Results

By type

          2022-07-20 03:18:11,306 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-07-20 03:18:13,608 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-07-20 03:18:15.017  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Jul 20, 2022 3:18:18 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Jul 20, 2022 3:18:18 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Jul 20, 2022 3:18:18 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Jul 20, 2022 3:18:18 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-07-20 03:18:19.803 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-07-20 03:18:20.230  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-07-20 03:18:20.465  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-07-20 03:18:21.583 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-07-20 03:18:21.589 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
2022-07-20 03:18:21.592 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-07-20 03:18:21.603 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-07-20 03:18:21.672 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2022-07-20 03:18:21.679 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
	{GET [/docs]}: redirectToUi(HttpServletRequest)
2022-07-20 03:18:21.872 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-07-20 03:18:22.828 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Jul 20, 2022 3:18:23 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-07-20 03:18:24.388  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 14.601 seconds (JVM running for 17.662)
Jul 20, 2022 3:18:43 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-07-20 03:19:04.426  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-07-20 03:19:04.442 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-07-20 03:19:04.530 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-07-20 03:19:04.539 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-07-20 03:19:04.571  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-07-20 03:19:04.576  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-07-20 03:19:04.578  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-07-20 03:19:04.581 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-07-20 03:19:04.581 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-20 03:19:04.587 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-07-20 03:19:04.604 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-07-20 03:19:04.611 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-07-20 03:19:04.679 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-07-20 03:19:04.687 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-20 03:19:04.688 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-20 03:19:04.694 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-20 03:19:05.449  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-07-20 03:19:05.454  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-07-20 03:19:05.455 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-07-20 03:19:05.458 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-20 03:19:05.476  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-07-20 03:19:05.478  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-07-20 03:19:05.479 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-20 03:19:05.480 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-20 03:19:05.481 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-20 03:19:05.512 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-20 03:19:05.513 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-20 03:19:05.513 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-20 03:19:05.529 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-20 03:19:05.530 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-20 03:19:05.531 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-20 03:19:05.536 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-07-20 03:19:05.612 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 92657408065287363658614600528341741363136548179
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Jul 20 03:14:52 UTC 2022
           Final Date: Mon Jul 19 03:14:51 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [b5:b6:5e:88:44:75:46:53:eb:ac:b5:3f:63:2d:23:20:61:94:0f:80]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 702b499df368203c89e2f05ea2121998003ccf35
                       777f341f0a9843100723b43ca245059389d5e602
                       f1d48bf77fc6f7000dca876c093664e42a6f729c
                       959fa013d6b1e57b0125e1a65f8032c546848bb7
                       265af75e0499f695f16dd5cf79bb41ede87b2927
                       41c612bbaa2c495c0e629b220b24986af00701f5
                       394aaec1a8e1857fd5b4885ae3c2f573dab42441
                       11a9ac3d6c79580c2c160d081f4c3c7cbd8efdfc
                       3279a656587a0082730cd28e976ae529415e2d13
                       14f0985bfd42e4c486f46bcb6ae2924e53b37bb1
                       32ba3183ca020f1bc1999cd7c1d27e2871c1ae4a
                       d283b904c3d3fc540914714e68cd846c140cbd5e
                       74c8dcc1a41dfc0d4536c29818761d3a75bb6463
                       c3a6efaf719aa0530ca6715dc9eadfdecdc335ee
                       22ab3df86ce45c22a30e6d642ebf9c7ed6234ed0
                       c1ae1265e28651805d5fc2f00f6cd8eedc3a72e2
                       610cf30d06fbab37f23cfd4e77cbf6dd0a394fe9
                       7b11a837707f53800e3a4367872de67592f06c7e
                       7b0d5a53f58883a3ca6c11d2c3791d56ed876871
                       1682ceb0
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [90:25:bc:0b:ee:d4:2d:3c:6f:73:85:19:83:7e:03:08:8e:db:42:29]
