Results

By type

          2022-05-31 03:21:17,730 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-05-31 03:21:19,076 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-05-31 03:21:20.035  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
May 31, 2022 3:21:22 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
May 31, 2022 3:21:22 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
May 31, 2022 3:21:22 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
May 31, 2022 3:21:22 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-05-31 03:21:22.895 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-05-31 03:21:23.202  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-05-31 03:21:23.417  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-05-31 03:21:24.203 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-05-31 03:21:24.206 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
2022-05-31 03:21:24.208 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-05-31 03:21:24.212 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-05-31 03:21:24.255 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2022-05-31 03:21:24.258 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/docs]}: redirectToUi(HttpServletRequest)
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
2022-05-31 03:21:24.389 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-05-31 03:21:24.953 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
May 31, 2022 3:21:25 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-05-31 03:21:26.005  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 9.256 seconds (JVM running for 11.377)
May 31, 2022 3:21:53 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-05-31 03:22:10.483  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-31 03:22:10.491 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-31 03:22:10.529 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-05-31 03:22:10.534 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-31 03:22:10.552  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-05-31 03:22:10.555  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-31 03:22:10.556  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-31 03:22:10.558 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-31 03:22:10.558 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-31 03:22:10.562 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-31 03:22:10.568 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-31 03:22:10.571 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-31 03:22:10.605 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-31 03:22:10.609 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-31 03:22:10.610 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-31 03:22:10.614 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-31 03:22:11.175  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-31 03:22:11.178  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-31 03:22:11.178 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-31 03:22:11.180 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-31 03:22:11.190  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-31 03:22:11.192  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-31 03:22:11.193 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-31 03:22:11.193 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-31 03:22:11.194 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-31 03:22:11.207 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-31 03:22:11.208 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-31 03:22:11.208 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-31 03:22:11.214 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-31 03:22:11.215 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-31 03:22:11.215 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-31 03:22:11.218 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-31 03:22:11.260 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 163350065890281317275900269055059712188247032276
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue May 31 03:18:37 UTC 2022
           Final Date: Sun May 30 03:18:36 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [eb:5b:33:bd:84:2d:c3:5c:17:23:4f:a8:11:0a:c7:03:68:ff:ed:6e]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: e52f26547d600effda7bf89acac95f698a332b0d
                       c7e59b0499615d1f430e03c31992cceecc394762
                       9013560c6f31e0c1c9c9ea606aaefff5e0a7e62a
                       f8560d0644b47c66207b524962e366c33db5469e
                       5633da88ca5109794642c06042b7aedde7d3283f
                       8d9d54bb690a7ed9e784d586cdb377b477a7f0a0
                       a5b6609f41df2ae9c2183ded428cf1cef8ea1b16
                       79f7e6158c602faaa9c6b66c45e4ad65942a3b88
                       adc327b46fee242e5e045e51f11b294db56fe2ec
                       37cded08d21d6ad0fa10fc88204c5d9b173cca6a
                       5b990a1be906ed1920ac27c37c6c1fad1efbd2a9
                       4b8ec7a670d30f95fecacd6aca0012fe1cb4f5d9
                       ebda5c7b4da6b27d4e4543afc335cf993c220516
                       58e2743d89c37e846d9f9357d4bea2a0d39bd004
                       5501c0be7917a3a86f9394ab78ec469f770e8964
                       0d83089090a84d721b79de63902f6cf810a95819
                       921da17144fbfb9e9e201f62323b1c9da4466c26
                       1f544a3a3feae4814859aa4417e7301f0c99585e
                       28cbfd9f43e304bbaef8bf52bfb703e792bfdd50
                       e0714d23
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [7c:3b:15:d7:22:39:7b:0e:0d:ad:c0:59:94:ce:c7:2a:3e:15:10:56]
