Results

By type

          2022-05-09 12:41:48,799 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-05-09 12:41:49,409 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-05-09 12:41:49.867  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
May 09, 2022 12:41:51 PM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
May 09, 2022 12:41:51 PM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
May 09, 2022 12:41:51 PM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
May 09, 2022 12:41:51 PM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-05-09 12:41:51.569 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-05-09 12:41:51.747  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-05-09 12:41:51.858  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-05-09 12:41:52.347 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-05-09 12:41:52.349 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
2022-05-09 12:41:52.350 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-05-09 12:41:52.353 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-05-09 12:41:52.379 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2022-05-09 12:41:52.381 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/docs]}: redirectToUi(HttpServletRequest)
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
2022-05-09 12:41:52.456 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-05-09 12:41:52.910 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
May 09, 2022 12:41:53 PM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-05-09 12:41:53.503  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 5.256 seconds (JVM running for 6.44)
May 09, 2022 12:42:24 PM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-05-09 12:42:42.812  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-09 12:42:42.818 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-09 12:42:42.842 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-05-09 12:42:42.844 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-09 12:42:42.854  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-05-09 12:42:42.856  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-09 12:42:42.856  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-09 12:42:42.857 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-09 12:42:42.857 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-09 12:42:42.859 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-09 12:42:42.863 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-09 12:42:42.865 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-09 12:42:42.889 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-09 12:42:42.894 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-09 12:42:42.894 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-09 12:42:42.897 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-09 12:42:43.317  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-09 12:42:43.320  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-09 12:42:43.321 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-09 12:42:43.323 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-09 12:42:43.332  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-09 12:42:43.333  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-09 12:42:43.334 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-09 12:42:43.335 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-09 12:42:43.335 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-09 12:42:43.343 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-09 12:42:43.343 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-09 12:42:43.343 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-09 12:42:43.347 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-09 12:42:43.347 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-09 12:42:43.347 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-09 12:42:43.348 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-09 12:42:43.367 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 79904257956860246944267444323313560582712788019
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon May 09 12:39:41 UTC 2022
           Final Date: Sat May 08 12:39:40 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [88:4f:22:59:db:1a:64:9d:bf:3c:b0:2d:68:df:d0:14:d6:63:b1:4b]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 911e36de091fd76e75e636ea980c00520a08d326
                       ee85ff07b2105ea4383871da593ecfd3c884ab55
                       63b333abd8a8fed8608b17dafa787cd8d75b5fbd
                       801d056038b1370796ec07d09892e87aed9940de
                       bd5958e329a6b21105faca2f048a2119acaefdcf
                       2d95722b5a8dcf9ff4ff2bc3cf347e4aa323e6d0
                       a3fa72322ec7732c3b6258b413e3655271b1b5b0
                       fd967ea17dad6395eed1228945ea0d93a804b347
                       4cf8b04ae11dcf3bbf03f4948c5a5b285b5f5a92
                       bf79bf240e816fd388a36f88092dd14d2a49c60c
                       74800ee1d261609de285b2d9ce7d48f7b62e93df
