Results

By type

          2022-05-22 05:02:22,737 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-05-22 05:02:24,050 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-05-22 05:02:24.843  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
May 22, 2022 5:02:26 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
May 22, 2022 5:02:26 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
May 22, 2022 5:02:26 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
May 22, 2022 5:02:26 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-05-22 05:02:27.580 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-05-22 05:02:27.933  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-05-22 05:02:28.110  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-05-22 05:02:28.931 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-05-22 05:02:28.936 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
2022-05-22 05:02:28.937 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-05-22 05:02:28.941 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-05-22 05:02:28.984 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2022-05-22 05:02:28.988 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/docs]}: redirectToUi(HttpServletRequest)
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
2022-05-22 05:02:29.123 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-05-22 05:02:29.828 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
May 22, 2022 5:02:30 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-05-22 05:02:30.784  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 9.018 seconds (JVM running for 10.92)
May 22, 2022 5:02:55 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-05-22 05:03:50.074  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-22 05:03:50.082 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-22 05:03:50.119 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-05-22 05:03:50.124 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-22 05:03:50.145  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-05-22 05:03:50.147  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-22 05:03:50.148  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-22 05:03:50.150 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-22 05:03:50.150 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-22 05:03:50.154 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-22 05:03:50.159 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-22 05:03:50.164 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-22 05:03:50.199 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-22 05:03:50.203 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-22 05:03:50.203 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-22 05:03:50.208 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-22 05:03:50.750  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-22 05:03:50.752  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-22 05:03:50.753 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-22 05:03:50.755 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-22 05:03:50.765  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-22 05:03:50.766  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-22 05:03:50.767 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-22 05:03:50.767 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-22 05:03:50.768 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-22 05:03:50.778 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-22 05:03:50.779 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-22 05:03:50.779 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-22 05:03:50.785 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-22 05:03:50.786 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-22 05:03:50.786 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-22 05:03:50.789 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-22 05:03:50.821 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 675277618602040153324638092505659893321688395204
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun May 22 05:00:08 UTC 2022
           Final Date: Fri May 21 05:00:07 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [3c:84:87:66:eb:94:53:b3:83:41:5f:ac:3f:51:e7:0c:02:bf:d3:e0]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 93a36e61c3c488fbdc8bb385b06767a9060eafc0
                       19ae3b4460a432059e3e1906ccdf3a8d8c76b3cf
                       a5f994d18a2f586670fc49f39afc9f90465901ad
                       be8cd1b73004f20bf83bfe65c890e9d906583c43
                       5f6f18b686a2774bb4c3a4aef2dc23c362969ca0
                       ad7ecf35dc5d30b0f2df69336ea1dd71cac0afb0
                       e8c3e541083e64678f8c7cd8184b7f8428a8ed3e
                       d68d03bbafe9dbafb88c8ab04fdddeb57d6ac736
                       be528604d4d08b2cd2941ffa792128162b00fe25
                       fcb29a102c80c92bda2afb715de5055c165f5ef8
                       b5c03dd3b08076a344adea35e0aabc0209f619ef
                       c23811a0c5a17bcd646f369c33d61566443987cf
                       5a12f6aaf5f00a9b53d032f2816caa8c235ec857
                       a9bd5139faee1c8735713106985276095e731d28
                       8f6885adb0a999a9387116b3c7859223cd3911ef
                       ada89f8b93efa8023e41667c4e86a3ecf74872fc
                       6888dc13e29323a2c0e40340918c21c34690edf5
                       9a77f0e4e41a33867d71b2071b0fdc84ea91adee
                       78eb95f1be200d439cb90bfaca0a320f9debe174