            modulus: 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
    public exponent: 10001

] 
2022-05-31 04:38:29.146  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-31 04:38:29.151 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-31 04:38:29.157 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-31 04:38:29.159 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-31 04:38:29.162  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-31 04:38:29.164  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-31 04:38:29.165  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-31 04:38:29.166 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-31 04:38:29.167 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-31 04:38:29.168 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-31 04:38:29.182 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-31 04:38:29.183 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-31 04:38:29.183 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-31 04:38:29.184 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-31 04:38:29.596  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-31 04:38:29.597  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-31 04:38:29.597 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-31 04:38:29.598 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-31 04:38:29.601  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-31 04:38:29.601  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-31 04:38:29.602 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-31 04:38:29.602 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-31 04:38:29.602 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-31 04:38:29.604 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-31 04:38:29.604 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-31 04:38:29.604 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-31 04:38:29.625 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-31 04:38:29.627 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-31 04:38:29.628 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-31 04:38:29.631 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-31 04:38:29.642 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 163350065890281317275900269055059712188247032276
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue May 31 03:18:37 UTC 2022
           Final Date: Sun May 30 03:18:36 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [eb:5b:33:bd:84:2d:c3:5c:17:23:4f:a8:11:0a:c7:03:68:ff:ed:6e]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: e52f26547d600effda7bf89acac95f698a332b0d
                       c7e59b0499615d1f430e03c31992cceecc394762
                       9013560c6f31e0c1c9c9ea606aaefff5e0a7e62a
                       f8560d0644b47c66207b524962e366c33db5469e
                       5633da88ca5109794642c06042b7aedde7d3283f
                       8d9d54bb690a7ed9e784d586cdb377b477a7f0a0
                       a5b6609f41df2ae9c2183ded428cf1cef8ea1b16
                       79f7e6158c602faaa9c6b66c45e4ad65942a3b88
                       adc327b46fee242e5e045e51f11b294db56fe2ec
                       37cded08d21d6ad0fa10fc88204c5d9b173cca6a
                       5b990a1be906ed1920ac27c37c6c1fad1efbd2a9
                       4b8ec7a670d30f95fecacd6aca0012fe1cb4f5d9
                       ebda5c7b4da6b27d4e4543afc335cf993c220516
                       58e2743d89c37e846d9f9357d4bea2a0d39bd004
                       5501c0be7917a3a86f9394ab78ec469f770e8964
                       0d83089090a84d721b79de63902f6cf810a95819
                       921da17144fbfb9e9e201f62323b1c9da4466c26
                       1f544a3a3feae4814859aa4417e7301f0c99585e
                       28cbfd9f43e304bbaef8bf52bfb703e792bfdd50
                       e0714d23
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [35:00:5e:39:96:d0:45:fb:a6:fc:00:d1:9e:9f:50:2e:84:2e:bb:31]
            modulus: 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
    public exponent: 10001

] 
2022-05-31 04:40:00.919  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-31 04:40:00.925 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-31 04:40:00.938 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-05-31 04:40:00.944 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-31 04:40:00.951  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-05-31 04:40:00.955  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-31 04:40:00.956  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-31 04:40:00.957 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-31 04:40:00.957 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-31 04:40:00.959 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-31 04:40:00.971 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-31 04:40:00.972 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-31 04:40:00.973 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-31 04:40:00.973 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-31 04:40:01.203  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-31 04:40:01.204  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-31 04:40:01.205 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-31 04:40:01.205 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-31 04:40:01.210  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-31 04:40:01.211  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-31 04:40:01.212 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-31 04:40:01.213 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-31 04:40:01.214 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-31 04:40:01.217 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-31 04:40:01.218 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-31 04:40:01.219 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-31 04:40:01.221 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-31 04:40:01.221 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-31 04:40:01.222 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-31 04:40:01.224 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-31 04:40:01.230 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 163350065890281317275900269055059712188247032276
