Results

By type

          2022-11-04 02:50:59,349 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-11-04 02:51:00,697 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-11-04 02:51:01.462  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Nov 04, 2022 2:51:03 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Nov 04, 2022 2:51:03 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Nov 04, 2022 2:51:03 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Nov 04, 2022 2:51:03 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-11-04 02:51:04.523 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-11-04 02:51:04.833  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-11-04 02:51:05.006  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-11-04 02:51:05.882 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-11-04 02:51:05.885 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
2022-11-04 02:51:05.886 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-11-04 02:51:05.890 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-11-04 02:51:05.932 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2022-11-04 02:51:05.936 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/docs]}: redirectToUi(HttpServletRequest)
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
2022-11-04 02:51:06.070 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-11-04 02:51:06.830 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Nov 04, 2022 2:51:07 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-11-04 02:51:07.838  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 9.471 seconds (JVM running for 11.439)
Nov 04, 2022 2:51:36 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-11-04 02:51:50.624  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-04 02:51:50.634 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-04 02:51:50.677 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-11-04 02:51:50.682 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-04 02:51:50.701  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-11-04 02:51:50.704  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-04 02:51:50.705  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-04 02:51:50.706 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-04 02:51:50.707 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-04 02:51:50.711 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-04 02:51:50.717 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-04 02:51:50.720 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-04 02:51:50.764 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-04 02:51:50.770 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-04 02:51:50.770 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-04 02:51:50.775 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-04 02:51:51.377  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-04 02:51:51.380  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-04 02:51:51.380 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-04 02:51:51.382 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-04 02:51:51.391  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-04 02:51:51.392  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-04 02:51:51.393 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-04 02:51:51.394 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-04 02:51:51.394 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-04 02:51:51.407 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-04 02:51:51.407 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-04 02:51:51.408 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-04 02:51:51.414 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-04 02:51:51.415 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-04 02:51:51.415 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-04 02:51:51.417 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-04 02:51:51.446 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 331475379984606092620457932815896336072224191933
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Nov 04 02:48:37 UTC 2022
           Final Date: Wed Nov 03 02:48:36 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [8e:49:26:0d:cb:aa:c6:b6:f7:d7:a6:7f:c4:4f:74:2e:2b:4d:5b:73]
            modulus: d5244dcc8912f9a6f10959a0bf1d4c947cbcea5e2b08c477be87aea3310c13f4aeace9f56ed5a9540d38e7ed9cbe51f0ee39cff9e0ced36794f522fc2b114c9b89067a23fcf374e4b915c75a0db58dbc0cc89ac16b4e7bf64a94a3a98026182a82df6db8f9cc62aa73c8486ad7ec013fb42367187439a2823b7a03fd10309548be4e7570eec0207ca882f23cb4db5d3baad4b35bac1aee90e48ae4dbefe289d918ab5cffba603a3e93cb6a928e28a0f84ba70b2b381c4ccaee4abd7eb5948e51a83aaf09863afe914539092dd61f95b2b487dc4f478f548953a11e1f5afce05a549a0ec74fefda9a6281b6f84ff15d24718a0d8a858d74b7cd03d6bd4581154d11ad3edccf0ec33ac23a152c38ea5c6a1a25fd715797ef37281dc6fd1eaf302877a6d9cb96c0d47f92608c277b552cf08dea20336a7e4edfa1d01a770e5ba6e515cf25ee863c275204c9a0c6b42af29799c69121182881aff347ef4d0f21d78cd19ded93b10fa6887d91ce000bbf40cd5e94a4f7c51b7533d1e33e5d3acefe73
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 78560d0160a5e5f54e7016d07a969b3869d9096f
                       4fcdf2beb09bbf37f332a4e048ef33de6ea3fd36
                       07f9b6ae501517c9d449d74add108c11f3033720
                       f4fa0afce9e071ce4f87575cc3e54c54e31588df
                       200beb5e31f4aa6326bcd7f92a66fbfd7053f831
                       771a3505adc2af877d762bc8060cd12d1fafd981
                       aca0f59be6ee3028a352a5d6ad02316eb3eaabbb
                       5081b6916ce8664c904ee94caeb988f0dc2cff12
                       4b8c2dff14e8d318c409b66c7cdf21700b065c82
                       7284b35c74e13982ff7b39969cb4c59429af91d6
