Results

By type

          2022-05-13 06:35:33,407 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-05-13 06:35:34,782 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-05-13 06:35:35.787  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
May 13, 2022 6:35:38 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
May 13, 2022 6:35:38 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
May 13, 2022 6:35:38 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
May 13, 2022 6:35:38 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-05-13 06:35:39.115 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-05-13 06:35:39.517  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-05-13 06:35:39.723  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-05-13 06:35:40.576 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-05-13 06:35:40.579 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
2022-05-13 06:35:40.580 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-05-13 06:35:40.584 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-05-13 06:35:40.626 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2022-05-13 06:35:40.630 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/docs]}: redirectToUi(HttpServletRequest)
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
2022-05-13 06:35:40.759 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-05-13 06:35:41.459 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
May 13, 2022 6:35:42 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-05-13 06:35:42.879  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 10.568 seconds (JVM running for 12.757)
May 13, 2022 6:36:01 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-05-13 06:36:15.826  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-13 06:36:15.834 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-13 06:36:15.888 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-05-13 06:36:15.892 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-13 06:36:15.908  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-05-13 06:36:15.911  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-13 06:36:15.912  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-13 06:36:15.914 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-13 06:36:15.914 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-13 06:36:15.918 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-13 06:36:15.925 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-13 06:36:15.928 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-13 06:36:15.986 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-13 06:36:15.995 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-13 06:36:15.996 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-13 06:36:16.002 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-13 06:36:16.648  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-13 06:36:16.652  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-13 06:36:16.652 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-13 06:36:16.655 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-13 06:36:16.677  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-13 06:36:16.679  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-13 06:36:16.681 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-13 06:36:16.682 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-13 06:36:16.683 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-13 06:36:16.699 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-13 06:36:16.700 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-13 06:36:16.700 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-13 06:36:16.708 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-13 06:36:16.708 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-13 06:36:16.709 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-13 06:36:16.712 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-13 06:36:16.751 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 417344679915057248282312612130673491109629306887
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri May 13 06:33:23 UTC 2022
           Final Date: Wed May 12 06:33:22 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [a5:29:24:40:42:9c:ca:c8:d9:6c:52:19:20:be:70:3e:d8:47:c9:50]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 0ecaa37d799b8bbdfae6f92c8e4cd6654e9d9816
                       80cbd5498e0687ae10496fce0a41b4e4b7ca9739
                       aa4b22bd0aead9c9e819e182671babe7eec709d1
                       22b4445956f1b573381ea667f4045f784a2552ba
                       1f9f89284d618f78bb5184a386cfbc49dc4ff8de
                       e4d93cfd8d8994938e0ab1ad82f8ef2ca0dcda8b
                       1de5510494a9c583ce162353850a514636fe41ff
                       8554527cc4cd485fcebd8dba1d2c024190d88827
                       0965760deb1cf4a28a7c7a271d648d26050c26ff
                       71a1b65e19bde4f325d38dddfeee6214e13b9c51
                       aa160216efc561a94a8f36fefb2885d675969340
