Results

By type

          2022-05-28 03:06:01,282 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-05-28 03:06:02,031 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-05-28 03:06:02.738  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
May 28, 2022 3:06:04 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
May 28, 2022 3:06:04 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
May 28, 2022 3:06:04 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
May 28, 2022 3:06:04 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-05-28 03:06:04.631 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-05-28 03:06:04.823  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-05-28 03:06:04.934  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-05-28 03:06:05.513 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-05-28 03:06:05.515 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
2022-05-28 03:06:05.516 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-05-28 03:06:05.518 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-05-28 03:06:05.545 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2022-05-28 03:06:05.548 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
	{GET [/docs]}: redirectToUi(HttpServletRequest)
2022-05-28 03:06:05.640 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-05-28 03:06:06.131 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
May 28, 2022 3:06:06 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-05-28 03:06:06.874  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 6.227 seconds (JVM running for 7.48)
May 28, 2022 3:06:30 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-05-28 03:06:43.763  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-28 03:06:43.770 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-28 03:06:43.807 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-05-28 03:06:43.810 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-28 03:06:43.825  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-05-28 03:06:43.828  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-28 03:06:43.829  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-28 03:06:43.831 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-28 03:06:43.831 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-28 03:06:43.834 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-28 03:06:43.841 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-28 03:06:43.845 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-28 03:06:43.873 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-28 03:06:43.878 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-28 03:06:43.879 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-28 03:06:43.881 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-28 03:06:49.835  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-28 03:06:49.838  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-28 03:06:49.838 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-28 03:06:49.839 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-28 03:06:49.846  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-28 03:06:49.847  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-28 03:06:49.848 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-28 03:06:49.848 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-28 03:06:49.848 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-28 03:06:49.874 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-28 03:06:49.875 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-28 03:06:49.875 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-28 03:06:49.882 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-28 03:06:49.883 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-28 03:06:49.883 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-28 03:06:49.885 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-28 03:06:49.916 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 20346381152973336321103922375373899448416254695
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat May 28 03:03:40 UTC 2022
           Final Date: Thu May 27 03:03:39 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d5:2b:96:65:59:cc:0c:5f:59:6f:1d:6f:d6:9e:d2:18:c0:75:02:44]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 0da84acd9a239325dc04566ad600f8d663c9b073
                       54ffae1be466e7d471d601dbb6bbbe555dfdbedb
                       7ee4d5b1b3616e27a606965053ef37d1b133bc6f
                       962365dbcb92e5aad28cbcf01d4623e83fc54581
                       6cbc810b762fa85bff4c10a0a33d1d980d61171c
                       8b631d82f5369fb091907bb9f407e6f23a899943
                       15cab8b7b0479f9c712da2c2698e9d40e54ac427
                       e9f58c12b97ef5e8d9977ff9a4a9847fd6a2b99a
                       da827115b00683479da34d1a0f0ae178efe959ee
                       68ad9f53bac3b312ab0c1cabc9a46fd03a0924c2
                       0a96962151b8e8e74cd16ca8c614f59048313fed
                       d844bb57ce52988c6643bf69079ec772fbacfe5e
                       67d7b867f78692dff87c7525f269d3a57a73bbce
                       c9f7c72b9062c0df68781dfad92d36f5448252cb
                       67c2bad05bcc7c9d792ca9ebf952cb9ba83590d3
                       140350a99cc66df20c6f9557801c10333e78d496
                       7a0ce182a10e67d8804c8149eed54c5beabc7a21
                       de3bc852188d6fec0d19f91f5845e442cbb9f68b
                       3feb632a2adff32716ad72305b0034fa9051fe96
                       06321365
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [44:8d:b5:5b:79:a1:15:31:c9:c0:2e:5c:ae:a2:26:3d:fe:39:4c:2b]
            modulus: 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
    public exponent: 10001

] 