            modulus: 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
    public exponent: 10001

] 
2022-07-20 04:38:56.880  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-07-20 04:38:56.885 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-07-20 04:38:56.890 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-07-20 04:38:56.893 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-07-20 04:38:56.894  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-07-20 04:38:56.895  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-07-20 04:38:56.897  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-07-20 04:38:56.897 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-07-20 04:38:56.898 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-07-20 04:38:56.899 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-07-20 04:38:56.910 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-07-20 04:38:56.912 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-20 04:38:56.912 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-20 04:38:56.913 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-20 04:38:57.139  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-07-20 04:38:57.141  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-07-20 04:38:57.142 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-07-20 04:38:57.142 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-20 04:38:57.147  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-07-20 04:38:57.149  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-07-20 04:38:57.150 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-20 04:38:57.151 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-20 04:38:57.151 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-20 04:38:57.154 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-20 04:38:57.155 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-20 04:38:57.156 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-20 04:38:57.158 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-20 04:38:57.159 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-20 04:38:57.159 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-20 04:38:57.162 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-07-20 04:38:57.171 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 92657408065287363658614600528341741363136548179
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Jul 20 03:14:52 UTC 2022
           Final Date: Mon Jul 19 03:14:51 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [b5:b6:5e:88:44:75:46:53:eb:ac:b5:3f:63:2d:23:20:61:94:0f:80]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 702b499df368203c89e2f05ea2121998003ccf35
                       777f341f0a9843100723b43ca245059389d5e602
                       f1d48bf77fc6f7000dca876c093664e42a6f729c
                       959fa013d6b1e57b0125e1a65f8032c546848bb7
                       265af75e0499f695f16dd5cf79bb41ede87b2927
                       41c612bbaa2c495c0e629b220b24986af00701f5
                       394aaec1a8e1857fd5b4885ae3c2f573dab42441
                       11a9ac3d6c79580c2c160d081f4c3c7cbd8efdfc
                       3279a656587a0082730cd28e976ae529415e2d13
                       14f0985bfd42e4c486f46bcb6ae2924e53b37bb1
                       32ba3183ca020f1bc1999cd7c1d27e2871c1ae4a
                       d283b904c3d3fc540914714e68cd846c140cbd5e
                       74c8dcc1a41dfc0d4536c29818761d3a75bb6463
                       c3a6efaf719aa0530ca6715dc9eadfdecdc335ee
                       22ab3df86ce45c22a30e6d642ebf9c7ed6234ed0
                       c1ae1265e28651805d5fc2f00f6cd8eedc3a72e2
                       610cf30d06fbab37f23cfd4e77cbf6dd0a394fe9
                       7b11a837707f53800e3a4367872de67592f06c7e
                       7b0d5a53f58883a3ca6c11d2c3791d56ed876871
                       1682ceb0
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [49:cf:f0:6d:78:3b:65:e3:6c:dd:bf:24:3e:fc:2d:1c:f2:f4:70:eb]
            modulus: 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
    public exponent: 10001

] 
2022-07-20 04:40:44.733  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-07-20 04:40:44.748 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-07-20 04:40:44.753 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-07-20 04:40:44.763 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-07-20 04:40:44.764  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-07-20 04:40:44.766  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-07-20 04:40:44.770  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-07-20 04:40:44.771 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-07-20 04:40:44.772 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-07-20 04:40:44.774 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-07-20 04:40:44.838 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-07-20 04:40:44.840 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-20 04:40:44.840 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-20 04:40:44.841 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-20 04:40:44.998  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-07-20 04:40:45.004  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-07-20 04:40:45.005 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-07-20 04:40:45.005 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-20 04:40:45.011  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-07-20 04:40:45.038  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-07-20 04:40:45.039 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-20 04:40:45.039 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-20 04:40:45.042 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-20 04:40:45.047 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-20 04:40:45.048 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-20 04:40:45.048 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-20 04:40:45.049 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-20 04:40:45.050 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-20 04:40:45.050 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-20 04:40:45.053 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-07-20 04:40:45.062 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 92657408065287363658614600528341741363136548179