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue May 31 03:18:37 UTC 2022
           Final Date: Sun May 30 03:18:36 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [eb:5b:33:bd:84:2d:c3:5c:17:23:4f:a8:11:0a:c7:03:68:ff:ed:6e]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: e52f26547d600effda7bf89acac95f698a332b0d
                       c7e59b0499615d1f430e03c31992cceecc394762
                       9013560c6f31e0c1c9c9ea606aaefff5e0a7e62a
                       f8560d0644b47c66207b524962e366c33db5469e
                       5633da88ca5109794642c06042b7aedde7d3283f
                       8d9d54bb690a7ed9e784d586cdb377b477a7f0a0
                       a5b6609f41df2ae9c2183ded428cf1cef8ea1b16
                       79f7e6158c602faaa9c6b66c45e4ad65942a3b88
                       adc327b46fee242e5e045e51f11b294db56fe2ec
                       37cded08d21d6ad0fa10fc88204c5d9b173cca6a
                       5b990a1be906ed1920ac27c37c6c1fad1efbd2a9
                       4b8ec7a670d30f95fecacd6aca0012fe1cb4f5d9
                       ebda5c7b4da6b27d4e4543afc335cf993c220516
                       58e2743d89c37e846d9f9357d4bea2a0d39bd004
                       5501c0be7917a3a86f9394ab78ec469f770e8964
                       0d83089090a84d721b79de63902f6cf810a95819
                       921da17144fbfb9e9e201f62323b1c9da4466c26
                       1f544a3a3feae4814859aa4417e7301f0c99585e
                       28cbfd9f43e304bbaef8bf52bfb703e792bfdd50
                       e0714d23
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [37:3c:b1:14:f9:bf:e0:39:07:fd:94:67:71:33:78:6b:75:53:3b:e0]
            modulus: 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
    public exponent: 10001

] 
2022-05-31 04:40:54.263  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-31 04:40:54.265 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-31 04:40:54.267 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-05-31 04:40:54.268 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-31 04:40:54.269  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-05-31 04:40:54.270  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-31 04:40:54.270  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-31 04:40:54.271 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-31 04:40:54.271 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-31 04:40:54.272 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-31 04:40:54.278 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-31 04:40:54.279 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-31 04:40:54.280 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-31 04:40:54.280 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-31 04:40:54.449  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-31 04:40:54.450  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-31 04:40:54.450 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-31 04:40:54.451 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-31 04:40:54.453  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-31 04:40:54.454  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-31 04:40:54.455 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-31 04:40:54.455 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-31 04:40:54.456 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-31 04:40:54.457 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-31 04:40:54.457 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-31 04:40:54.458 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-31 04:40:54.459 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-31 04:40:54.459 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-31 04:40:54.459 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-31 04:40:54.460 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-31 04:40:54.465 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 163350065890281317275900269055059712188247032276
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue May 31 03:18:37 UTC 2022
           Final Date: Sun May 30 03:18:36 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [eb:5b:33:bd:84:2d:c3:5c:17:23:4f:a8:11:0a:c7:03:68:ff:ed:6e]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: e52f26547d600effda7bf89acac95f698a332b0d
                       c7e59b0499615d1f430e03c31992cceecc394762
                       9013560c6f31e0c1c9c9ea606aaefff5e0a7e62a
                       f8560d0644b47c66207b524962e366c33db5469e
                       5633da88ca5109794642c06042b7aedde7d3283f
                       8d9d54bb690a7ed9e784d586cdb377b477a7f0a0
                       a5b6609f41df2ae9c2183ded428cf1cef8ea1b16
                       79f7e6158c602faaa9c6b66c45e4ad65942a3b88
                       adc327b46fee242e5e045e51f11b294db56fe2ec
                       37cded08d21d6ad0fa10fc88204c5d9b173cca6a
                       5b990a1be906ed1920ac27c37c6c1fad1efbd2a9
                       4b8ec7a670d30f95fecacd6aca0012fe1cb4f5d9