2022-05-28 04:19:57.351  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-28 04:19:57.353 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-28 04:19:57.355 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-28 04:19:57.359 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-28 04:19:57.359  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-28 04:19:57.366  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-28 04:19:57.367  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-28 04:19:57.368 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-28 04:19:57.370 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-28 04:19:57.371 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-28 04:19:57.388 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-28 04:19:57.389 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-28 04:19:57.390 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-28 04:19:57.390 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-28 04:19:57.581  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-28 04:19:57.583  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-28 04:19:57.584 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-28 04:19:57.584 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-28 04:19:57.589  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-28 04:19:57.590  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-28 04:19:57.590 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-28 04:19:57.591 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-28 04:19:57.591 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-28 04:19:57.593 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-28 04:19:57.593 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-28 04:19:57.593 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-28 04:19:57.594 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-28 04:19:57.594 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-28 04:19:57.595 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-28 04:19:57.596 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-28 04:19:57.600 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 20346381152973336321103922375373899448416254695
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat May 28 03:03:40 UTC 2022
           Final Date: Thu May 27 03:03:39 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d5:2b:96:65:59:cc:0c:5f:59:6f:1d:6f:d6:9e:d2:18:c0:75:02:44]
            modulus: a29227f36251d152a9aa32c739333d4422f3794c87c5d425093e15c214535b129c562cfe4355cc7b1381c1b5b6368a3bc316806739927d3031dc2297a538fdd49e300a0addfa8944f0d30717f25c4cadc26870d1b1f7c8ef8a8f5bbbc1353671b07704386cf0ec517463a92182b4d144d84788b62c1a1c9a505e9c2114eb182ee5a16d5d3fee7c097a7cdf308e7ce7581b64cc847be747cbef0fc3190ea3fc6673e757413fa32d949fa2e8e043600aeac0b95489a089277eba6d2366ffeee96a6dd07c1c1be75288c05597ce302d24582e527826ec093526dfdff3d0081532036fd5d66d3a86890fc77765f5561788a1b623b514b28606909eb3d9170f681403d6a21ae62fe78666b77f5e5ce27fbd50ffdb9721aa52d4332ea70c97a2ce3b61286543598dcf31b2a88e445d4f6f5c9036da9c5cae84191278fb65efc71891df8e4832209faaece4b168aadd52922f233f62ba297f68d594df38e4b3af30d6eba4c5d5a8f8d8448b5c62ae3690ac0c7a70a04a458d9412adc19d377cf93fae65
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 0da84acd9a239325dc04566ad600f8d663c9b073
                       54ffae1be466e7d471d601dbb6bbbe555dfdbedb
                       7ee4d5b1b3616e27a606965053ef37d1b133bc6f
                       962365dbcb92e5aad28cbcf01d4623e83fc54581
                       6cbc810b762fa85bff4c10a0a33d1d980d61171c
                       8b631d82f5369fb091907bb9f407e6f23a899943
                       15cab8b7b0479f9c712da2c2698e9d40e54ac427
                       e9f58c12b97ef5e8d9977ff9a4a9847fd6a2b99a
                       da827115b00683479da34d1a0f0ae178efe959ee
                       68ad9f53bac3b312ab0c1cabc9a46fd03a0924c2
                       0a96962151b8e8e74cd16ca8c614f59048313fed
                       d844bb57ce52988c6643bf69079ec772fbacfe5e
                       67d7b867f78692dff87c7525f269d3a57a73bbce
                       c9f7c72b9062c0df68781dfad92d36f5448252cb
                       67c2bad05bcc7c9d792ca9ebf952cb9ba83590d3
                       140350a99cc66df20c6f9557801c10333e78d496
                       7a0ce182a10e67d8804c8149eed54c5beabc7a21
                       de3bc852188d6fec0d19f91f5845e442cbb9f68b
                       3feb632a2adff32716ad72305b0034fa9051fe96
                       06321365
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [d7:16:23:2c:2a:0d:ee:c0:7e:f4:1a:04:2f:8c:f2:cc:4d:59:2a:f3]
            modulus: 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
    public exponent: 10001

] 
2022-05-28 04:21:30.731  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-28 04:21:30.734 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-28 04:21:30.736 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-05-28 04:21:30.737 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-28 04:21:30.737  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-05-28 04:21:30.738  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-28 04:21:30.738  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-28 04:21:30.738 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-28 04:21:30.739 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-28 04:21:30.739 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-28 04:21:30.747 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-28 04:21:30.748 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-28 04:21:30.748 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-28 04:21:30.748 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-28 04:21:30.942  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-28 