                       41ee91769557e5b669015d4c049125037cdd2b72
                       f44685a28b0f70fbd75b46cde20b321d59a2dbee
                       0e53c170033301f3dadfbc83c5bcc51f952e5d56
                       5270d97d4a76367759c3b00e2dc4635a2761fe6a
                       51bb51b065df8534bf8bc3d0497b8d133adfb937
                       963e724f99b65a5607149433e42c5023fe83feea
                       20e358bd4e689c860011ed9f1fde6c5b903092d0
                       ef25856de827e130dfa3e14bcbbcbc8ae3d685aa
                       20b73f10
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [c3:18:90:20:b5:52:6a:a1:0a:a0:56:b0:ed:f0:fd:29:a3:be:49:e8]
            modulus: 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
    public exponent: 10001

] 
2022-05-09 13:53:18.806  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-09 13:53:18.809 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-09 13:53:18.812 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-09 13:53:18.813 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-09 13:53:18.813  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-09 13:53:18.814  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-09 13:53:18.814  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-09 13:53:18.814 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-09 13:53:18.815 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-09 13:53:18.815 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-09 13:53:18.822 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-09 13:53:18.823 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-09 13:53:18.823 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-09 13:53:18.824 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-09 13:53:19.032  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-09 13:53:19.033  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-09 13:53:19.033 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-09 13:53:19.034 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-09 13:53:19.036  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-09 13:53:19.037  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-09 13:53:19.038 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-09 13:53:19.038 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-09 13:53:19.038 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-09 13:53:19.039 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-09 13:53:19.040 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-09 13:53:19.040 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-09 13:53:19.041 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-09 13:53:19.041 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-09 13:53:19.041 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-09 13:53:19.042 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-09 13:53:19.046 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 79904257956860246944267444323313560582712788019
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon May 09 12:39:41 UTC 2022
           Final Date: Sat May 08 12:39:40 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [88:4f:22:59:db:1a:64:9d:bf:3c:b0:2d:68:df:d0:14:d6:63:b1:4b]
            modulus: cf5822af2af26398f8880aa29131650e0ef43db5b0bd2ca9afe49dbd9f49e82062361fd13fd554e565a6ac107d7d6099e8866344f004edd551e557c2c62e99e1e519c3a103cb36d45047496e22b81c9365058ff0decc3a681f17fdc68e70c71c772e1a2dc8178d3a227db84ea3e94692415ed1aeb9658a613020cecec7e22933deccbd3724517ba0f2f36609bdae9fdffb5fcd1dd87f04f2bb19d85ad1de6b5dfaeb1527661aca04358efff84b3c29212b51f3bda7d75ba2f33fff731bbcb04cd3a5b17924feb8ece36771d0631c898153e3e8622928cfff36187c212cfa187b7647475e86107b2f3d80a91dfb6c85fe9d38c31b276bc7b6fa3251088b04e662b182031d27d7b650d5b291ee89b9da78addc2a8d961e632249703b142aea74b7e57332aafe8bc33c9c66a41e1539ca752c153194c83e93c035e8b80d73dc80fd08eae79f28cc896ddb592357aa1e1e4b4917f29f328bc3ba86bbb74ad1b3ee19aaea0ff4a7c9dc7a85090941b07a39216f2bf9ef55c9e3e558700f59a8a5d83b
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 911e36de091fd76e75e636ea980c00520a08d326
                       ee85ff07b2105ea4383871da593ecfd3c884ab55
                       63b333abd8a8fed8608b17dafa787cd8d75b5fbd
                       801d056038b1370796ec07d09892e87aed9940de
                       bd5958e329a6b21105faca2f048a2119acaefdcf
                       2d95722b5a8dcf9ff4ff2bc3cf347e4aa323e6d0
                       a3fa72322ec7732c3b6258b413e3655271b1b5b0
                       fd967ea17dad6395eed1228945ea0d93a804b347
                       4cf8b04ae11dcf3bbf03f4948c5a5b285b5f5a92
                       bf79bf240e816fd388a36f88092dd14d2a49c60c
                       74800ee1d261609de285b2d9ce7d48f7b62e93df
                       41ee91769557e5b669015d4c049125037cdd2b72
                       f44685a28b0f70fbd75b46cde20b321d59a2dbee
                       0e53c170033301f3dadfbc83c5bcc51f952e5d56
                       5270d97d4a76367759c3b00e2dc4635a2761fe6a
                       51bb51b065df8534bf8bc3d0497b8d133adfb937
                       963e724f99b65a5607149433e42c5023fe83feea