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Jul 20 03:14:52 UTC 2022
           Final Date: Mon Jul 19 03:14:51 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [b5:b6:5e:88:44:75:46:53:eb:ac:b5:3f:63:2d:23:20:61:94:0f:80]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 702b499df368203c89e2f05ea2121998003ccf35
                       777f341f0a9843100723b43ca245059389d5e602
                       f1d48bf77fc6f7000dca876c093664e42a6f729c
                       959fa013d6b1e57b0125e1a65f8032c546848bb7
                       265af75e0499f695f16dd5cf79bb41ede87b2927
                       41c612bbaa2c495c0e629b220b24986af00701f5
                       394aaec1a8e1857fd5b4885ae3c2f573dab42441
                       11a9ac3d6c79580c2c160d081f4c3c7cbd8efdfc
                       3279a656587a0082730cd28e976ae529415e2d13
                       14f0985bfd42e4c486f46bcb6ae2924e53b37bb1
                       32ba3183ca020f1bc1999cd7c1d27e2871c1ae4a
                       d283b904c3d3fc540914714e68cd846c140cbd5e
                       74c8dcc1a41dfc0d4536c29818761d3a75bb6463
                       c3a6efaf719aa0530ca6715dc9eadfdecdc335ee
                       22ab3df86ce45c22a30e6d642ebf9c7ed6234ed0
                       c1ae1265e28651805d5fc2f00f6cd8eedc3a72e2
                       610cf30d06fbab37f23cfd4e77cbf6dd0a394fe9
                       7b11a837707f53800e3a4367872de67592f06c7e
                       7b0d5a53f58883a3ca6c11d2c3791d56ed876871
                       1682ceb0
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ed:6c:ef:cc:31:99:29:83:b0:8f:e9:93:4d:98:83:67:36:dd:47:71]
            modulus: b1f11e998dd9ae31a71c913857aa238380fdbca79364a29f23b53ab305b4078a750b6e52b89476ccd6dbd2b8825fea3d416b3bfd3d7ddf92e15bceb0c49dc396b895be6b46ec9c116cbf6cb67bf767be919904be65b4e16fdf94c5b6a14f286d64834f7e7cc96e9192742c39a2b4d5f1e364023d4774436e9ab29f25790239e2a868427ac8f14ad5c3ecdb6b7bf5558260a4276c004deb80bda73f8d840add59abe51f4e1997b83ac8a6b9b5b4c01494a455fe4146bb12f57b91774ed277390bbdc1b2cdb3e4add1c8d3d00e47186bc0eb5e2a47acac99f01e99d2c0a4155de32e0c2e9d23fa2ed864c1772602e75fbb9efc8aa6ab7a341cd00575e1123e360b
    public exponent: 10001

] 
2022-07-20 04:41:56.883  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-07-20 04:41:56.887 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-07-20 04:41:56.893 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-07-20 04:41:56.894 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-07-20 04:41:56.895  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-07-20 04:41:56.896  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-07-20 04:41:56.897  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-07-20 04:41:56.898 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-07-20 04:41:56.899 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-07-20 04:41:56.900 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-07-20 04:41:56.906 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-07-20 04:41:56.907 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-20 04:41:56.908 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-20 04:41:56.908 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-20 04:41:57.154  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-07-20 04:41:57.156  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-07-20 04:41:57.157 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-07-20 04:41:57.158 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-20 04:41:57.165  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-07-20 04:41:57.167  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-07-20 04:41:57.168 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-20 04:41:57.168 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-20 04:41:57.169 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-20 04:41:57.171 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-20 04:41:57.171 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-20 04:41:57.172 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-20 04:41:57.173 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-20 04:41:57.173 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-20 04:41:57.174 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-20 04:41:57.175 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-07-20 04:41:57.181 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 92657408065287363658614600528341741363136548179
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Jul 20 03:14:52 UTC 2022
           Final Date: Mon Jul 19 03:14:51 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [b5:b6:5e:88:44:75:46:53:eb:ac:b5:3f:63:2d:23:20:61:94:0f:80]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 702b499df368203c89e2f05ea2121998003ccf35
                       777f341f0a9843100723b43ca245059389d5e602
                       f1d48bf77fc6f7000dca876c093664e42a6f729c
                       959fa013d6b1e57b0125e1a65f8032c546848bb7
                       265af75e0499f695f16dd5cf79bb41ede87b2927