                       fad2b59e159a00c64d01f04b11ede618961c260b
                       3b1e2554ee389743f8d4dbb3f396d0f0ea586480
                       0711ae22717abcab395c44bf6ccad50667d4c9ef
                       f4081b2686579807fd481db1a38e1a1e99ba9da8
                       e723d6e9607d9693a63b74611fd1876b0a213eda
                       734a85a32559bce489adf5cccb4abf084a477161
                       1f124d896f2adfa912c40e70992811de1809783f
                       d1aab3a4954f4ade428a68f5a208ea4bf2258ee8
                       dd88f259cb1c9ab60cf74bb6d5eaaecf1d478bc7
                       4afe23d8
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [47:10:87:56:6b:47:f2:6a:a3:11:fa:a0:91:5b:81:fd:d4:99:ea:aa]
            modulus: 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
    public exponent: 10001

] 
2022-11-04 03:56:25.435  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-04 03:56:25.449 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-04 03:56:25.457 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-04 03:56:25.460 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-04 03:56:25.461  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-04 03:56:25.462  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-04 03:56:25.464  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-04 03:56:25.464 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-04 03:56:25.465 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-04 03:56:25.466 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-04 03:56:25.482 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-04 03:56:25.484 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-04 03:56:25.484 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-04 03:56:25.485 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-04 03:56:25.684  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-04 03:56:25.685  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-04 03:56:25.686 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-04 03:56:25.686 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-04 03:56:25.692  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-04 03:56:25.692  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-04 03:56:25.693 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-04 03:56:25.693 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-04 03:56:25.694 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-04 03:56:25.695 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-04 03:56:25.696 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-04 03:56:25.696 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-04 03:56:25.697 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-04 03:56:25.698 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-04 03:56:25.698 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-04 03:56:25.699 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-04 03:56:25.705 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 331475379984606092620457932815896336072224191933
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Nov 04 02:48:37 UTC 2022
           Final Date: Wed Nov 03 02:48:36 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [8e:49:26:0d:cb:aa:c6:b6:f7:d7:a6:7f:c4:4f:74:2e:2b:4d:5b:73]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 78560d0160a5e5f54e7016d07a969b3869d9096f
                       4fcdf2beb09bbf37f332a4e048ef33de6ea3fd36
                       07f9b6ae501517c9d449d74add108c11f3033720
                       f4fa0afce9e071ce4f87575cc3e54c54e31588df
                       200beb5e31f4aa6326bcd7f92a66fbfd7053f831
                       771a3505adc2af877d762bc8060cd12d1fafd981
                       aca0f59be6ee3028a352a5d6ad02316eb3eaabbb
                       5081b6916ce8664c904ee94caeb988f0dc2cff12
                       4b8c2dff14e8d318c409b66c7cdf21700b065c82
                       7284b35c74e13982ff7b39969cb4c59429af91d6
                       fad2b59e159a00c64d01f04b11ede618961c260b
                       3b1e2554ee389743f8d4dbb3f396d0f0ea586480
                       0711ae22717abcab395c44bf6ccad50667d4c9ef
                       f4081b2686579807fd481db1a38e1a1e99ba9da8
                       e723d6e9607d9693a63b74611fd1876b0a213eda
                       734a85a32559bce489adf5cccb4abf084a477161
                       1f124d896f2adfa912c40e70992811de1809783f
                       d1aab3a4954f4ade428a68f5a208ea4bf2258ee8
                       dd88f259cb1c9ab60cf74bb6d5eaaecf1d478bc7
                       4afe23d8
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [d9:ff:75:ed:8f:be:ec:e4:0b:90:49:06:ba:28:dc:f2:54:0d:cb:a5]
            modulus: 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
    public exponent: 10001

] 
2022-11-04 03:58:11.747  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-04 03:58:11.750 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-04 03:58:11.753 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-11-04 03:58:11.755 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-04 03:58:11.756  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-11-04 03:58:11.757  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-04 03:58:11.758  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-04 03:58:11.758 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-04 03:58:11.759 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-04 03:58:11.761 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-04 03:58:11.775 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-04 03:58:11.776 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-04 03:58:11.776 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-04 03:58:11.777 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-04 03:58:11.970  