                       20e358bd4e689c860011ed9f1fde6c5b903092d0
                       ef25856de827e130dfa3e14bcbbcbc8ae3d685aa
                       20b73f10
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [85:20:fa:26:30:71:c6:7f:66:78:4c:26:4b:64:79:0f:22:77:e6:ec]
            modulus: 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
    public exponent: 10001

] 
2022-05-09 13:53:23.168  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-09 13:53:23.169 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-09 13:53:23.170 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-05-09 13:53:23.171 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-09 13:53:23.171  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-05-09 13:53:23.172  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-09 13:53:23.172  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-09 13:53:23.172 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-09 13:53:23.173 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-09 13:53:23.173 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-09 13:53:23.181 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-09 13:53:23.182 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-09 13:53:23.182 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-09 13:53:23.183 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-09 13:53:23.292  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-09 13:53:23.293  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-09 13:53:23.294 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-09 13:53:23.294 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-09 13:53:23.296  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-09 13:53:23.296  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-09 13:53:23.296 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-09 13:53:23.297 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-09 13:53:23.297 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-09 13:53:23.297 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-09 13:53:23.298 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-09 13:53:23.298 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-09 13:53:23.298 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-09 13:53:23.298 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-09 13:53:23.299 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-09 13:53:23.299 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-09 13:53:23.302 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 79904257956860246944267444323313560582712788019
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon May 09 12:39:41 UTC 2022
           Final Date: Sat May 08 12:39:40 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [88:4f:22:59:db:1a:64:9d:bf:3c:b0:2d:68:df:d0:14:d6:63:b1:4b]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 911e36de091fd76e75e636ea980c00520a08d326
                       ee85ff07b2105ea4383871da593ecfd3c884ab55
                       63b333abd8a8fed8608b17dafa787cd8d75b5fbd
                       801d056038b1370796ec07d09892e87aed9940de
                       bd5958e329a6b21105faca2f048a2119acaefdcf
                       2d95722b5a8dcf9ff4ff2bc3cf347e4aa323e6d0
                       a3fa72322ec7732c3b6258b413e3655271b1b5b0
                       fd967ea17dad6395eed1228945ea0d93a804b347
                       4cf8b04ae11dcf3bbf03f4948c5a5b285b5f5a92
                       bf79bf240e816fd388a36f88092dd14d2a49c60c
                       74800ee1d261609de285b2d9ce7d48f7b62e93df
                       41ee91769557e5b669015d4c049125037cdd2b72
                       f44685a28b0f70fbd75b46cde20b321d59a2dbee
                       0e53c170033301f3dadfbc83c5bcc51f952e5d56
                       5270d97d4a76367759c3b00e2dc4635a2761fe6a
                       51bb51b065df8534bf8bc3d0497b8d133adfb937
                       963e724f99b65a5607149433e42c5023fe83feea
                       20e358bd4e689c860011ed9f1fde6c5b903092d0
                       ef25856de827e130dfa3e14bcbbcbc8ae3d685aa
                       20b73f10
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [8d:d3:4b:a2:92:06:70:bb:45:53:f6:6f:29:45:ce:cd:f3:31:60:5c]
            modulus: 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
    public exponent: 10001

] 