                       143517eef8d14534253ada51eeb8cd14f2a2aa81
                       f43fe53ac39faec2a444bca883321019f0308b24
                       a5db38a5e692b9702beed4384d7a383fd9161c1f
                       09a9c655326b2ad2fa83f9530548180ee5e4e8e0
                       3c58a6a8863aecdd5c711d56b6fc4319342d871b
                       8896cc37e6d0ec7e413c9de354befe53351ab5a8
                       3c0b2716975079d01bc48f2a1e99b7fb68ea6d4b
                       2cb8faac463469909b2332825bf4d81fb11d1b33
                       e552a904
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [fa:36:80:1a:7e:cd:b2:8c:e0:4c:83:ca:f9:b1:aa:df:12:33:24:dc]
            modulus: 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
    public exponent: 10001

] 
2022-05-13 07:17:57.878  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-13 07:17:57.882 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-13 07:17:57.892 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-13 07:17:57.895 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-13 07:17:57.897  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-13 07:17:57.898  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-13 07:17:57.899  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-13 07:17:57.900 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-13 07:17:57.901 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-13 07:17:57.903 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-13 07:17:57.911 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-13 07:17:57.913 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-13 07:17:57.914 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-13 07:17:57.914 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-13 07:17:58.146  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-13 07:17:58.148  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-13 07:17:58.148 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-13 07:17:58.149 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-13 07:17:58.153  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-13 07:17:58.154  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-13 07:17:58.155 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-13 07:17:58.155 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-13 07:17:58.156 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-13 07:17:58.159 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-13 07:17:58.160 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-13 07:17:58.160 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-13 07:17:58.161 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-13 07:17:58.162 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-13 07:17:58.162 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-13 07:17:58.164 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-13 07:17:58.169 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 417344679915057248282312612130673491109629306887
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri May 13 06:33:23 UTC 2022
           Final Date: Wed May 12 06:33:22 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [a5:29:24:40:42:9c:ca:c8:d9:6c:52:19:20:be:70:3e:d8:47:c9:50]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 0ecaa37d799b8bbdfae6f92c8e4cd6654e9d9816
                       80cbd5498e0687ae10496fce0a41b4e4b7ca9739
                       aa4b22bd0aead9c9e819e182671babe7eec709d1
                       22b4445956f1b573381ea667f4045f784a2552ba
                       1f9f89284d618f78bb5184a386cfbc49dc4ff8de
                       e4d93cfd8d8994938e0ab1ad82f8ef2ca0dcda8b
                       1de5510494a9c583ce162353850a514636fe41ff
                       8554527cc4cd485fcebd8dba1d2c024190d88827
                       0965760deb1cf4a28a7c7a271d648d26050c26ff
                       71a1b65e19bde4f325d38dddfeee6214e13b9c51
                       aa160216efc561a94a8f36fefb2885d675969340
                       143517eef8d14534253ada51eeb8cd14f2a2aa81
                       f43fe53ac39faec2a444bca883321019f0308b24
                       a5db38a5e692b9702beed4384d7a383fd9161c1f
                       09a9c655326b2ad2fa83f9530548180ee5e4e8e0
                       3c58a6a8863aecdd5c711d56b6fc4319342d871b
                       8896cc37e6d0ec7e413c9de354befe53351ab5a8
                       3c0b2716975079d01bc48f2a1e99b7fb68ea6d4b
                       2cb8faac463469909b2332825bf4d81fb11d1b33
                       e552a904
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [51:c7:62:32:8c:b9:da:e1:b5:25:69:75:86:da:e6:b0:94:c3:8a:47]
            modulus: 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
    public exponent: 10001

] 