                       c90850e5
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [18:fd:9c:b0:87:cd:74:5d:e8:f4:01:6b:50:ea:38:95:2c:bf:0b:ab]
            modulus: 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
    public exponent: 10001

] 
2022-05-22 06:11:02.103  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-22 06:11:02.106 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-22 06:11:02.110 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-05-22 06:11:02.111 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-22 06:11:02.112  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-05-22 06:11:02.113  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-22 06:11:02.114  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-22 06:11:02.115 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-22 06:11:02.115 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-22 06:11:02.116 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-22 06:11:02.123 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-22 06:11:02.124 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-22 06:11:02.125 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-22 06:11:02.125 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-22 06:11:02.353  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-22 06:11:02.354  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-22 06:11:02.355 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-22 06:11:02.355 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-22 06:11:02.359  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-22 06:11:02.360  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-22 06:11:02.360 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-22 06:11:02.361 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-22 06:11:02.361 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-22 06:11:02.363 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-22 06:11:02.363 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-22 06:11:02.363 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-22 06:11:02.365 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-22 06:11:02.365 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-22 06:11:02.366 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-22 06:11:02.367 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-22 06:11:02.372 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 675277618602040153324638092505659893321688395204
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun May 22 05:00:08 UTC 2022
           Final Date: Fri May 21 05:00:07 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [3c:84:87:66:eb:94:53:b3:83:41:5f:ac:3f:51:e7:0c:02:bf:d3:e0]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 93a36e61c3c488fbdc8bb385b06767a9060eafc0
                       19ae3b4460a432059e3e1906ccdf3a8d8c76b3cf
                       a5f994d18a2f586670fc49f39afc9f90465901ad
                       be8cd1b73004f20bf83bfe65c890e9d906583c43
                       5f6f18b686a2774bb4c3a4aef2dc23c362969ca0
                       ad7ecf35dc5d30b0f2df69336ea1dd71cac0afb0
                       e8c3e541083e64678f8c7cd8184b7f8428a8ed3e
                       d68d03bbafe9dbafb88c8ab04fdddeb57d6ac736
                       be528604d4d08b2cd2941ffa792128162b00fe25
                       fcb29a102c80c92bda2afb715de5055c165f5ef8
                       b5c03dd3b08076a344adea35e0aabc0209f619ef
                       c23811a0c5a17bcd646f369c33d61566443987cf
                       5a12f6aaf5f00a9b53d032f2816caa8c235ec857
                       a9bd5139faee1c8735713106985276095e731d28
                       8f6885adb0a999a9387116b3c7859223cd3911ef
                       ada89f8b93efa8023e41667c4e86a3ecf74872fc
                       6888dc13e29323a2c0e40340918c21c34690edf5
                       9a77f0e4e41a33867d71b2071b0fdc84ea91adee
                       78eb95f1be200d439cb90bfaca0a320f9debe174
                       c90850e5
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [f6:04:2f:36:86:2b:64:b6:07:60:d8:b3:e8:52:4e:af:61:cb:62:0c]
            modulus: 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
    public exponent: 10001

] 
2022-05-22 06:11:50.812  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-22 06:11:50.816 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-22 06:11:50.817 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-22 06:11:50.818 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-22 06:11:50.819  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-22 06:11:50.819  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-22 06:11:50.820  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-22 06:11:50.820 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-22 06:11:50.821 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-22 06:11:50.824 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-22 06:11:50.831 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-22 06:11:50.832 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-22 06:11:50.832 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-22 06:11:50.833 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-22 06:11:51.011  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-22 06:11:51.012  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-22 06:11:51.012 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-22 06:11:51.012 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-22 06:11:51.019  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-22 