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-04 03:58:11.971  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-04 03:58:11.972 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-04 03:58:11.972 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-04 03:58:11.975  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-04 03:58:11.976  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-04 03:58:11.977 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-04 03:58:11.977 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-04 03:58:11.978 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-04 03:58:11.979 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-04 03:58:11.980 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-04 03:58:11.980 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-04 03:58:11.981 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-04 03:58:11.982 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-04 03:58:11.982 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-04 03:58:11.984 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-04 03:58:11.990 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 331475379984606092620457932815896336072224191933
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Nov 04 02:48:37 UTC 2022
           Final Date: Wed Nov 03 02:48:36 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [8e:49:26:0d:cb:aa:c6:b6:f7:d7:a6:7f:c4:4f:74:2e:2b:4d:5b:73]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 78560d0160a5e5f54e7016d07a969b3869d9096f
                       4fcdf2beb09bbf37f332a4e048ef33de6ea3fd36
                       07f9b6ae501517c9d449d74add108c11f3033720
                       f4fa0afce9e071ce4f87575cc3e54c54e31588df
                       200beb5e31f4aa6326bcd7f92a66fbfd7053f831
                       771a3505adc2af877d762bc8060cd12d1fafd981
                       aca0f59be6ee3028a352a5d6ad02316eb3eaabbb
                       5081b6916ce8664c904ee94caeb988f0dc2cff12
                       4b8c2dff14e8d318c409b66c7cdf21700b065c82
                       7284b35c74e13982ff7b39969cb4c59429af91d6
                       fad2b59e159a00c64d01f04b11ede618961c260b
                       3b1e2554ee389743f8d4dbb3f396d0f0ea586480
                       0711ae22717abcab395c44bf6ccad50667d4c9ef
                       f4081b2686579807fd481db1a38e1a1e99ba9da8
                       e723d6e9607d9693a63b74611fd1876b0a213eda
                       734a85a32559bce489adf5cccb4abf084a477161
                       1f124d896f2adfa912c40e70992811de1809783f
                       d1aab3a4954f4ade428a68f5a208ea4bf2258ee8
                       dd88f259cb1c9ab60cf74bb6d5eaaecf1d478bc7
                       4afe23d8
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [f5:1d:b0:54:07:7a:4f:ea:1b:37:0e:79:6b:1a:27:0f:d8:d7:99:08]
            modulus: 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
    public exponent: 10001

] 
2022-11-04 03:59:25.554  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-04 03:59:25.556 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-04 03:59:25.558 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-11-04 03:59:25.558 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-04 03:59:25.565  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-11-04 03:59:25.568  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-04 03:59:25.569  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-04 03:59:25.572 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-04 03:59:25.573 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-04 03:59:25.573 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-04 03:59:25.583 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-04 03:59:25.584 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-04 03:59:25.585 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-04 03:59:25.585 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-04 03:59:25.729  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-04 03:59:25.729  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-04 03:59:25.730 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-04 03:59:25.730 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-04 03:59:25.732  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-04 03:59:25.733  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-04 03:59:25.733 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-04 03:59:25.734 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-04 03:59:25.734 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-04 03:59:25.735 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-04 03:59:25.735 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-04 03:59:25.735 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-04 03:59:25.736 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-04 03:59:25.736 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-04 03:59:25.737 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-04 03:59:25.738 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-04 03:59:25.743 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 331475379984606092620457932815896336072224191933
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Nov 04 02:48:37 UTC 2022
           Final Date: Wed Nov 03 02:48:36 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [8e:49:26:0d:cb:aa:c6:b6:f7:d7:a6:7f:c4:4f:74:2e:2b:4d:5b:73]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 78560d0160a5e5f54e7016d07a969b3869d9096f
                       4fcdf2beb09bbf37f332a4e048ef33de6ea3fd36
                       07f9b6ae501517c9d449d74add108c11f3033720
                       f4fa0afce9e071ce4f87575cc3e54c54e31588df
                       200beb5e31f4aa6326bcd7f92a66fbfd7053f831
                       771a3505adc2af877d762bc8060cd12d1fafd981