                       41c612bbaa2c495c0e629b220b24986af00701f5
                       394aaec1a8e1857fd5b4885ae3c2f573dab42441
                       11a9ac3d6c79580c2c160d081f4c3c7cbd8efdfc
                       3279a656587a0082730cd28e976ae529415e2d13
                       14f0985bfd42e4c486f46bcb6ae2924e53b37bb1
                       32ba3183ca020f1bc1999cd7c1d27e2871c1ae4a
                       d283b904c3d3fc540914714e68cd846c140cbd5e
                       74c8dcc1a41dfc0d4536c29818761d3a75bb6463
                       c3a6efaf719aa0530ca6715dc9eadfdecdc335ee
                       22ab3df86ce45c22a30e6d642ebf9c7ed6234ed0
                       c1ae1265e28651805d5fc2f00f6cd8eedc3a72e2
                       610cf30d06fbab37f23cfd4e77cbf6dd0a394fe9
                       7b11a837707f53800e3a4367872de67592f06c7e
                       7b0d5a53f58883a3ca6c11d2c3791d56ed876871
                       1682ceb0
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [16:62:72:91:a4:84:f5:6d:df:c3:d7:42:77:2c:ab:58:67:7c:b1:26]
            modulus: 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
    public exponent: 10001

] 
2022-07-20 04:44:05.157  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-07-20 04:44:05.159 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-07-20 04:44:05.163 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-07-20 04:44:05.164 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-07-20 04:44:05.165  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-07-20 04:44:05.165  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-07-20 04:44:05.166  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-07-20 04:44:05.166 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-07-20 04:44:05.167 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-07-20 04:44:05.167 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-07-20 04:44:05.173 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-07-20 04:44:05.175 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-20 04:44:05.175 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-20 04:44:05.176 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-20 04:44:05.346  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-07-20 04:44:05.347  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-07-20 04:44:05.348 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-07-20 04:44:05.348 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-20 04:44:05.350  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-07-20 04:44:05.351  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-07-20 04:44:05.351 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-20 04:44:05.352 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-20 04:44:05.352 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-20 04:44:05.353 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-20 04:44:05.354 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-20 04:44:05.354 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-20 04:44:05.355 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-20 04:44:05.355 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-20 04:44:05.355 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-20 04:44:05.356 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-07-20 04:44:05.360 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 92657408065287363658614600528341741363136548179
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Jul 20 03:14:52 UTC 2022
           Final Date: Mon Jul 19 03:14:51 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [b5:b6:5e:88:44:75:46:53:eb:ac:b5:3f:63:2d:23:20:61:94:0f:80]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 702b499df368203c89e2f05ea2121998003ccf35
                       777f341f0a9843100723b43ca245059389d5e602
                       f1d48bf77fc6f7000dca876c093664e42a6f729c
                       959fa013d6b1e57b0125e1a65f8032c546848bb7
                       265af75e0499f695f16dd5cf79bb41ede87b2927
                       41c612bbaa2c495c0e629b220b24986af00701f5
                       394aaec1a8e1857fd5b4885ae3c2f573dab42441
                       11a9ac3d6c79580c2c160d081f4c3c7cbd8efdfc
                       3279a656587a0082730cd28e976ae529415e2d13
                       14f0985bfd42e4c486f46bcb6ae2924e53b37bb1
                       32ba3183ca020f1bc1999cd7c1d27e2871c1ae4a
                       d283b904c3d3fc540914714e68cd846c140cbd5e
                       74c8dcc1a41dfc0d4536c29818761d3a75bb6463
                       c3a6efaf719aa0530ca6715dc9eadfdecdc335ee
                       22ab3df86ce45c22a30e6d642ebf9c7ed6234ed0
                       c1ae1265e28651805d5fc2f00f6cd8eedc3a72e2
                       610cf30d06fbab37f23cfd4e77cbf6dd0a394fe9
                       7b11a837707f53800e3a4367872de67592f06c7e
                       7b0d5a53f58883a3ca6c11d2c3791d56ed876871
                       1682ceb0
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [84:93:94:2c:52:d3:b1:3a:49:2c:bb:d7:64:61:71:b2:2f:cf:df:cc]
            modulus: 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
    public exponent: 10001

] 