04:21:30.943  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-28 04:21:30.943 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-28 04:21:30.943 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-28 04:21:30.945  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-28 04:21:30.946  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-28 04:21:30.946 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-28 04:21:30.946 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-28 04:21:30.947 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-28 04:21:30.947 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-28 04:21:30.948 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-28 04:21:30.948 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-28 04:21:30.953 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-28 04:21:30.954 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-28 04:21:30.954 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-28 04:21:30.956 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-28 04:21:30.963 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 20346381152973336321103922375373899448416254695
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat May 28 03:03:40 UTC 2022
           Final Date: Thu May 27 03:03:39 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d5:2b:96:65:59:cc:0c:5f:59:6f:1d:6f:d6:9e:d2:18:c0:75:02:44]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 0da84acd9a239325dc04566ad600f8d663c9b073
                       54ffae1be466e7d471d601dbb6bbbe555dfdbedb
                       7ee4d5b1b3616e27a606965053ef37d1b133bc6f
                       962365dbcb92e5aad28cbcf01d4623e83fc54581
                       6cbc810b762fa85bff4c10a0a33d1d980d61171c
                       8b631d82f5369fb091907bb9f407e6f23a899943
                       15cab8b7b0479f9c712da2c2698e9d40e54ac427
                       e9f58c12b97ef5e8d9977ff9a4a9847fd6a2b99a
                       da827115b00683479da34d1a0f0ae178efe959ee
                       68ad9f53bac3b312ab0c1cabc9a46fd03a0924c2
                       0a96962151b8e8e74cd16ca8c614f59048313fed
                       d844bb57ce52988c6643bf69079ec772fbacfe5e
                       67d7b867f78692dff87c7525f269d3a57a73bbce
                       c9f7c72b9062c0df68781dfad92d36f5448252cb
                       67c2bad05bcc7c9d792ca9ebf952cb9ba83590d3
                       140350a99cc66df20c6f9557801c10333e78d496
                       7a0ce182a10e67d8804c8149eed54c5beabc7a21
                       de3bc852188d6fec0d19f91f5845e442cbb9f68b
                       3feb632a2adff32716ad72305b0034fa9051fe96
                       06321365
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [d4:20:eb:a3:1a:8a:53:96:c9:5d:57:82:fc:e5:ea:43:5b:9f:a0:f1]
            modulus: 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
    public exponent: 10001

] 
2022-05-28 04:22:19.096  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-28 04:22:19.097 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-28 04:22:19.098 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-05-28 04:22:19.099 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-28 04:22:19.099  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-05-28 04:22:19.100  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-28 04:22:19.100  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-28 04:22:19.100 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-28 04:22:19.100 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-28 04:22:19.100 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-28 04:22:19.103 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-28 04:22:19.104 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-28 04:22:19.104 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-28 04:22:19.104 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-28 04:22:19.232  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-28 04:22:19.233  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-28 04:22:19.233 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-28 04:22:19.234 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-28 04:22:19.235  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-28 04:22:19.235  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-28 04:22:19.236 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-28 04:22:19.236 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-28 04:22:19.236 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-28 04:22:19.236 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-28 04:22:19.237 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-28 04:22:19.237 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-28 04:22:19.237 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-28 04:22:19.238 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-28 04:22:19.238 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-28 04:22:19.238 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-28 04:22:19.241 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 20346381152973336321103922375373899448416254695
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat May 28 03:03:40 UTC 2022
           Final Date: Thu May 27 03:03:39 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d5:2b:96:65:59:cc:0c:5f:59:6f:1d:6f:d6:9e:d2:18:c0:75:02:44]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 0da84acd9a239325dc04566ad600f8d663c9b073
                       54ffae1be466e7d471d601dbb6bbbe555dfdbedb
                       7ee4d5b1b3616e27a606965053ef37d1b133bc6f
                       962365dbcb92e5aad28cbcf01d4623e83fc54581
                       6cbc810b762fa85bff4c10a0a33d1d980d61171c
                       8b631d82f5369fb091907bb9f407e6f23a899943