06:11:51.019  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-22 06:11:51.020 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-22 06:11:51.020 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-22 06:11:51.020 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-22 06:11:51.028 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-22 06:11:51.028 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-22 06:11:51.028 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-22 06:11:51.030 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-22 06:11:51.031 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-22 06:11:51.031 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-22 06:11:51.032 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-22 06:11:51.037 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 675277618602040153324638092505659893321688395204
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun May 22 05:00:08 UTC 2022
           Final Date: Fri May 21 05:00:07 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [3c:84:87:66:eb:94:53:b3:83:41:5f:ac:3f:51:e7:0c:02:bf:d3:e0]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 93a36e61c3c488fbdc8bb385b06767a9060eafc0
                       19ae3b4460a432059e3e1906ccdf3a8d8c76b3cf
                       a5f994d18a2f586670fc49f39afc9f90465901ad
                       be8cd1b73004f20bf83bfe65c890e9d906583c43
                       5f6f18b686a2774bb4c3a4aef2dc23c362969ca0
                       ad7ecf35dc5d30b0f2df69336ea1dd71cac0afb0
                       e8c3e541083e64678f8c7cd8184b7f8428a8ed3e
                       d68d03bbafe9dbafb88c8ab04fdddeb57d6ac736
                       be528604d4d08b2cd2941ffa792128162b00fe25
                       fcb29a102c80c92bda2afb715de5055c165f5ef8
                       b5c03dd3b08076a344adea35e0aabc0209f619ef
                       c23811a0c5a17bcd646f369c33d61566443987cf
                       5a12f6aaf5f00a9b53d032f2816caa8c235ec857
                       a9bd5139faee1c8735713106985276095e731d28
                       8f6885adb0a999a9387116b3c7859223cd3911ef
                       ada89f8b93efa8023e41667c4e86a3ecf74872fc
                       6888dc13e29323a2c0e40340918c21c34690edf5
                       9a77f0e4e41a33867d71b2071b0fdc84ea91adee
                       78eb95f1be200d439cb90bfaca0a320f9debe174
                       c90850e5
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [15:d2:43:c0:c7:ef:e9:a0:93:46:10:cb:01:a7:6c:ab:38:a6:85:da]
            modulus: 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
    public exponent: 10001

] 
2022-05-22 06:13:38.843  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-22 06:13:38.846 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-22 06:13:38.849 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-05-22 06:13:38.850 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-22 06:13:38.851  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-05-22 06:13:38.852  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-22 06:13:38.852  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-22 06:13:38.853 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-22 06:13:38.853 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-22 06:13:38.854 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-22 06:13:38.865 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-22 06:13:38.866 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-22 06:13:38.867 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-22 06:13:38.867 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-22 06:13:38.992  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-22 06:13:38.993  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-22 06:13:38.994 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-22 06:13:38.994 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-22 06:13:38.998  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-22 06:13:38.998  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-22 06:13:39.000 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-22 06:13:39.000 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-22 06:13:39.001 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-22 06:13:39.003 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-22 06:13:39.003 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-22 06:13:39.004 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-22 06:13:39.005 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-22 06:13:39.005 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-22 06:13:39.005 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-22 06:13:39.007 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-22 06:13:39.012 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 675277618602040153324638092505659893321688395204
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun May 22 05:00:08 UTC 2022
           Final Date: Fri May 21 05:00:07 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [3c:84:87:66:eb:94:53:b3:83:41:5f:ac:3f:51:e7:0c:02:bf:d3:e0]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 93a36e61c3c488fbdc8bb385b06767a9060eafc0
                       19ae3b4460a432059e3e1906ccdf3a8d8c76b3cf
                       a5f994d18a2f586670fc49f39afc9f90465901ad
                       be8cd1b73004f20bf83bfe65c890e9d906583c43
                       5f6f18b686a2774bb4c3a4aef2dc23c362969ca0
                       ad7ecf35dc5d30b0f2df69336ea1dd71cac0afb0