2022-05-09 13:55:06.023  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-09 13:55:06.025 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-09 13:55:06.027 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-05-09 13:55:06.027 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-09 13:55:06.028  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-05-09 13:55:06.029  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-09 13:55:06.029  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-09 13:55:06.029 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-09 13:55:06.030 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-09 13:55:06.030 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-09 13:55:06.034 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-09 13:55:06.034 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-09 13:55:06.035 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-09 13:55:06.035 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-09 13:55:06.233  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-09 13:55:06.234  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-09 13:55:06.235 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-09 13:55:06.235 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-09 13:55:06.241  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-09 13:55:06.242  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-09 13:55:06.243 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-09 13:55:06.244 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-09 13:55:06.244 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-09 13:55:06.245 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-09 13:55:06.246 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-09 13:55:06.246 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-09 13:55:06.247 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-09 13:55:06.248 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-09 13:55:06.248 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-09 13:55:06.249 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-09 13:55:06.253 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 79904257956860246944267444323313560582712788019
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon May 09 12:39:41 UTC 2022
           Final Date: Sat May 08 12:39:40 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [88:4f:22:59:db:1a:64:9d:bf:3c:b0:2d:68:df:d0:14:d6:63:b1:4b]
            modulus: cf5822af2af26398f8880aa29131650e0ef43db5b0bd2ca9afe49dbd9f49e82062361fd13fd554e565a6ac107d7d6099e8866344f004edd551e557c2c62e99e1e519c3a103cb36d45047496e22b81c9365058ff0decc3a681f17fdc68e70c71c772e1a2dc8178d3a227db84ea3e94692415ed1aeb9658a613020cecec7e22933deccbd3724517ba0f2f36609bdae9fdffb5fcd1dd87f04f2bb19d85ad1de6b5dfaeb1527661aca04358efff84b3c29212b51f3bda7d75ba2f33fff731bbcb04cd3a5b17924feb8ece36771d0631c898153e3e8622928cfff36187c212cfa187b7647475e86107b2f3d80a91dfb6c85fe9d38c31b276bc7b6fa3251088b04e662b182031d27d7b650d5b291ee89b9da78addc2a8d961e632249703b142aea74b7e57332aafe8bc33c9c66a41e1539ca752c153194c83e93c035e8b80d73dc80fd08eae79f28cc896ddb592357aa1e1e4b4917f29f328bc3ba86bbb74ad1b3ee19aaea0ff4a7c9dc7a85090941b07a39216f2bf9ef55c9e3e558700f59a8a5d83b
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 911e36de091fd76e75e636ea980c00520a08d326
                       ee85ff07b2105ea4383871da593ecfd3c884ab55
                       63b333abd8a8fed8608b17dafa787cd8d75b5fbd
                       801d056038b1370796ec07d09892e87aed9940de
                       bd5958e329a6b21105faca2f048a2119acaefdcf
                       2d95722b5a8dcf9ff4ff2bc3cf347e4aa323e6d0
                       a3fa72322ec7732c3b6258b413e3655271b1b5b0
                       fd967ea17dad6395eed1228945ea0d93a804b347
                       4cf8b04ae11dcf3bbf03f4948c5a5b285b5f5a92
                       bf79bf240e816fd388a36f88092dd14d2a49c60c
                       74800ee1d261609de285b2d9ce7d48f7b62e93df
                       41ee91769557e5b669015d4c049125037cdd2b72
                       f44685a28b0f70fbd75b46cde20b321d59a2dbee
                       0e53c170033301f3dadfbc83c5bcc51f952e5d56
                       5270d97d4a76367759c3b00e2dc4635a2761fe6a
                       51bb51b065df8534bf8bc3d0497b8d133adfb937
                       963e724f99b65a5607149433e42c5023fe83feea
                       20e358bd4e689c860011ed9f1fde6c5b903092d0
                       ef25856de827e130dfa3e14bcbbcbc8ae3d685aa
                       20b73f10
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [3b:09:0b:70:2a:df:56:b3:7a:c4:1d:ca:41:d9:67:e1:d0:77:91:f3]
            modulus: e689b5ed8dcedb2c88d605430541696a373580f637b3c91d660f6b81513fd255ad6e2fd04d51269ea6801e684659901a96a5db00595335ee5278595c90e5cdf039b86844240fab0337740a5e5b1130f7ed372253c90a05c0118b20fed95ad0325b6a31b99fbeb60244152b1fbbca68080c07c10332c7dcd974e5e56226b40dcbd30dd5ce610e0f18b78d6c23e5c18fabc79019c1fb677d1a63ea96acfa6726ee8d760192da1211598ddbce176fbe375e313545c0f1fef7e79c316742e7d0ba62ba9d70f96bfaa6902a1ddac6ea77e4599cac69633bf16e4839c298106aa0d91df18b81cbcf39214dcec688c1f696576a4dfb3013791784d7ee46be3a9f6115df
    public exponent: 10001

] 