2022-07-20 04:59:34.495  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-07-20 04:59:34.498 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-07-20 04:59:34.501 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-07-20 04:59:34.502 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-07-20 04:59:34.503  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-07-20 04:59:34.504  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-07-20 04:59:34.504  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-07-20 04:59:34.505 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-07-20 04:59:34.506 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-07-20 04:59:34.506 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-07-20 04:59:34.515 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-07-20 04:59:34.516 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-20 04:59:34.517 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-20 04:59:34.517 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-20 04:59:34.660  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-07-20 04:59:34.661  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-07-20 04:59:34.662 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-07-20 04:59:34.663 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-20 04:59:34.667  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-07-20 04:59:34.668  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-07-20 04:59:34.669 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-20 04:59:34.670 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-20 04:59:34.670 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-20 04:59:34.672 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-20 04:59:34.673 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-20 04:59:34.673 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-20 04:59:34.675 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-20 04:59:34.675 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-20 04:59:34.676 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-20 04:59:34.677 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-07-20 04:59:34.685 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 92657408065287363658614600528341741363136548179
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Jul 20 03:14:52 UTC 2022
           Final Date: Mon Jul 19 03:14:51 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [b5:b6:5e:88:44:75:46:53:eb:ac:b5:3f:63:2d:23:20:61:94:0f:80]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 702b499df368203c89e2f05ea2121998003ccf35
                       777f341f0a9843100723b43ca245059389d5e602
                       f1d48bf77fc6f7000dca876c093664e42a6f729c
                       959fa013d6b1e57b0125e1a65f8032c546848bb7
                       265af75e0499f695f16dd5cf79bb41ede87b2927
                       41c612bbaa2c495c0e629b220b24986af00701f5
                       394aaec1a8e1857fd5b4885ae3c2f573dab42441
                       11a9ac3d6c79580c2c160d081f4c3c7cbd8efdfc
                       3279a656587a0082730cd28e976ae529415e2d13
                       14f0985bfd42e4c486f46bcb6ae2924e53b37bb1
                       32ba3183ca020f1bc1999cd7c1d27e2871c1ae4a
                       d283b904c3d3fc540914714e68cd846c140cbd5e
                       74c8dcc1a41dfc0d4536c29818761d3a75bb6463
                       c3a6efaf719aa0530ca6715dc9eadfdecdc335ee
                       22ab3df86ce45c22a30e6d642ebf9c7ed6234ed0
                       c1ae1265e28651805d5fc2f00f6cd8eedc3a72e2
                       610cf30d06fbab37f23cfd4e77cbf6dd0a394fe9
                       7b11a837707f53800e3a4367872de67592f06c7e
                       7b0d5a53f58883a3ca6c11d2c3791d56ed876871
                       1682ceb0
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [5a:de:04:69:3c:9c:7b:f5:fb:a7:42:15:93:ea:f0:cf:78:a7:0e:3e]
            modulus: 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
    public exponent: 10001

] 
2022-07-20 05:04:19.394  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-07-20 05:04:19.398 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-07-20 05:04:19.414 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-07-20 05:04:19.416 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-07-20 05:04:19.417  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-07-20 05:04:19.418  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-07-20 05:04:19.419  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-07-20 05:04:19.420 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-07-20 05:04:19.421 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-07-20 05:04:19.423 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-07-20 05:04:19.458 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-07-20 05:04:19.464 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-20 05:04:19.465 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-20 05:04:19.465 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-20 05:04:19.693  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-07-20 05:04:19.695  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-07-20 05:04:19.697 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-07-20 05:04:19.698 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-20 05:04:19.700  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-07-20 05:04:19.700  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-07-20 05:04:19.701 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-20 05:04:19.701 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-20 05:04:19.702 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-20 05:04:19.703 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-20 05:04:19.703 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-20 05:04:19.706 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-20 05:04:19.708 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-20 05:04:19.709 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-20 05:04:19.709 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-20 05:04:19.711 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-07-20 05:04:19.737 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 92657408065287363658614600528341741363136548179