                       e8c3e541083e64678f8c7cd8184b7f8428a8ed3e
                       d68d03bbafe9dbafb88c8ab04fdddeb57d6ac736
                       be528604d4d08b2cd2941ffa792128162b00fe25
                       fcb29a102c80c92bda2afb715de5055c165f5ef8
                       b5c03dd3b08076a344adea35e0aabc0209f619ef
                       c23811a0c5a17bcd646f369c33d61566443987cf
                       5a12f6aaf5f00a9b53d032f2816caa8c235ec857
                       a9bd5139faee1c8735713106985276095e731d28
                       8f6885adb0a999a9387116b3c7859223cd3911ef
                       ada89f8b93efa8023e41667c4e86a3ecf74872fc
                       6888dc13e29323a2c0e40340918c21c34690edf5
                       9a77f0e4e41a33867d71b2071b0fdc84ea91adee
                       78eb95f1be200d439cb90bfaca0a320f9debe174
                       c90850e5
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [9d:bb:11:97:eb:e6:c5:ba:a9:73:38:3e:fd:fc:7c:4b:19:26:14:68]
            modulus: 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
    public exponent: 10001

] 
2022-05-22 06:14:42.435  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-22 06:14:42.436 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-22 06:14:42.438 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-05-22 06:14:42.439 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-22 06:14:42.440  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-05-22 06:14:42.442  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-22 06:14:42.443  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-22 06:14:42.444 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-22 06:14:42.444 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-22 06:14:42.445 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-22 06:14:42.450 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-22 06:14:42.451 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-22 06:14:42.451 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-22 06:14:42.451 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-22 06:14:42.590  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-22 06:14:42.591  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-22 06:14:42.591 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-22 06:14:42.592 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-22 06:14:42.595  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-22 06:14:42.595  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-22 06:14:42.596 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-22 06:14:42.597 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-22 06:14:42.597 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-22 06:14:42.598 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-22 06:14:42.598 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-22 06:14:42.598 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-22 06:14:42.599 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-22 06:14:42.599 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-22 06:14:42.600 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-22 06:14:42.601 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-22 06:14:42.606 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 675277618602040153324638092505659893321688395204
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun May 22 05:00:08 UTC 2022
           Final Date: Fri May 21 05:00:07 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [3c:84:87:66:eb:94:53:b3:83:41:5f:ac:3f:51:e7:0c:02:bf:d3:e0]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 93a36e61c3c488fbdc8bb385b06767a9060eafc0
                       19ae3b4460a432059e3e1906ccdf3a8d8c76b3cf
                       a5f994d18a2f586670fc49f39afc9f90465901ad
                       be8cd1b73004f20bf83bfe65c890e9d906583c43
                       5f6f18b686a2774bb4c3a4aef2dc23c362969ca0
                       ad7ecf35dc5d30b0f2df69336ea1dd71cac0afb0
                       e8c3e541083e64678f8c7cd8184b7f8428a8ed3e
                       d68d03bbafe9dbafb88c8ab04fdddeb57d6ac736
                       be528604d4d08b2cd2941ffa792128162b00fe25
                       fcb29a102c80c92bda2afb715de5055c165f5ef8
                       b5c03dd3b08076a344adea35e0aabc0209f619ef
                       c23811a0c5a17bcd646f369c33d61566443987cf
                       5a12f6aaf5f00a9b53d032f2816caa8c235ec857
                       a9bd5139faee1c8735713106985276095e731d28
                       8f6885adb0a999a9387116b3c7859223cd3911ef
                       ada89f8b93efa8023e41667c4e86a3ecf74872fc
                       6888dc13e29323a2c0e40340918c21c34690edf5
                       9a77f0e4e41a33867d71b2071b0fdc84ea91adee
                       78eb95f1be200d439cb90bfaca0a320f9debe174
                       c90850e5
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [cb:65:ae:75:c6:62:3e:ce:6b:f1:89:9b:95:8d:40:45:30:fe:f4:34]
            modulus: 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
    public exponent: 10001

] 