2022-05-13 07:18:04.135  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-13 07:18:04.138 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-13 07:18:04.140 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-05-13 07:18:04.141 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-13 07:18:04.142  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-05-13 07:18:04.143  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-13 07:18:04.144  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-13 07:18:04.144 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-13 07:18:04.145 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-13 07:18:04.146 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-13 07:18:04.153 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-13 07:18:04.154 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-13 07:18:04.155 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-13 07:18:04.155 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-13 07:18:04.342  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-13 07:18:04.343  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-13 07:18:04.343 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-13 07:18:04.344 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-13 07:18:04.346  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-13 07:18:04.347  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-13 07:18:04.348 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-13 07:18:04.348 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-13 07:18:04.348 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-13 07:18:04.350 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-13 07:18:04.350 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-13 07:18:04.351 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-13 07:18:04.352 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-13 07:18:04.353 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-13 07:18:04.353 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-13 07:18:04.355 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-13 07:18:04.359 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 417344679915057248282312612130673491109629306887
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri May 13 06:33:23 UTC 2022
           Final Date: Wed May 12 06:33:22 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [a5:29:24:40:42:9c:ca:c8:d9:6c:52:19:20:be:70:3e:d8:47:c9:50]
            modulus: 8777c6ce8753a65bd5c8aaf3d1d275f9f08ba13bada04c57909a35e2097613ad4c3eeca7e926e1008d79b6babf13485fb05e1959a12fdfaf89840a9f7cdbdf6833ebadb995d63bdfd10cb26d19d7f0bff4222d57a452278a33ecec61fb06079b7491abdbc2def1a421e81dd844cf0b2a11c957f01a606f79f8e0e5c831cdaa27cadd1fc9a327e16ab20fc068900da020338d07d749ff450a9f4109717ce50b7cbf5b46cc815ccc7f2a63a1a103e08d2888536020878108c1370950d5b5f89e66a1d8236e9bafb9824cf504f8bd7d346b328ce583013331f9b9bcb99e8cfca1f4e3813f15af20e3258862991e20104ad4fe4241edcd1931330d72171b2076bb7f8f89a205f6408d11a06268fc12b8aa87e1b327b09a216509bec92b6a7b0cf52743de1659faa1f6fc4b9b73160f34333c8b14968b635335aa0ccc75d803392ec37c517690522b422c598c1e2357f84b2112e296487b40dbe96a01c6901de80cec31004ce8e3a1525ccf0a1982ef18bb862f940475bc46fbce451713325cd6c3a7
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 0ecaa37d799b8bbdfae6f92c8e4cd6654e9d9816
                       80cbd5498e0687ae10496fce0a41b4e4b7ca9739
                       aa4b22bd0aead9c9e819e182671babe7eec709d1
                       22b4445956f1b573381ea667f4045f784a2552ba
                       1f9f89284d618f78bb5184a386cfbc49dc4ff8de
                       e4d93cfd8d8994938e0ab1ad82f8ef2ca0dcda8b
                       1de5510494a9c583ce162353850a514636fe41ff
                       8554527cc4cd485fcebd8dba1d2c024190d88827
                       0965760deb1cf4a28a7c7a271d648d26050c26ff
                       71a1b65e19bde4f325d38dddfeee6214e13b9c51
                       aa160216efc561a94a8f36fefb2885d675969340
                       143517eef8d14534253ada51eeb8cd14f2a2aa81
                       f43fe53ac39faec2a444bca883321019f0308b24
                       a5db38a5e692b9702beed4384d7a383fd9161c1f
                       09a9c655326b2ad2fa83f9530548180ee5e4e8e0
                       3c58a6a8863aecdd5c711d56b6fc4319342d871b
                       8896cc37e6d0ec7e413c9de354befe53351ab5a8
                       3c0b2716975079d01bc48f2a1e99b7fb68ea6d4b
                       2cb8faac463469909b2332825bf4d81fb11d1b33
                       e552a904
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [19:c5:3d:d7:c0:57:50:cf:0c:bb:b4:55:98:2f:33:21:69:dc:6e:35]
            modulus: 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
    public exponent: 10001

] 