                       ebda5c7b4da6b27d4e4543afc335cf993c220516
                       58e2743d89c37e846d9f9357d4bea2a0d39bd004
                       5501c0be7917a3a86f9394ab78ec469f770e8964
                       0d83089090a84d721b79de63902f6cf810a95819
                       921da17144fbfb9e9e201f62323b1c9da4466c26
                       1f544a3a3feae4814859aa4417e7301f0c99585e
                       28cbfd9f43e304bbaef8bf52bfb703e792bfdd50
                       e0714d23
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [26:70:5d:3d:83:4b:ce:de:98:f1:ef:8a:95:6d:66:14:a5:55:37:e9]
            modulus: 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
    public exponent: 10001

] 
2022-05-31 04:42:44.748  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-31 04:42:44.750 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-31 04:42:44.751 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-31 04:42:44.752 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-31 04:42:44.752  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-31 04:42:44.753  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-31 04:42:44.754  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-31 04:42:44.754 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-31 04:42:44.755 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-31 04:42:44.755 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-31 04:42:44.760 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-31 04:42:44.760 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-31 04:42:44.761 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-31 04:42:44.761 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-31 04:42:44.912  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-31 04:42:44.913  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-31 04:42:44.913 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-31 04:42:44.914 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-31 04:42:44.916  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-31 04:42:44.917  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-31 04:42:44.918 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-31 04:42:44.918 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-31 04:42:44.919 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-31 04:42:44.920 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-31 04:42:44.920 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-31 04:42:44.921 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-31 04:42:44.922 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-31 04:42:44.922 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-31 04:42:44.925 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-31 04:42:44.928 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-31 04:42:44.936 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 163350065890281317275900269055059712188247032276
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue May 31 03:18:37 UTC 2022
           Final Date: Sun May 30 03:18:36 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [eb:5b:33:bd:84:2d:c3:5c:17:23:4f:a8:11:0a:c7:03:68:ff:ed:6e]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: e52f26547d600effda7bf89acac95f698a332b0d
                       c7e59b0499615d1f430e03c31992cceecc394762
                       9013560c6f31e0c1c9c9ea606aaefff5e0a7e62a
                       f8560d0644b47c66207b524962e366c33db5469e
                       5633da88ca5109794642c06042b7aedde7d3283f
                       8d9d54bb690a7ed9e784d586cdb377b477a7f0a0
                       a5b6609f41df2ae9c2183ded428cf1cef8ea1b16
                       79f7e6158c602faaa9c6b66c45e4ad65942a3b88
                       adc327b46fee242e5e045e51f11b294db56fe2ec
                       37cded08d21d6ad0fa10fc88204c5d9b173cca6a
                       5b990a1be906ed1920ac27c37c6c1fad1efbd2a9
                       4b8ec7a670d30f95fecacd6aca0012fe1cb4f5d9
                       ebda5c7b4da6b27d4e4543afc335cf993c220516
                       58e2743d89c37e846d9f9357d4bea2a0d39bd004
                       5501c0be7917a3a86f9394ab78ec469f770e8964
                       0d83089090a84d721b79de63902f6cf810a95819
                       921da17144fbfb9e9e201f62323b1c9da4466c26
                       1f544a3a3feae4814859aa4417e7301f0c99585e
                       28cbfd9f43e304bbaef8bf52bfb703e792bfdd50
                       e0714d23
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [2b:93:2e:a9:92:b7:18:56:ad:7a:f0:99:84:30:94:c7:9e:f0:61:2a]
            modulus: a8af47e36a0fd7c6ab94b45d0c451a93e62648ea8016024d517e15881ed274f592ec7f87f647c1fc3a8aafff86276126625397831144f20dedc0fbc8fb6a8389d93566c10c2f519ff7ebd7ce15da34ad589a0b92b92bcea11a97d42ba5420baf4330384ed7caa68d0f61e4d828b02a08a0bf7d7f83875c4eb72034e1897c8835807bb4d567479b8eb6357022e194b28190931e59e72a03ea7d5a384f7e20354a80c1abd2ce27dd200b7ed777bfe784255e811c3658324c8a82d8376c8d0e43856da46628d191828a0322f33e647af6017f8d9943ae1fb27839cfbc68052e4f4171aeb1374fc20698e30644355ee32bf555d8f23c5cca6f887340575c11ddbbcf
    public exponent: 10001

] 