                       aca0f59be6ee3028a352a5d6ad02316eb3eaabbb
                       5081b6916ce8664c904ee94caeb988f0dc2cff12
                       4b8c2dff14e8d318c409b66c7cdf21700b065c82
                       7284b35c74e13982ff7b39969cb4c59429af91d6
                       fad2b59e159a00c64d01f04b11ede618961c260b
                       3b1e2554ee389743f8d4dbb3f396d0f0ea586480
                       0711ae22717abcab395c44bf6ccad50667d4c9ef
                       f4081b2686579807fd481db1a38e1a1e99ba9da8
                       e723d6e9607d9693a63b74611fd1876b0a213eda
                       734a85a32559bce489adf5cccb4abf084a477161
                       1f124d896f2adfa912c40e70992811de1809783f
                       d1aab3a4954f4ade428a68f5a208ea4bf2258ee8
                       dd88f259cb1c9ab60cf74bb6d5eaaecf1d478bc7
                       4afe23d8
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [19:00:c8:f8:f7:6e:26:9f:29:b5:16:6b:b9:35:f2:1f:bb:7a:1d:2b]
            modulus: d857d31166b003725a8ff9147e9ba6ae90f4c30e7975646a05ac9ac1a7264f4b1c0fef4227c31e9b4b64992d999de1d6cec2106dafca439fd6e4c8767d819e95017a926b279c799e0c048d02b60cb5d92c9bb6db20a81200ae58192d36dcece2556cfc0d991f0b2666481eb724eeb512a9aa1941a15507b087d2a66e2e459824aa6271bd29ece2b91d90f846acacb0063e9287664bafa8c4b60d409a6ff422dabe61f96d68d9b47e20e3690705420cb88e3aa023723bdd9b231e12595fa75b621ab65cd4d7eae5f43d6fe0aaf91365e8981d8515380efbc9e6a7b1561d5230cb9dbab00e46f7b5eeb3c384d4ec803c94dba1b3a184949d6a10270e7a29cc1995
    public exponent: 10001

] 
2022-11-04 04:01:32.339  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-04 04:01:32.340 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-04 04:01:32.342 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-04 04:01:32.343 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-04 04:01:32.343  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-04 04:01:32.344  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-04 04:01:32.344  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-04 04:01:32.345 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-04 04:01:32.345 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-04 04:01:32.346 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-04 04:01:32.351 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-04 04:01:32.352 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-04 04:01:32.352 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-04 04:01:32.353 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-04 04:01:32.515  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-04 04:01:32.516  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-04 04:01:32.516 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-04 04:01:32.517 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-04 04:01:32.519  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-04 04:01:32.520  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-04 04:01:32.520 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-04 04:01:32.521 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-04 04:01:32.521 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-04 04:01:32.522 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-04 04:01:32.522 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-04 04:01:32.522 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-04 04:01:32.523 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-04 04:01:32.523 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-04 04:01:32.524 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-04 04:01:32.525 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-04 04:01:32.529 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 331475379984606092620457932815896336072224191933
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Nov 04 02:48:37 UTC 2022
           Final Date: Wed Nov 03 02:48:36 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [8e:49:26:0d:cb:aa:c6:b6:f7:d7:a6:7f:c4:4f:74:2e:2b:4d:5b:73]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 78560d0160a5e5f54e7016d07a969b3869d9096f
                       4fcdf2beb09bbf37f332a4e048ef33de6ea3fd36
                       07f9b6ae501517c9d449d74add108c11f3033720
                       f4fa0afce9e071ce4f87575cc3e54c54e31588df
                       200beb5e31f4aa6326bcd7f92a66fbfd7053f831
                       771a3505adc2af877d762bc8060cd12d1fafd981
                       aca0f59be6ee3028a352a5d6ad02316eb3eaabbb
                       5081b6916ce8664c904ee94caeb988f0dc2cff12
                       4b8c2dff14e8d318c409b66c7cdf21700b065c82
                       7284b35c74e13982ff7b39969cb4c59429af91d6
                       fad2b59e159a00c64d01f04b11ede618961c260b
                       3b1e2554ee389743f8d4dbb3f396d0f0ea586480
                       0711ae22717abcab395c44bf6ccad50667d4c9ef
                       f4081b2686579807fd481db1a38e1a1e99ba9da8
                       e723d6e9607d9693a63b74611fd1876b0a213eda
                       734a85a32559bce489adf5cccb4abf084a477161
                       1f124d896f2adfa912c40e70992811de1809783f
                       d1aab3a4954f4ade428a68f5a208ea4bf2258ee8
                       dd88f259cb1c9ab60cf74bb6d5eaaecf1d478bc7
                       4afe23d8
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ec:43:89:6e:0f:c9:15:cb:11:c1:28:52:c6:77:97:3e:8b:ef:4f:52]
            modulus: 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
    public exponent: 10001

] 