2022-05-13 07:19:30.135  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-13 07:19:30.137 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-13 07:19:30.140 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-05-13 07:19:30.140 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-13 07:19:30.141  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-05-13 07:19:30.142  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-13 07:19:30.142  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-13 07:19:30.143 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-13 07:19:30.143 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-13 07:19:30.144 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-13 07:19:30.151 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-13 07:19:30.152 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-13 07:19:30.152 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-13 07:19:30.153 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-13 07:19:30.301  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-13 07:19:30.302  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-13 07:19:30.303 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-13 07:19:30.303 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-13 07:19:30.312  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-13 07:19:30.313  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-13 07:19:30.314 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-13 07:19:30.315 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-13 07:19:30.315 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-13 07:19:30.317 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-13 07:19:30.318 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-13 07:19:30.318 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-13 07:19:30.319 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-13 07:19:30.321 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-13 07:19:30.321 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-13 07:19:30.323 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-13 07:19:30.331 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 417344679915057248282312612130673491109629306887
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri May 13 06:33:23 UTC 2022
           Final Date: Wed May 12 06:33:22 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [a5:29:24:40:42:9c:ca:c8:d9:6c:52:19:20:be:70:3e:d8:47:c9:50]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 0ecaa37d799b8bbdfae6f92c8e4cd6654e9d9816
                       80cbd5498e0687ae10496fce0a41b4e4b7ca9739
                       aa4b22bd0aead9c9e819e182671babe7eec709d1
                       22b4445956f1b573381ea667f4045f784a2552ba
                       1f9f89284d618f78bb5184a386cfbc49dc4ff8de
                       e4d93cfd8d8994938e0ab1ad82f8ef2ca0dcda8b
                       1de5510494a9c583ce162353850a514636fe41ff
                       8554527cc4cd485fcebd8dba1d2c024190d88827
                       0965760deb1cf4a28a7c7a271d648d26050c26ff
                       71a1b65e19bde4f325d38dddfeee6214e13b9c51
                       aa160216efc561a94a8f36fefb2885d675969340
                       143517eef8d14534253ada51eeb8cd14f2a2aa81
                       f43fe53ac39faec2a444bca883321019f0308b24
                       a5db38a5e692b9702beed4384d7a383fd9161c1f
                       09a9c655326b2ad2fa83f9530548180ee5e4e8e0
                       3c58a6a8863aecdd5c711d56b6fc4319342d871b
                       8896cc37e6d0ec7e413c9de354befe53351ab5a8
                       3c0b2716975079d01bc48f2a1e99b7fb68ea6d4b
                       2cb8faac463469909b2332825bf4d81fb11d1b33
                       e552a904
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [8b:8c:c2:8f:77:16:f4:68:9e:fe:77:d3:0e:49:34:12:f3:08:fc:5a]
            modulus: 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
    public exponent: 10001

] 
2022-05-13 07:20:39.259  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-13 07:20:39.260 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-13 07:20:39.262 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-05-13 07:20:39.263 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-13 07:20:39.264  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-05-13 07:20:39.265  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-13 07:20:39.265  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-13 07:20:39.266 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-13 07:20:39.266 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-13 07:20:39.267 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-13 07:20:39.273 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-13 07:20:39.274 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-13 07:20:39.275 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-13 07:20:39.275 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-13 07:20:39.483  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-13 07:20:39.485  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-13 07:20:39.485 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-13 07:20:39.486 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-13 07:20:39.489  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-13 07:20:39.490  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-13 07:20:39.491 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-13 07:20:39.491 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-13 07:20:39.492 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-13 07:20:39.493 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-13 07:20:39.494 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-13 07:20:39.494 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-13 07:20:39.496 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-13 07:20:39.496 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-13 07:20:39.497 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-13 07:20:39.498 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-13 07:20:39.506 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 417344679915057248282312612130673491109629306887