2022-05-31 04:57:57.076  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-31 04:57:57.079 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-31 04:57:57.081 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-05-31 04:57:57.083 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-31 04:57:57.084  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-05-31 04:57:57.085  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-31 04:57:57.085  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-31 04:57:57.086 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-31 04:57:57.086 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-31 04:57:57.087 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-31 04:57:57.094 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-31 04:57:57.095 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-31 04:57:57.096 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-31 04:57:57.096 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-31 04:57:57.276  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-31 04:57:57.277  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-31 04:57:57.277 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-31 04:57:57.277 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-31 04:57:57.279  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-31 04:57:57.279  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-31 04:57:57.280 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-31 04:57:57.280 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-31 04:57:57.280 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-31 04:57:57.281 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-31 04:57:57.281 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-31 04:57:57.281 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-31 04:57:57.282 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-31 04:57:57.283 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-31 04:57:57.283 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-31 04:57:57.284 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-31 04:57:57.288 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 163350065890281317275900269055059712188247032276
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue May 31 03:18:37 UTC 2022
           Final Date: Sun May 30 03:18:36 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [eb:5b:33:bd:84:2d:c3:5c:17:23:4f:a8:11:0a:c7:03:68:ff:ed:6e]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: e52f26547d600effda7bf89acac95f698a332b0d
                       c7e59b0499615d1f430e03c31992cceecc394762
                       9013560c6f31e0c1c9c9ea606aaefff5e0a7e62a
                       f8560d0644b47c66207b524962e366c33db5469e
                       5633da88ca5109794642c06042b7aedde7d3283f
                       8d9d54bb690a7ed9e784d586cdb377b477a7f0a0
                       a5b6609f41df2ae9c2183ded428cf1cef8ea1b16
                       79f7e6158c602faaa9c6b66c45e4ad65942a3b88
                       adc327b46fee242e5e045e51f11b294db56fe2ec
                       37cded08d21d6ad0fa10fc88204c5d9b173cca6a
                       5b990a1be906ed1920ac27c37c6c1fad1efbd2a9
                       4b8ec7a670d30f95fecacd6aca0012fe1cb4f5d9
                       ebda5c7b4da6b27d4e4543afc335cf993c220516
                       58e2743d89c37e846d9f9357d4bea2a0d39bd004
                       5501c0be7917a3a86f9394ab78ec469f770e8964
                       0d83089090a84d721b79de63902f6cf810a95819
                       921da17144fbfb9e9e201f62323b1c9da4466c26
                       1f544a3a3feae4814859aa4417e7301f0c99585e
                       28cbfd9f43e304bbaef8bf52bfb703e792bfdd50
                       e0714d23
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [0f:fa:3f:5b:3f:42:19:20:46:0d:0f:49:e5:68:8b:f5:08:40:d4:de]
            modulus: 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
    public exponent: 10001

] 
2022-05-31 05:02:11.953  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-31 05:02:11.956 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-31 05:02:11.959 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-05-31 05:02:11.960 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-31 05:02:11.961  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-05-31 05:02:11.962  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-31 05:02:11.962  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-31 05:02:11.963 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-31 05:02:11.964 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-31 05:02:11.964 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-31 05:02:11.971 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-31 05:02:11.973 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-31 05:02:11.973 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-31 05:02:11.973 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-31 05:02:12.139  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-31 05:02:12.145  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-31 05:02:12.146 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-31 05:02:12.147 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-31 05:02:12.150  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-31 05:02:12.151  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-31 05:02:12.152 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-31 05:02:12.153 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-31 05:02:12.154 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-31 05:02:12.157 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-31 05:02:12.157 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-31 05:02:12.158 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-31 05:02:12.160 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-31 05:02:12.160 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-31 05:02:12.161 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-31 05:02:12.162 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-31 05:02:12.170 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 163350065890281317275900269055059712188247032276