2022-05-22 06:15:20.480  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-22 06:15:20.482 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-22 06:15:20.483 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-05-22 06:15:20.483 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-22 06:15:20.484  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-05-22 06:15:20.484  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-22 06:15:20.485  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-22 06:15:20.485 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-22 06:15:20.485 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-22 06:15:20.486 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-22 06:15:20.491 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-22 06:15:20.491 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-22 06:15:20.492 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-22 06:15:20.492 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-22 06:15:20.615  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-22 06:15:20.615  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-22 06:15:20.616 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-22 06:15:20.616 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-22 06:15:20.617  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-22 06:15:20.618  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-22 06:15:20.618 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-22 06:15:20.619 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-22 06:15:20.619 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-22 06:15:20.620 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-22 06:15:20.620 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-22 06:15:20.620 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-22 06:15:20.621 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-22 06:15:20.621 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-22 06:15:20.623 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-22 06:15:20.624 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-22 06:15:20.629 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 675277618602040153324638092505659893321688395204
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun May 22 05:00:08 UTC 2022
           Final Date: Fri May 21 05:00:07 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [3c:84:87:66:eb:94:53:b3:83:41:5f:ac:3f:51:e7:0c:02:bf:d3:e0]
            modulus: ac5db47587f85a0b8a53f09530ec196960fcfe8d7e3d5340e02d404057214a1b4dc1a4d8d0384356819c305f0ce68b5054f63823a645ff03aec6a88de30592fc43aebc8991e8cddfd58f6cfbddf2e4479c7639a2f8c6569013d86780725208780c6e21206d3205c0943fe975d1f6ff01bf42aad732cfdac4620a0d009e6d465b5fd313b5199c7f2564e25cd85dd92409ff00b7ea42a920f6d6b5438dff39197df68eb2caa3238b6cfd5e71e45aadec6fda5c9cbe59393149a6492c38199c184ecce1c5923a48c364727a8d5735e5e8b6261a28e87d99dbca770563653418535e34cc180fc20c486ded083254f1eeacd5fbc105dfb4870d44bf3615252dc6bfbabdaa07797510866e01b67465c6de1dca4832bcecc813044e96dbfbcdd4785576a972dd943710fe9e4078610ebda9793cf82e7e3638224e67e955591400f4a497050f5d705d408efa44cd6219265daddc61c0a23a4b2392732744a4c021dc4baaaf3382696bd2170d23278d7068003c58077927e18a025b939d94e91a06767031
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 93a36e61c3c488fbdc8bb385b06767a9060eafc0
                       19ae3b4460a432059e3e1906ccdf3a8d8c76b3cf
                       a5f994d18a2f586670fc49f39afc9f90465901ad
                       be8cd1b73004f20bf83bfe65c890e9d906583c43
                       5f6f18b686a2774bb4c3a4aef2dc23c362969ca0
                       ad7ecf35dc5d30b0f2df69336ea1dd71cac0afb0
                       e8c3e541083e64678f8c7cd8184b7f8428a8ed3e
                       d68d03bbafe9dbafb88c8ab04fdddeb57d6ac736
                       be528604d4d08b2cd2941ffa792128162b00fe25
                       fcb29a102c80c92bda2afb715de5055c165f5ef8
                       b5c03dd3b08076a344adea35e0aabc0209f619ef
                       c23811a0c5a17bcd646f369c33d61566443987cf
                       5a12f6aaf5f00a9b53d032f2816caa8c235ec857
                       a9bd5139faee1c8735713106985276095e731d28
                       8f6885adb0a999a9387116b3c7859223cd3911ef
                       ada89f8b93efa8023e41667c4e86a3ecf74872fc
                       6888dc13e29323a2c0e40340918c21c34690edf5
                       9a77f0e4e41a33867d71b2071b0fdc84ea91adee
                       78eb95f1be200d439cb90bfaca0a320f9debe174
                       c90850e5
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [47:c6:bf:d2:dc:ad:91:3c:e3:ce:8a:7a:fe:1d:0f:57:5a:b5:02:10]
            modulus: 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
    public exponent: 10001

] 
2022-05-22 06:15:35.247  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-22 06:15:35.248 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-22 06:15:35.250 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-05-22 06:15:35.251 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-22 06:15:35.251  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-05-22 06:15:35.252  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-22 06:15:35.253  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-22 06:15:35.253 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-22 06:15:35.254 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-22 06:15:35.255 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-22 06:15:35.262 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-22 06:15:35.263 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-22 06:15:35.263 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-22 06:15:35.263 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-22 06:15:35.395  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-22 06:15:35.396  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-22 06:15:35.397 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-22 06:15:35.397 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-22 06:15:35.398  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-22 