                       d45277b0ff39a18f6d4bf5d79d51b5f631bbc893
                       87c41de3846d4bc7e674f9a617a18d6cdb4345ce
                       4cf222e3
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [61:d3:ec:8e:d9:7a:98:1b:00:8a:c1:94:00:ea:7b:79:94:20:03:a8]
            modulus: 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
    public exponent: 10001

] 
2022-05-26 15:40:35.653  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-26 15:40:35.654 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-26 15:40:35.655 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-05-26 15:40:35.656 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-26 15:40:35.656  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-05-26 15:40:35.657  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-26 15:40:35.657  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-26 15:40:35.658 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-26 15:40:35.658 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-26 15:40:35.659 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-26 15:40:35.663 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-26 15:40:35.664 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-26 15:40:35.664 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-26 15:40:35.665 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-26 15:40:35.806  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-26 15:40:35.807  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-26 15:40:35.808 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-26 15:40:35.808 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-26 15:40:35.811  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-26 15:40:35.811  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-26 15:40:35.812 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-26 15:40:35.813 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-26 15:40:35.813 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-26 15:40:35.814 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-26 15:40:35.815 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-26 15:40:35.816 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-26 15:40:35.817 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-26 15:40:35.817 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-26 15:40:35.818 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-26 15:40:35.819 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-26 15:40:35.824 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 341874170106752460088332440103550214104572878976
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu May 26 11:24:02 UTC 2022
           Final Date: Tue May 25 11:24:01 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f6:30:53:d4:40:f8:6a:3e:32:f1:4f:77:f0:a6:d2:08:88:f8:14:76]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 2c38453627e1f87ec0061c73d8e601f87bbed631
                       d9262bfc7d92a60a1f54bd5ccc23d5001938c533
                       bcd17d9dbdae4a04bc86e45e52f7c25aaed64868
                       f2830766c3e1aa6ac37c8f9c8cf31b223637047e
                       21718766b31155dd3e166b49d0182a283789196f
                       e5e43290bd3ae5c563a8ed25f1409c3df3d421a7
                       2894759a5ab72d397fabcf84c8a80b9d1d44a05c
                       55f93ccbd259dc044c24c72b826a62c61addde3c
                       e91849296893b89918fe312241997d2e60c02783
                       29ca4d0ad81b5f4b1f720d83cb071ca45b431431
                       fee3c8866648ae8c7086f319a39e839a81da9252
                       194ef6eace72ef5aee41f53f9fce61c07018fcb0
                       d52c737333a8217863e6b46dfdacb1dff1034cb2
                       b7f3c953ea8b8cc9aae00bf645719e8cdc8c5335
                       921d8bbf2f96269bf43804826d7e3116722b928f
                       909e21379c5627041e1bbe80b66c4cd1012f72d0
                       a78c403dba5151b20c868c35244b61b3453e727e
                       d45277b0ff39a18f6d4bf5d79d51b5f631bbc893
                       87c41de3846d4bc7e674f9a617a18d6cdb4345ce
                       4cf222e3
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [62:df:a8:1c:e6:7a:a1:0f:c5:7c:fe:42:91:af:65:51:7f:57:5b:bf]
            modulus: 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
    public exponent: 10001

]