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri May 13 06:33:23 UTC 2022
           Final Date: Wed May 12 06:33:22 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [a5:29:24:40:42:9c:ca:c8:d9:6c:52:19:20:be:70:3e:d8:47:c9:50]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 0ecaa37d799b8bbdfae6f92c8e4cd6654e9d9816
                       80cbd5498e0687ae10496fce0a41b4e4b7ca9739
                       aa4b22bd0aead9c9e819e182671babe7eec709d1
                       22b4445956f1b573381ea667f4045f784a2552ba
                       1f9f89284d618f78bb5184a386cfbc49dc4ff8de
                       e4d93cfd8d8994938e0ab1ad82f8ef2ca0dcda8b
                       1de5510494a9c583ce162353850a514636fe41ff
                       8554527cc4cd485fcebd8dba1d2c024190d88827
                       0965760deb1cf4a28a7c7a271d648d26050c26ff
                       71a1b65e19bde4f325d38dddfeee6214e13b9c51
                       aa160216efc561a94a8f36fefb2885d675969340
                       143517eef8d14534253ada51eeb8cd14f2a2aa81
                       f43fe53ac39faec2a444bca883321019f0308b24
                       a5db38a5e692b9702beed4384d7a383fd9161c1f
                       09a9c655326b2ad2fa83f9530548180ee5e4e8e0
                       3c58a6a8863aecdd5c711d56b6fc4319342d871b
                       8896cc37e6d0ec7e413c9de354befe53351ab5a8
                       3c0b2716975079d01bc48f2a1e99b7fb68ea6d4b
                       2cb8faac463469909b2332825bf4d81fb11d1b33
                       e552a904
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [b5:e0:f8:dd:e3:ee:af:89:86:31:a7:21:ff:d8:81:95:fd:0d:1a:01]
            modulus: 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
    public exponent: 10001

] 
2022-05-13 07:22:50.203  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-13 07:22:50.205 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-13 07:22:50.207 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-05-13 07:22:50.208 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-13 07:22:50.208  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-05-13 07:22:50.209  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-13 07:22:50.210  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-13 07:22:50.210 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-13 07:22:50.211 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-13 07:22:50.211 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-13 07:22:50.225 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-13 07:22:50.227 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-13 07:22:50.227 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-13 07:22:50.228 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-13 07:22:50.464  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-13 07:22:50.465  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-13 07:22:50.465 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-13 07:22:50.466 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-13 07:22:50.468  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-13 07:22:50.468  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-13 07:22:50.469 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-13 07:22:50.469 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-13 07:22:50.469 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-13 07:22:50.470 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-13 07:22:50.470 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-13 07:22:50.471 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-13 07:22:50.472 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-13 07:22:50.472 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-13 07:22:50.472 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-13 07:22:50.474 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-13 07:22:50.478 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 417344679915057248282312612130673491109629306887
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri May 13 06:33:23 UTC 2022
           Final Date: Wed May 12 06:33:22 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [a5:29:24:40:42:9c:ca:c8:d9:6c:52:19:20:be:70:3e:d8:47:c9:50]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 0ecaa37d799b8bbdfae6f92c8e4cd6654e9d9816
                       80cbd5498e0687ae10496fce0a41b4e4b7ca9739
                       aa4b22bd0aead9c9e819e182671babe7eec709d1
                       22b4445956f1b573381ea667f4045f784a2552ba
                       1f9f89284d618f78bb5184a386cfbc49dc4ff8de
                       e4d93cfd8d8994938e0ab1ad82f8ef2ca0dcda8b
                       1de5510494a9c583ce162353850a514636fe41ff