                       15cab8b7b0479f9c712da2c2698e9d40e54ac427
                       e9f58c12b97ef5e8d9977ff9a4a9847fd6a2b99a
                       da827115b00683479da34d1a0f0ae178efe959ee
                       68ad9f53bac3b312ab0c1cabc9a46fd03a0924c2
                       0a96962151b8e8e74cd16ca8c614f59048313fed
                       d844bb57ce52988c6643bf69079ec772fbacfe5e
                       67d7b867f78692dff87c7525f269d3a57a73bbce
                       c9f7c72b9062c0df68781dfad92d36f5448252cb
                       67c2bad05bcc7c9d792ca9ebf952cb9ba83590d3
                       140350a99cc66df20c6f9557801c10333e78d496
                       7a0ce182a10e67d8804c8149eed54c5beabc7a21
                       de3bc852188d6fec0d19f91f5845e442cbb9f68b
                       3feb632a2adff32716ad72305b0034fa9051fe96
                       06321365
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [bd:ce:ab:c0:d1:39:75:4a:bb:ae:37:59:26:56:16:ac:e3:26:5e:ad]
            modulus: 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
    public exponent: 10001

] 
2022-05-28 04:24:30.767  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-28 04:24:30.768 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-28 04:24:30.769 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-28 04:24:30.770 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-28 04:24:30.770  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-28 04:24:30.771  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-28 04:24:30.772  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-28 04:24:30.773 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-28 04:24:30.773 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-28 04:24:30.773 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-28 04:24:30.776 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-28 04:24:30.777 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-28 04:24:30.777 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-28 04:24:30.777 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-28 04:24:30.955  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-28 04:24:30.956  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-28 04:24:30.957 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-28 04:24:30.957 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-28 04:24:30.959  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-28 04:24:30.959  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-28 04:24:30.960 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-28 04:24:30.960 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-28 04:24:30.960 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-28 04:24:30.961 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-28 04:24:30.961 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-28 04:24:30.961 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-28 04:24:30.963 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-28 04:24:30.964 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-28 04:24:30.964 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-28 04:24:30.965 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-28 04:24:30.968 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 20346381152973336321103922375373899448416254695
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat May 28 03:03:40 UTC 2022
           Final Date: Thu May 27 03:03:39 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d5:2b:96:65:59:cc:0c:5f:59:6f:1d:6f:d6:9e:d2:18:c0:75:02:44]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 0da84acd9a239325dc04566ad600f8d663c9b073
                       54ffae1be466e7d471d601dbb6bbbe555dfdbedb
                       7ee4d5b1b3616e27a606965053ef37d1b133bc6f
                       962365dbcb92e5aad28cbcf01d4623e83fc54581
                       6cbc810b762fa85bff4c10a0a33d1d980d61171c
                       8b631d82f5369fb091907bb9f407e6f23a899943
                       15cab8b7b0479f9c712da2c2698e9d40e54ac427
                       e9f58c12b97ef5e8d9977ff9a4a9847fd6a2b99a
                       da827115b00683479da34d1a0f0ae178efe959ee
                       68ad9f53bac3b312ab0c1cabc9a46fd03a0924c2
                       0a96962151b8e8e74cd16ca8c614f59048313fed
                       d844bb57ce52988c6643bf69079ec772fbacfe5e
                       67d7b867f78692dff87c7525f269d3a57a73bbce
                       c9f7c72b9062c0df68781dfad92d36f5448252cb
                       67c2bad05bcc7c9d792ca9ebf952cb9ba83590d3
                       140350a99cc66df20c6f9557801c10333e78d496
                       7a0ce182a10e67d8804c8149eed54c5beabc7a21
                       de3bc852188d6fec0d19f91f5845e442cbb9f68b
                       3feb632a2adff32716ad72305b0034fa9051fe96
                       06321365
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [07:2f:48:54:b0:7a:8c:ca:e2:63:fd:23:e9:ad:0b:6d:bd:52:42:3c]
            modulus: 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
    public exponent: 10001

] 