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue May 31 03:18:37 UTC 2022
           Final Date: Sun May 30 03:18:36 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [eb:5b:33:bd:84:2d:c3:5c:17:23:4f:a8:11:0a:c7:03:68:ff:ed:6e]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: e52f26547d600effda7bf89acac95f698a332b0d
                       c7e59b0499615d1f430e03c31992cceecc394762
                       9013560c6f31e0c1c9c9ea606aaefff5e0a7e62a
                       f8560d0644b47c66207b524962e366c33db5469e
                       5633da88ca5109794642c06042b7aedde7d3283f
                       8d9d54bb690a7ed9e784d586cdb377b477a7f0a0
                       a5b6609f41df2ae9c2183ded428cf1cef8ea1b16
                       79f7e6158c602faaa9c6b66c45e4ad65942a3b88
                       adc327b46fee242e5e045e51f11b294db56fe2ec
                       37cded08d21d6ad0fa10fc88204c5d9b173cca6a
                       5b990a1be906ed1920ac27c37c6c1fad1efbd2a9
                       4b8ec7a670d30f95fecacd6aca0012fe1cb4f5d9
                       ebda5c7b4da6b27d4e4543afc335cf993c220516
                       58e2743d89c37e846d9f9357d4bea2a0d39bd004
                       5501c0be7917a3a86f9394ab78ec469f770e8964
                       0d83089090a84d721b79de63902f6cf810a95819
                       921da17144fbfb9e9e201f62323b1c9da4466c26
                       1f544a3a3feae4814859aa4417e7301f0c99585e
                       28cbfd9f43e304bbaef8bf52bfb703e792bfdd50
                       e0714d23
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [5a:a4:63:13:dc:16:b1:3a:fa:f1:34:ca:1a:05:73:67:66:24:0a:17]
            modulus: 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
    public exponent: 10001

] 
2022-05-31 05:02:25.109  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-31 05:02:25.111 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-31 05:02:25.112 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-05-31 05:02:25.113 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-31 05:02:25.113  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-05-31 05:02:25.114  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-31 05:02:25.115  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-31 05:02:25.115 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-31 05:02:25.115 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-31 05:02:25.116 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-31 05:02:25.121 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-31 05:02:25.122 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-31 05:02:25.122 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-31 05:02:25.123 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-31 05:02:25.267  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-31 05:02:25.268  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-31 05:02:25.269 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-31 05:02:25.269 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-31 05:02:25.271  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-31 05:02:25.272  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-31 05:02:25.272 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-31 05:02:25.273 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-31 05:02:25.273 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-31 05:02:25.275 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-31 05:02:25.275 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-31 05:02:25.276 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-31 05:02:25.276 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-31 05:02:25.277 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-31 05:02:25.277 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-31 05:02:25.280 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-31 05:02:25.285 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 163350065890281317275900269055059712188247032276
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue May 31 03:18:37 UTC 2022
           Final Date: Sun May 30 03:18:36 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [eb:5b:33:bd:84:2d:c3:5c:17:23:4f:a8:11:0a:c7:03:68:ff:ed:6e]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: e52f26547d600effda7bf89acac95f698a332b0d
                       c7e59b0499615d1f430e03c31992cceecc394762
                       9013560c6f31e0c1c9c9ea606aaefff5e0a7e62a
                       f8560d0644b47c66207b524962e366c33db5469e
                       5633da88ca5109794642c06042b7aedde7d3283f
                       8d9d54bb690a7ed9e784d586cdb377b477a7f0a0
                       a5b6609f41df2ae9c2183ded428cf1cef8ea1b16
                       79f7e6158c602faaa9c6b66c45e4ad65942a3b88
                       adc327b46fee242e5e045e51f11b294db56fe2ec
                       37cded08d21d6ad0fa10fc88204c5d9b173cca6a
                       5b990a1be906ed1920ac27c37c6c1fad1efbd2a9
                       4b8ec7a670d30f95fecacd6aca0012fe1cb4f5d9
                       ebda5c7b4da6b27d4e4543afc335cf993c220516
                       58e2743d89c37e846d9f9357d4bea2a0d39bd004
                       5501c0be7917a3a86f9394ab78ec469f770e8964
                       0d83089090a84d721b79de63902f6cf810a95819
                       921da17144fbfb9e9e201f62323b1c9da4466c26
                       1f544a3a3feae4814859aa4417e7301f0c99585e
                       28cbfd9f43e304bbaef8bf52bfb703e792bfdd50
                       e0714d23
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [84:f3:2c:2a:62:2e:4e:f3:8b:89:b1:43:06:ff:89:40:45:f1:69:e1]
            modulus: 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
    public exponent: 10001

]