2022-05-09 13:56:05.344  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-09 13:56:05.346 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-09 13:56:05.347 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-05-09 13:56:05.347 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-09 13:56:05.348  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-05-09 13:56:05.348  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-09 13:56:05.348  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-09 13:56:05.348 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-09 13:56:05.349 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-09 13:56:05.349 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-09 13:56:05.352 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-09 13:56:05.352 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-09 13:56:05.353 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-09 13:56:05.353 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-09 13:56:05.493  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-09 13:56:05.494  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-09 13:56:05.494 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-09 13:56:05.494 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-09 13:56:05.496  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-09 13:56:05.496  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-09 13:56:05.497 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-09 13:56:05.497 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-09 13:56:05.497 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-09 13:56:05.498 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-09 13:56:05.498 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-09 13:56:05.498 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-09 13:56:05.498 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-09 13:56:05.499 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-09 13:56:05.499 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-09 13:56:05.499 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-09 13:56:05.501 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 79904257956860246944267444323313560582712788019
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon May 09 12:39:41 UTC 2022
           Final Date: Sat May 08 12:39:40 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [88:4f:22:59:db:1a:64:9d:bf:3c:b0:2d:68:df:d0:14:d6:63:b1:4b]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 911e36de091fd76e75e636ea980c00520a08d326
                       ee85ff07b2105ea4383871da593ecfd3c884ab55
                       63b333abd8a8fed8608b17dafa787cd8d75b5fbd
                       801d056038b1370796ec07d09892e87aed9940de
                       bd5958e329a6b21105faca2f048a2119acaefdcf
                       2d95722b5a8dcf9ff4ff2bc3cf347e4aa323e6d0
                       a3fa72322ec7732c3b6258b413e3655271b1b5b0
                       fd967ea17dad6395eed1228945ea0d93a804b347
                       4cf8b04ae11dcf3bbf03f4948c5a5b285b5f5a92
                       bf79bf240e816fd388a36f88092dd14d2a49c60c
                       74800ee1d261609de285b2d9ce7d48f7b62e93df
                       41ee91769557e5b669015d4c049125037cdd2b72
                       f44685a28b0f70fbd75b46cde20b321d59a2dbee
                       0e53c170033301f3dadfbc83c5bcc51f952e5d56
                       5270d97d4a76367759c3b00e2dc4635a2761fe6a
                       51bb51b065df8534bf8bc3d0497b8d133adfb937
                       963e724f99b65a5607149433e42c5023fe83feea
                       20e358bd4e689c860011ed9f1fde6c5b903092d0
                       ef25856de827e130dfa3e14bcbbcbc8ae3d685aa
                       20b73f10
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [c3:10:80:a8:4b:66:4e:4e:a1:4c:b7:85:a2:62:28:15:e5:d8:0c:25]
            modulus: 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
    public exponent: 10001

] 
2022-05-09 13:58:05.338  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-09 13:58:05.341 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-09 13:58:05.344 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-09 13:58:05.345 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-09 13:58:05.345  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-09 13:58:05.345  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-09 13:58:05.346  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-09 13:58:05.346 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-09 13:58:05.346 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-09 13:58:05.346 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-09 13:58:05.352 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-09 13:58:05.353 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-09 13:58:05.354 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-09 13:58:05.354 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-09 13:58:05.488  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-09 13:58:05.490  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-09 13:58:05.492 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-09 13:58:05.493 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-09 13:58:05.495  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-09 13:58:05.497  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-09 13:58:05.498 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-09 13:58:05.500 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-09 13:58:05.501 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-09 13:58:05.503 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-09 13:58:05.504 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-09 13:58:05.504 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-09 13:58:05.505 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-09 13:58:05.505 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-09 13:58:05.505 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-09 13:58:05.506 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-09 13:58:05.509 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 79904257956860246944267444323313560582712788019