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Jul 20 03:14:52 UTC 2022
           Final Date: Mon Jul 19 03:14:51 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [b5:b6:5e:88:44:75:46:53:eb:ac:b5:3f:63:2d:23:20:61:94:0f:80]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 702b499df368203c89e2f05ea2121998003ccf35
                       777f341f0a9843100723b43ca245059389d5e602
                       f1d48bf77fc6f7000dca876c093664e42a6f729c
                       959fa013d6b1e57b0125e1a65f8032c546848bb7
                       265af75e0499f695f16dd5cf79bb41ede87b2927
                       41c612bbaa2c495c0e629b220b24986af00701f5
                       394aaec1a8e1857fd5b4885ae3c2f573dab42441
                       11a9ac3d6c79580c2c160d081f4c3c7cbd8efdfc
                       3279a656587a0082730cd28e976ae529415e2d13
                       14f0985bfd42e4c486f46bcb6ae2924e53b37bb1
                       32ba3183ca020f1bc1999cd7c1d27e2871c1ae4a
                       d283b904c3d3fc540914714e68cd846c140cbd5e
                       74c8dcc1a41dfc0d4536c29818761d3a75bb6463
                       c3a6efaf719aa0530ca6715dc9eadfdecdc335ee
                       22ab3df86ce45c22a30e6d642ebf9c7ed6234ed0
                       c1ae1265e28651805d5fc2f00f6cd8eedc3a72e2
                       610cf30d06fbab37f23cfd4e77cbf6dd0a394fe9
                       7b11a837707f53800e3a4367872de67592f06c7e
                       7b0d5a53f58883a3ca6c11d2c3791d56ed876871
                       1682ceb0
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [a3:4f:73:92:ea:4b:fd:2a:3d:fc:ef:69:dd:9d:3c:82:4f:85:46:30]
            modulus: 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
    public exponent: 10001

] 
2022-07-20 05:04:36.388  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-07-20 05:04:36.390 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-07-20 05:04:36.392 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-07-20 05:04:36.393 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-07-20 05:04:36.393  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-07-20 05:04:36.394  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-07-20 05:04:36.395  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-07-20 05:04:36.396 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-07-20 05:04:36.396 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-07-20 05:04:36.396 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-07-20 05:04:36.412 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-07-20 05:04:36.416 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-20 05:04:36.418 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-20 05:04:36.419 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-20 05:04:36.567  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-07-20 05:04:36.567  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-07-20 05:04:36.568 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-07-20 05:04:36.569 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-20 05:04:36.571  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-07-20 05:04:36.571  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-07-20 05:04:36.572 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-20 05:04:36.572 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-20 05:04:36.572 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-20 05:04:36.573 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-20 05:04:36.574 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-20 05:04:36.574 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-20 05:04:36.575 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-20 05:04:36.575 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-20 05:04:36.575 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-20 05:04:36.577 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-07-20 05:04:36.586 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 92657408065287363658614600528341741363136548179
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Jul 20 03:14:52 UTC 2022
           Final Date: Mon Jul 19 03:14:51 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [b5:b6:5e:88:44:75:46:53:eb:ac:b5:3f:63:2d:23:20:61:94:0f:80]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 702b499df368203c89e2f05ea2121998003ccf35
                       777f341f0a9843100723b43ca245059389d5e602
                       f1d48bf77fc6f7000dca876c093664e42a6f729c
                       959fa013d6b1e57b0125e1a65f8032c546848bb7
                       265af75e0499f695f16dd5cf79bb41ede87b2927
                       41c612bbaa2c495c0e629b220b24986af00701f5
                       394aaec1a8e1857fd5b4885ae3c2f573dab42441
                       11a9ac3d6c79580c2c160d081f4c3c7cbd8efdfc
                       3279a656587a0082730cd28e976ae529415e2d13
                       14f0985bfd42e4c486f46bcb6ae2924e53b37bb1
                       32ba3183ca020f1bc1999cd7c1d27e2871c1ae4a
                       d283b904c3d3fc540914714e68cd846c140cbd5e
                       74c8dcc1a41dfc0d4536c29818761d3a75bb6463
                       c3a6efaf719aa0530ca6715dc9eadfdecdc335ee
                       22ab3df86ce45c22a30e6d642ebf9c7ed6234ed0
                       c1ae1265e28651805d5fc2f00f6cd8eedc3a72e2
                       610cf30d06fbab37f23cfd4e77cbf6dd0a394fe9
                       7b11a837707f53800e3a4367872de67592f06c7e
                       7b0d5a53f58883a3ca6c11d2c3791d56ed876871
                       1682ceb0
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [87:96:3b:df:90:e7:b8:d7:bf:18:30:11:e5:1d:41:9d:dd:45:6a:a0]
            modulus: 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
    public exponent: 10001

]