2022-11-04 04:16:50.554  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-04 04:16:50.557 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-04 04:16:50.560 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-11-04 04:16:50.561 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-04 04:16:50.562  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-11-04 04:16:50.563  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-04 04:16:50.563  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-04 04:16:50.563 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-04 04:16:50.564 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-04 04:16:50.565 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-04 04:16:50.572 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-04 04:16:50.573 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-04 04:16:50.574 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-04 04:16:50.574 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-04 04:16:50.725  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-04 04:16:50.726  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-04 04:16:50.726 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-04 04:16:50.727 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-04 04:16:50.729  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-04 04:16:50.729  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-04 04:16:50.730 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-04 04:16:50.731 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-04 04:16:50.731 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-04 04:16:50.732 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-04 04:16:50.733 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-04 04:16:50.733 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-04 04:16:50.734 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-04 04:16:50.735 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-04 04:16:50.736 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-04 04:16:50.737 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-04 04:16:50.743 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 331475379984606092620457932815896336072224191933
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Nov 04 02:48:37 UTC 2022
           Final Date: Wed Nov 03 02:48:36 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [8e:49:26:0d:cb:aa:c6:b6:f7:d7:a6:7f:c4:4f:74:2e:2b:4d:5b:73]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 78560d0160a5e5f54e7016d07a969b3869d9096f
                       4fcdf2beb09bbf37f332a4e048ef33de6ea3fd36
                       07f9b6ae501517c9d449d74add108c11f3033720
                       f4fa0afce9e071ce4f87575cc3e54c54e31588df
                       200beb5e31f4aa6326bcd7f92a66fbfd7053f831
                       771a3505adc2af877d762bc8060cd12d1fafd981
                       aca0f59be6ee3028a352a5d6ad02316eb3eaabbb
                       5081b6916ce8664c904ee94caeb988f0dc2cff12
                       4b8c2dff14e8d318c409b66c7cdf21700b065c82
                       7284b35c74e13982ff7b39969cb4c59429af91d6
                       fad2b59e159a00c64d01f04b11ede618961c260b
                       3b1e2554ee389743f8d4dbb3f396d0f0ea586480
                       0711ae22717abcab395c44bf6ccad50667d4c9ef
                       f4081b2686579807fd481db1a38e1a1e99ba9da8
                       e723d6e9607d9693a63b74611fd1876b0a213eda
                       734a85a32559bce489adf5cccb4abf084a477161
                       1f124d896f2adfa912c40e70992811de1809783f
                       d1aab3a4954f4ade428a68f5a208ea4bf2258ee8
                       dd88f259cb1c9ab60cf74bb6d5eaaecf1d478bc7
                       4afe23d8
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [9a:76:e0:e9:a1:05:91:8e:3e:74:f7:f4:d4:56:34:92:25:c2:78:84]
            modulus: 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
    public exponent: 10001

] 
2022-11-04 04:21:21.399  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-04 04:21:21.402 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-04 04:21:21.406 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-11-04 04:21:21.407 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-04 04:21:21.407  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-11-04 04:21:21.408  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-04 04:21:21.408  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-04 04:21:21.409 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-04 04:21:21.409 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-04 04:21:21.410 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-04 04:21:21.416 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-04 04:21:21.417 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-04 04:21:21.418 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-04 04:21:21.418 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-04 04:21:21.537  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-04 04:21:21.538  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-04 04:21:21.539 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-04 04:21:21.539 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-04 04:21:21.540  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-04 04:21:21.541  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-04 04:21:21.541 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-04 04:21:21.541 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-04 04:21:21.542 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-04 04:21:21.542 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-04 04:21:21.543 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-04 04:21:21.543 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-04 04:21:21.544 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-04 04:21:21.544 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-04 04:21:21.544 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-04 04:21:21.545 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-04 04:21:21.549 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 331475379984606092620457932815896336072224191933