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon May 09 12:39:41 UTC 2022
           Final Date: Sat May 08 12:39:40 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [88:4f:22:59:db:1a:64:9d:bf:3c:b0:2d:68:df:d0:14:d6:63:b1:4b]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 911e36de091fd76e75e636ea980c00520a08d326
                       ee85ff07b2105ea4383871da593ecfd3c884ab55
                       63b333abd8a8fed8608b17dafa787cd8d75b5fbd
                       801d056038b1370796ec07d09892e87aed9940de
                       bd5958e329a6b21105faca2f048a2119acaefdcf
                       2d95722b5a8dcf9ff4ff2bc3cf347e4aa323e6d0
                       a3fa72322ec7732c3b6258b413e3655271b1b5b0
                       fd967ea17dad6395eed1228945ea0d93a804b347
                       4cf8b04ae11dcf3bbf03f4948c5a5b285b5f5a92
                       bf79bf240e816fd388a36f88092dd14d2a49c60c
                       74800ee1d261609de285b2d9ce7d48f7b62e93df
                       41ee91769557e5b669015d4c049125037cdd2b72
                       f44685a28b0f70fbd75b46cde20b321d59a2dbee
                       0e53c170033301f3dadfbc83c5bcc51f952e5d56
                       5270d97d4a76367759c3b00e2dc4635a2761fe6a
                       51bb51b065df8534bf8bc3d0497b8d133adfb937
                       963e724f99b65a5607149433e42c5023fe83feea
                       20e358bd4e689c860011ed9f1fde6c5b903092d0
                       ef25856de827e130dfa3e14bcbbcbc8ae3d685aa
                       20b73f10
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [26:3c:14:ab:f6:55:b1:e5:85:86:c6:fa:2b:10:6e:f4:ea:ac:89:5b]
            modulus: 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
    public exponent: 10001

] 
2022-05-09 13:58:37.542  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-09 13:58:37.543 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-09 13:58:37.545 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-05-09 13:58:37.546 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-09 13:58:37.547  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-05-09 13:58:37.548  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-09 13:58:37.548  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-09 13:58:37.549 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-09 13:58:37.549 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-09 13:58:37.549 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-09 13:58:37.552 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-09 13:58:37.552 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-09 13:58:37.553 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-09 13:58:37.553 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-09 13:58:37.680  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-09 13:58:37.681  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-09 13:58:37.682 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-09 13:58:37.682 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-09 13:58:37.684  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-09 13:58:37.684  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-09 13:58:37.685 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-09 13:58:37.685 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-09 13:58:37.685 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-09 13:58:37.686 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-09 13:58:37.686 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-09 13:58:37.687 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-09 13:58:37.688 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-09 13:58:37.688 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-09 13:58:37.688 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-09 13:58:37.689 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-09 13:58:37.692 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 79904257956860246944267444323313560582712788019
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon May 09 12:39:41 UTC 2022
           Final Date: Sat May 08 12:39:40 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [88:4f:22:59:db:1a:64:9d:bf:3c:b0:2d:68:df:d0:14:d6:63:b1:4b]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 911e36de091fd76e75e636ea980c00520a08d326
                       ee85ff07b2105ea4383871da593ecfd3c884ab55
                       63b333abd8a8fed8608b17dafa787cd8d75b5fbd
                       801d056038b1370796ec07d09892e87aed9940de
                       bd5958e329a6b21105faca2f048a2119acaefdcf