2022-05-28 04:34:36.026  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-28 04:34:36.028 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-28 04:34:36.030 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-05-28 04:34:36.030 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-28 04:34:36.031  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-05-28 04:34:36.031  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-28 04:34:36.032  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-28 04:34:36.032 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-28 04:34:36.032 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-28 04:34:36.033 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-28 04:34:36.037 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-28 04:34:36.038 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-28 04:34:36.038 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-28 04:34:36.039 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-28 04:34:36.200  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-28 04:34:36.201  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-28 04:34:36.201 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-28 04:34:36.202 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-28 04:34:36.203  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-28 04:34:36.204  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-28 04:34:36.204 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-28 04:34:36.204 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-28 04:34:36.205 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-28 04:34:36.206 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-28 04:34:36.206 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-28 04:34:36.206 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-28 04:34:36.207 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-28 04:34:36.207 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-28 04:34:36.208 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-28 04:34:36.209 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-28 04:34:36.212 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 20346381152973336321103922375373899448416254695
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat May 28 03:03:40 UTC 2022
           Final Date: Thu May 27 03:03:39 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d5:2b:96:65:59:cc:0c:5f:59:6f:1d:6f:d6:9e:d2:18:c0:75:02:44]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 0da84acd9a239325dc04566ad600f8d663c9b073
                       54ffae1be466e7d471d601dbb6bbbe555dfdbedb
                       7ee4d5b1b3616e27a606965053ef37d1b133bc6f
                       962365dbcb92e5aad28cbcf01d4623e83fc54581
                       6cbc810b762fa85bff4c10a0a33d1d980d61171c
                       8b631d82f5369fb091907bb9f407e6f23a899943
                       15cab8b7b0479f9c712da2c2698e9d40e54ac427
                       e9f58c12b97ef5e8d9977ff9a4a9847fd6a2b99a
                       da827115b00683479da34d1a0f0ae178efe959ee
                       68ad9f53bac3b312ab0c1cabc9a46fd03a0924c2
                       0a96962151b8e8e74cd16ca8c614f59048313fed
                       d844bb57ce52988c6643bf69079ec772fbacfe5e
                       67d7b867f78692dff87c7525f269d3a57a73bbce
                       c9f7c72b9062c0df68781dfad92d36f5448252cb
                       67c2bad05bcc7c9d792ca9ebf952cb9ba83590d3
                       140350a99cc66df20c6f9557801c10333e78d496
                       7a0ce182a10e67d8804c8149eed54c5beabc7a21
                       de3bc852188d6fec0d19f91f5845e442cbb9f68b
                       3feb632a2adff32716ad72305b0034fa9051fe96
                       06321365
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [b5:db:c3:38:e1:d6:ae:65:41:55:8b:43:18:ff:c7:bb:24:41:79:15]
            modulus: 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
    public exponent: 10001

] 
2022-05-28 04:40:20.155  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-28 04:40:20.157 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-28 04:40:20.160 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-05-28 04:40:20.161 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-28 04:40:20.169  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-05-28 04:40:20.169  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-28 04:40:20.170  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-28 04:40:20.170 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-28 04:40:20.170 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-28 04:40:20.170 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-28 04:40:20.175 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-28 04:40:20.177 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-28 04:40:20.177 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-28 04:40:20.177 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-28 04:40:20.337  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-28 04:40:20.338  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-28 04:40:20.339 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-28 04:40:20.339 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-28 04:40:20.341  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-28 04:40:20.341  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-28 04:40:20.342 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-28 04:40:20.342 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-28 04:40:20.343 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-28 04:40:20.344 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-28 04:40:20.344 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-28 04:40:20.345 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-28 04:40:20.346 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-28 04:40:20.347 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-28 04:40:20.347 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-28 04:40:20.348 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-28 04:40:20.352 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 20346381152973336321103922375373899448416254695
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat May 28 03:03:40 UTC 2022
           Final Date: Thu May 27 03:03:39 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d5:2b:96:65:59:cc:0c:5f:59:6f:1d:6f:d6:9e:d2:18:c0:75:02:44]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 0da84acd9a239325dc04566ad600f8d663c9b073