                       8554527cc4cd485fcebd8dba1d2c024190d88827
                       0965760deb1cf4a28a7c7a271d648d26050c26ff
                       71a1b65e19bde4f325d38dddfeee6214e13b9c51
                       aa160216efc561a94a8f36fefb2885d675969340
                       143517eef8d14534253ada51eeb8cd14f2a2aa81
                       f43fe53ac39faec2a444bca883321019f0308b24
                       a5db38a5e692b9702beed4384d7a383fd9161c1f
                       09a9c655326b2ad2fa83f9530548180ee5e4e8e0
                       3c58a6a8863aecdd5c711d56b6fc4319342d871b
                       8896cc37e6d0ec7e413c9de354befe53351ab5a8
                       3c0b2716975079d01bc48f2a1e99b7fb68ea6d4b
                       2cb8faac463469909b2332825bf4d81fb11d1b33
                       e552a904
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [2e:6d:17:7c:e8:c5:f8:17:83:24:8e:77:86:57:ef:7a:b6:30:e4:e9]
            modulus: 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
    public exponent: 10001

] 
2022-05-13 07:22:51.312  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-13 07:22:51.313 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-13 07:22:51.314 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-13 07:22:51.315 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-13 07:22:51.315  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-13 07:22:51.316  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-13 07:22:51.316  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-13 07:22:51.317 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-13 07:22:51.317 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-13 07:22:51.317 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-13 07:22:51.325 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-13 07:22:51.326 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-13 07:22:51.327 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-13 07:22:51.327 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-13 07:22:51.422  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-13 07:22:51.423  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-13 07:22:51.423 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-13 07:22:51.423 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-13 07:22:51.428  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-13 07:22:51.429  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-13 07:22:51.429 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-13 07:22:51.430 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-13 07:22:51.430 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-13 07:22:51.431 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-13 07:22:51.431 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-13 07:22:51.432 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-13 07:22:51.432 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-13 07:22:51.433 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-13 07:22:51.433 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-13 07:22:51.434 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-13 07:22:51.440 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 417344679915057248282312612130673491109629306887
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri May 13 06:33:23 UTC 2022
           Final Date: Wed May 12 06:33:22 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [a5:29:24:40:42:9c:ca:c8:d9:6c:52:19:20:be:70:3e:d8:47:c9:50]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 0ecaa37d799b8bbdfae6f92c8e4cd6654e9d9816
                       80cbd5498e0687ae10496fce0a41b4e4b7ca9739
                       aa4b22bd0aead9c9e819e182671babe7eec709d1
                       22b4445956f1b573381ea667f4045f784a2552ba
                       1f9f89284d618f78bb5184a386cfbc49dc4ff8de
                       e4d93cfd8d8994938e0ab1ad82f8ef2ca0dcda8b
                       1de5510494a9c583ce162353850a514636fe41ff
                       8554527cc4cd485fcebd8dba1d2c024190d88827
                       0965760deb1cf4a28a7c7a271d648d26050c26ff
                       71a1b65e19bde4f325d38dddfeee6214e13b9c51
                       aa160216efc561a94a8f36fefb2885d675969340
                       143517eef8d14534253ada51eeb8cd14f2a2aa81
                       f43fe53ac39faec2a444bca883321019f0308b24
                       a5db38a5e692b9702beed4384d7a383fd9161c1f
                       09a9c655326b2ad2fa83f9530548180ee5e4e8e0
                       3c58a6a8863aecdd5c711d56b6fc4319342d871b
                       8896cc37e6d0ec7e413c9de354befe53351ab5a8
                       3c0b2716975079d01bc48f2a1e99b7fb68ea6d4b
                       2cb8faac463469909b2332825bf4d81fb11d1b33
                       e552a904
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [09:2b:77:ae:71:a7:7d:66:e1:bc:77:f7:0c:aa:ae:d8:37:fc:6b:b5]
            modulus: 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
    public exponent: 10001

] 