                       2d95722b5a8dcf9ff4ff2bc3cf347e4aa323e6d0
                       a3fa72322ec7732c3b6258b413e3655271b1b5b0
                       fd967ea17dad6395eed1228945ea0d93a804b347
                       4cf8b04ae11dcf3bbf03f4948c5a5b285b5f5a92
                       bf79bf240e816fd388a36f88092dd14d2a49c60c
                       74800ee1d261609de285b2d9ce7d48f7b62e93df
                       41ee91769557e5b669015d4c049125037cdd2b72
                       f44685a28b0f70fbd75b46cde20b321d59a2dbee
                       0e53c170033301f3dadfbc83c5bcc51f952e5d56
                       5270d97d4a76367759c3b00e2dc4635a2761fe6a
                       51bb51b065df8534bf8bc3d0497b8d133adfb937
                       963e724f99b65a5607149433e42c5023fe83feea
                       20e358bd4e689c860011ed9f1fde6c5b903092d0
                       ef25856de827e130dfa3e14bcbbcbc8ae3d685aa
                       20b73f10
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [d7:83:04:02:f1:ac:87:a5:0b:4f:53:9b:46:ac:7d:b9:34:3d:18:60]
            modulus: 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
    public exponent: 10001

] 
2022-05-09 13:58:52.484  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-09 13:58:52.485 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-09 13:58:52.486 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-05-09 13:58:52.486 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-09 13:58:52.487  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-05-09 13:58:52.487  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-09 13:58:52.487  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-09 13:58:52.488 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-09 13:58:52.488 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-09 13:58:52.488 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-09 13:58:52.492 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-09 13:58:52.492 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-09 13:58:52.492 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-09 13:58:52.492 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-09 13:58:52.614  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-09 13:58:52.614  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-09 13:58:52.615 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-09 13:58:52.615 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-09 13:58:52.617  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-09 13:58:52.617  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-09 13:58:52.617 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-09 13:58:52.617 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-09 13:58:52.617 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-09 13:58:52.618 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-09 13:58:52.618 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-09 13:58:52.618 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-09 13:58:52.619 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-09 13:58:52.619 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-09 13:58:52.619 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-09 13:58:52.620 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-09 13:58:52.622 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 79904257956860246944267444323313560582712788019
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon May 09 12:39:41 UTC 2022
           Final Date: Sat May 08 12:39:40 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [88:4f:22:59:db:1a:64:9d:bf:3c:b0:2d:68:df:d0:14:d6:63:b1:4b]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 911e36de091fd76e75e636ea980c00520a08d326
                       ee85ff07b2105ea4383871da593ecfd3c884ab55
                       63b333abd8a8fed8608b17dafa787cd8d75b5fbd
                       801d056038b1370796ec07d09892e87aed9940de
                       bd5958e329a6b21105faca2f048a2119acaefdcf
                       2d95722b5a8dcf9ff4ff2bc3cf347e4aa323e6d0
                       a3fa72322ec7732c3b6258b413e3655271b1b5b0
                       fd967ea17dad6395eed1228945ea0d93a804b347
                       4cf8b04ae11dcf3bbf03f4948c5a5b285b5f5a92
                       bf79bf240e816fd388a36f88092dd14d2a49c60c
                       74800ee1d261609de285b2d9ce7d48f7b62e93df
                       41ee91769557e5b669015d4c049125037cdd2b72
                       f44685a28b0f70fbd75b46cde20b321d59a2dbee
                       0e53c170033301f3dadfbc83c5bcc51f952e5d56
                       5270d97d4a76367759c3b00e2dc4635a2761fe6a
                       51bb51b065df8534bf8bc3d0497b8d133adfb937
                       963e724f99b65a5607149433e42c5023fe83feea
                       20e358bd4e689c860011ed9f1fde6c5b903092d0
                       ef25856de827e130dfa3e14bcbbcbc8ae3d685aa
                       20b73f10
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [4a:aa:74:33:31:3c:b8:d6:a2:ad:45:cf:22:8d:ca:32:fd:53:0a:80]
            modulus: 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
    public exponent: 10001

]