                       54ffae1be466e7d471d601dbb6bbbe555dfdbedb
                       7ee4d5b1b3616e27a606965053ef37d1b133bc6f
                       962365dbcb92e5aad28cbcf01d4623e83fc54581
                       6cbc810b762fa85bff4c10a0a33d1d980d61171c
                       8b631d82f5369fb091907bb9f407e6f23a899943
                       15cab8b7b0479f9c712da2c2698e9d40e54ac427
                       e9f58c12b97ef5e8d9977ff9a4a9847fd6a2b99a
                       da827115b00683479da34d1a0f0ae178efe959ee
                       68ad9f53bac3b312ab0c1cabc9a46fd03a0924c2
                       0a96962151b8e8e74cd16ca8c614f59048313fed
                       d844bb57ce52988c6643bf69079ec772fbacfe5e
                       67d7b867f78692dff87c7525f269d3a57a73bbce
                       c9f7c72b9062c0df68781dfad92d36f5448252cb
                       67c2bad05bcc7c9d792ca9ebf952cb9ba83590d3
                       140350a99cc66df20c6f9557801c10333e78d496
                       7a0ce182a10e67d8804c8149eed54c5beabc7a21
                       de3bc852188d6fec0d19f91f5845e442cbb9f68b
                       3feb632a2adff32716ad72305b0034fa9051fe96
                       06321365
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [14:69:c2:f2:34:c8:1b:e0:3a:42:71:95:aa:9a:af:fd:0b:df:3a:08]
            modulus: c05ca0160d49e5346070cca0bdd84dc0d9415630dcaa2fd20aaf8f5e05c86aad950a1c3587c8bf94236afa919ad6e7a27539823cb5a485f3725ac4ab6e254bcbc8522c3d273b283d5fc221402a36e3704015760247603075b027a0dd3969553b67f8e9fe797b4431edf7428aac2395685acff805e44e792c5d4f7edd5656342c7e30ca13842e9b2c3a9c0f9a6c347b79db278feff23338112658cab1c0b067e9997229173c0c0a2b49a657fbb9f74be531431f638a65551932a0ad31130d854b3bac2e50345b016e741a125aa5a7ad92684470f117e59848f11dd09f07cfae05e611fd56fe21b024a45c656a1a5676ff770b5b1ea18134f656e01e5a334cb267
    public exponent: 10001

] 
2022-05-28 04:40:33.176  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-28 04:40:33.178 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-28 04:40:33.179 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-05-28 04:40:33.180 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-28 04:40:33.180  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-05-28 04:40:33.181  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-28 04:40:33.181  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-28 04:40:33.181 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-28 04:40:33.181 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-28 04:40:33.181 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-28 04:40:33.185 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-28 04:40:33.186 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-28 04:40:33.186 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-28 04:40:33.186 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-28 04:40:33.314  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-28 04:40:33.315  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-28 04:40:33.315 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-28 04:40:33.315 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-28 04:40:33.316  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-28 04:40:33.317  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-28 04:40:33.317 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-28 04:40:33.317 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-28 04:40:33.317 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-28 04:40:33.318 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-28 04:40:33.318 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-28 04:40:33.318 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-28 04:40:33.318 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-28 04:40:33.319 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-28 04:40:33.319 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-28 04:40:33.319 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-28 04:40:33.323 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 20346381152973336321103922375373899448416254695
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat May 28 03:03:40 UTC 2022
           Final Date: Thu May 27 03:03:39 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d5:2b:96:65:59:cc:0c:5f:59:6f:1d:6f:d6:9e:d2:18:c0:75:02:44]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 0da84acd9a239325dc04566ad600f8d663c9b073
                       54ffae1be466e7d471d601dbb6bbbe555dfdbedb
                       7ee4d5b1b3616e27a606965053ef37d1b133bc6f
                       962365dbcb92e5aad28cbcf01d4623e83fc54581
                       6cbc810b762fa85bff4c10a0a33d1d980d61171c
                       8b631d82f5369fb091907bb9f407e6f23a899943
                       15cab8b7b0479f9c712da2c2698e9d40e54ac427
                       e9f58c12b97ef5e8d9977ff9a4a9847fd6a2b99a
                       da827115b00683479da34d1a0f0ae178efe959ee
                       68ad9f53bac3b312ab0c1cabc9a46fd03a0924c2
                       0a96962151b8e8e74cd16ca8c614f59048313fed
                       d844bb57ce52988c6643bf69079ec772fbacfe5e
                       67d7b867f78692dff87c7525f269d3a57a73bbce
                       c9f7c72b9062c0df68781dfad92d36f5448252cb
                       67c2bad05bcc7c9d792ca9ebf952cb9ba83590d3
                       140350a99cc66df20c6f9557801c10333e78d496
                       7a0ce182a10e67d8804c8149eed54c5beabc7a21
                       de3bc852188d6fec0d19f91f5845e442cbb9f68b
                       3feb632a2adff32716ad72305b0034fa9051fe96
                       06321365
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ae:e7:d1:c5:4d:8d:f2:ac:8c:ca:4c:9d:67:6c:50:e8:81:96:51:46]
            modulus: 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
    public exponent: 10001

]