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Nov 04 02:48:37 UTC 2022
           Final Date: Wed Nov 03 02:48:36 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [8e:49:26:0d:cb:aa:c6:b6:f7:d7:a6:7f:c4:4f:74:2e:2b:4d:5b:73]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 78560d0160a5e5f54e7016d07a969b3869d9096f
                       4fcdf2beb09bbf37f332a4e048ef33de6ea3fd36
                       07f9b6ae501517c9d449d74add108c11f3033720
                       f4fa0afce9e071ce4f87575cc3e54c54e31588df
                       200beb5e31f4aa6326bcd7f92a66fbfd7053f831
                       771a3505adc2af877d762bc8060cd12d1fafd981
                       aca0f59be6ee3028a352a5d6ad02316eb3eaabbb
                       5081b6916ce8664c904ee94caeb988f0dc2cff12
                       4b8c2dff14e8d318c409b66c7cdf21700b065c82
                       7284b35c74e13982ff7b39969cb4c59429af91d6
                       fad2b59e159a00c64d01f04b11ede618961c260b
                       3b1e2554ee389743f8d4dbb3f396d0f0ea586480
                       0711ae22717abcab395c44bf6ccad50667d4c9ef
                       f4081b2686579807fd481db1a38e1a1e99ba9da8
                       e723d6e9607d9693a63b74611fd1876b0a213eda
                       734a85a32559bce489adf5cccb4abf084a477161
                       1f124d896f2adfa912c40e70992811de1809783f
                       d1aab3a4954f4ade428a68f5a208ea4bf2258ee8
                       dd88f259cb1c9ab60cf74bb6d5eaaecf1d478bc7
                       4afe23d8
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [59:de:98:4e:f3:39:34:cd:ec:49:1a:92:eb:58:ff:5a:80:ba:7d:20]
            modulus: 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
    public exponent: 10001

] 
2022-11-04 04:21:36.686  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-04 04:21:36.687 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-04 04:21:36.689 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-11-04 04:21:36.689 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-04 04:21:36.690  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-11-04 04:21:36.691  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-04 04:21:36.691  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-04 04:21:36.692 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-04 04:21:36.692 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-04 04:21:36.693 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-04 04:21:36.699 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-04 04:21:36.700 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-04 04:21:36.700 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-04 04:21:36.701 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-04 04:21:36.818  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-04 04:21:36.819  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-04 04:21:36.820 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-04 04:21:36.820 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-04 04:21:36.823  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-04 04:21:36.823  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-04 04:21:36.824 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-04 04:21:36.824 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-04 04:21:36.824 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-04 04:21:36.825 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-04 04:21:36.826 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-04 04:21:36.826 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-04 04:21:36.827 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-04 04:21:36.827 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-04 04:21:36.828 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-04 04:21:36.829 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-04 04:21:36.833 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 331475379984606092620457932815896336072224191933
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Nov 04 02:48:37 UTC 2022
           Final Date: Wed Nov 03 02:48:36 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [8e:49:26:0d:cb:aa:c6:b6:f7:d7:a6:7f:c4:4f:74:2e:2b:4d:5b:73]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 78560d0160a5e5f54e7016d07a969b3869d9096f
                       4fcdf2beb09bbf37f332a4e048ef33de6ea3fd36
                       07f9b6ae501517c9d449d74add108c11f3033720
                       f4fa0afce9e071ce4f87575cc3e54c54e31588df
                       200beb5e31f4aa6326bcd7f92a66fbfd7053f831
                       771a3505adc2af877d762bc8060cd12d1fafd981
                       aca0f59be6ee3028a352a5d6ad02316eb3eaabbb
                       5081b6916ce8664c904ee94caeb988f0dc2cff12
                       4b8c2dff14e8d318c409b66c7cdf21700b065c82
                       7284b35c74e13982ff7b39969cb4c59429af91d6
                       fad2b59e159a00c64d01f04b11ede618961c260b
                       3b1e2554ee389743f8d4dbb3f396d0f0ea586480
                       0711ae22717abcab395c44bf6ccad50667d4c9ef
                       f4081b2686579807fd481db1a38e1a1e99ba9da8
                       e723d6e9607d9693a63b74611fd1876b0a213eda
                       734a85a32559bce489adf5cccb4abf084a477161
                       1f124d896f2adfa912c40e70992811de1809783f
                       d1aab3a4954f4ade428a68f5a208ea4bf2258ee8
                       dd88f259cb1c9ab60cf74bb6d5eaaecf1d478bc7
                       4afe23d8
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [17:c2:07:5f:15:62:3d:00:69:73:97:e7:7e:99:7c:0b:c0:9d:26:df]
            modulus: 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
    public exponent: 10001

]