2022-05-13 07:23:06.727  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-13 07:23:06.729 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-13 07:23:06.730 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-05-13 07:23:06.731 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-13 07:23:06.731  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-05-13 07:23:06.732  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-13 07:23:06.732  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-13 07:23:06.733 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-13 07:23:06.733 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-13 07:23:06.733 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-13 07:23:06.738 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-13 07:23:06.739 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-13 07:23:06.739 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-13 07:23:06.739 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-13 07:23:06.865  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-13 07:23:06.865  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-13 07:23:06.866 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-13 07:23:06.866 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-13 07:23:06.867  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-13 07:23:06.868  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-13 07:23:06.868 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-13 07:23:06.868 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-13 07:23:06.868 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-13 07:23:06.869 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-13 07:23:06.869 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-13 07:23:06.870 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-13 07:23:06.870 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-13 07:23:06.871 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-13 07:23:06.871 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-13 07:23:06.872 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-13 07:23:06.875 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 417344679915057248282312612130673491109629306887
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri May 13 06:33:23 UTC 2022
           Final Date: Wed May 12 06:33:22 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [a5:29:24:40:42:9c:ca:c8:d9:6c:52:19:20:be:70:3e:d8:47:c9:50]
            modulus: 8777c6ce8753a65bd5c8aaf3d1d275f9f08ba13bada04c57909a35e2097613ad4c3eeca7e926e1008d79b6babf13485fb05e1959a12fdfaf89840a9f7cdbdf6833ebadb995d63bdfd10cb26d19d7f0bff4222d57a452278a33ecec61fb06079b7491abdbc2def1a421e81dd844cf0b2a11c957f01a606f79f8e0e5c831cdaa27cadd1fc9a327e16ab20fc068900da020338d07d749ff450a9f4109717ce50b7cbf5b46cc815ccc7f2a63a1a103e08d2888536020878108c1370950d5b5f89e66a1d8236e9bafb9824cf504f8bd7d346b328ce583013331f9b9bcb99e8cfca1f4e3813f15af20e3258862991e20104ad4fe4241edcd1931330d72171b2076bb7f8f89a205f6408d11a06268fc12b8aa87e1b327b09a216509bec92b6a7b0cf52743de1659faa1f6fc4b9b73160f34333c8b14968b635335aa0ccc75d803392ec37c517690522b422c598c1e2357f84b2112e296487b40dbe96a01c6901de80cec31004ce8e3a1525ccf0a1982ef18bb862f940475bc46fbce451713325cd6c3a7
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 0ecaa37d799b8bbdfae6f92c8e4cd6654e9d9816
                       80cbd5498e0687ae10496fce0a41b4e4b7ca9739
                       aa4b22bd0aead9c9e819e182671babe7eec709d1
                       22b4445956f1b573381ea667f4045f784a2552ba
                       1f9f89284d618f78bb5184a386cfbc49dc4ff8de
                       e4d93cfd8d8994938e0ab1ad82f8ef2ca0dcda8b
                       1de5510494a9c583ce162353850a514636fe41ff
                       8554527cc4cd485fcebd8dba1d2c024190d88827
                       0965760deb1cf4a28a7c7a271d648d26050c26ff
                       71a1b65e19bde4f325d38dddfeee6214e13b9c51
                       aa160216efc561a94a8f36fefb2885d675969340
                       143517eef8d14534253ada51eeb8cd14f2a2aa81
                       f43fe53ac39faec2a444bca883321019f0308b24
                       a5db38a5e692b9702beed4384d7a383fd9161c1f
                       09a9c655326b2ad2fa83f9530548180ee5e4e8e0
                       3c58a6a8863aecdd5c711d56b6fc4319342d871b
                       8896cc37e6d0ec7e413c9de354befe53351ab5a8
                       3c0b2716975079d01bc48f2a1e99b7fb68ea6d4b
                       2cb8faac463469909b2332825bf4d81fb11d1b33
                       e552a904
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [33:d5:3d:38:f1:12:83:a4:f0:32:e6:56:98:4c:bd:27:9d:de:60:d4]
            modulus: b9287b546b0411941de66d89b7550cc9f344c7d9299d52c8237e7564c4a4922f7602dd0d786f99f8966791c2e045fab64b0c1d3a0f8fe10fc31942dcb43ec36f55944c87ba21f3a66c6161fb0e6ac7758bc505b16269bbe894b726e2496e3a3b2f5442801912abd1fc2729f7b47b2ca0c59b87b50d4482dfee4c2eeda32a0f68462f29198f06470414858cc4b56b9dfd9bfec67c10954962c124e248ae101c8c7edf10451f834ec6e4d51d9a5bf6b5d519c44729d9058beb461261a10c4a4022768128adc696314f7b1a0b469c07ac69b3a8baec40d7663afbad631294c3e88f8e11524980d47593418548990ddf6a40a9a21ebf45c3eb27ece27eb7994ae27f
    public exponent: 10001

]