06:15:35.399  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-22 06:15:35.400 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-22 06:15:35.400 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-22 06:15:35.400 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-22 06:15:35.401 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-22 06:15:35.402 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-22 06:15:35.402 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-22 06:15:35.403 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-22 06:15:35.404 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-22 06:15:35.404 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-22 06:15:35.405 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-22 06:15:35.409 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 675277618602040153324638092505659893321688395204
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun May 22 05:00:08 UTC 2022
           Final Date: Fri May 21 05:00:07 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [3c:84:87:66:eb:94:53:b3:83:41:5f:ac:3f:51:e7:0c:02:bf:d3:e0]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 93a36e61c3c488fbdc8bb385b06767a9060eafc0
                       19ae3b4460a432059e3e1906ccdf3a8d8c76b3cf
                       a5f994d18a2f586670fc49f39afc9f90465901ad
                       be8cd1b73004f20bf83bfe65c890e9d906583c43
                       5f6f18b686a2774bb4c3a4aef2dc23c362969ca0
                       ad7ecf35dc5d30b0f2df69336ea1dd71cac0afb0
                       e8c3e541083e64678f8c7cd8184b7f8428a8ed3e
                       d68d03bbafe9dbafb88c8ab04fdddeb57d6ac736
                       be528604d4d08b2cd2941ffa792128162b00fe25
                       fcb29a102c80c92bda2afb715de5055c165f5ef8
                       b5c03dd3b08076a344adea35e0aabc0209f619ef
                       c23811a0c5a17bcd646f369c33d61566443987cf
                       5a12f6aaf5f00a9b53d032f2816caa8c235ec857
                       a9bd5139faee1c8735713106985276095e731d28
                       8f6885adb0a999a9387116b3c7859223cd3911ef
                       ada89f8b93efa8023e41667c4e86a3ecf74872fc
                       6888dc13e29323a2c0e40340918c21c34690edf5
                       9a77f0e4e41a33867d71b2071b0fdc84ea91adee
                       78eb95f1be200d439cb90bfaca0a320f9debe174
                       c90850e5
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [00:d6:35:23:1b:3b:01:3e:80:c4:a1:5c:88:98:d7:f1:e6:a7:d1:64]
            modulus: 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
    public exponent: 10001

] 
2022-05-22 06:16:37.118  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-22 06:16:37.119 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-22 06:16:37.120 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-22 06:16:37.123 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-22 06:16:37.124  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-22 06:16:37.124  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-22 06:16:37.125  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-22 06:16:37.125 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-22 06:16:37.126 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-22 06:16:37.127 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-22 06:16:37.135 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-22 06:16:37.136 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-22 06:16:37.136 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-22 06:16:37.137 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-22 06:16:37.331  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-22 06:16:37.332  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-22 06:16:37.332 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-22 06:16:37.332 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-22 06:16:37.334  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-22 06:16:37.334  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-22 06:16:37.334 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-22 06:16:37.335 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-22 06:16:37.335 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-22 06:16:37.336 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-22 06:16:37.336 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-22 06:16:37.336 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-22 06:16:37.337 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-22 06:16:37.337 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-22 06:16:37.338 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-22 06:16:37.339 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-22 06:16:37.342 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 675277618602040153324638092505659893321688395204
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun May 22 05:00:08 UTC 2022
           Final Date: Fri May 21 05:00:07 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [3c:84:87:66:eb:94:53:b3:83:41:5f:ac:3f:51:e7:0c:02:bf:d3:e0]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 93a36e61c3c488fbdc8bb385b06767a9060eafc0
                       19ae3b4460a432059e3e1906ccdf3a8d8c76b3cf
                       a5f994d18a2f586670fc49f39afc9f90465901ad
                       be8cd1b73004f20bf83bfe65c890e9d906583c43
                       5f6f18b686a2774bb4c3a4aef2dc23c362969ca0
                       ad7ecf35dc5d30b0f2df69336ea1dd71cac0afb0
                       e8c3e541083e64678f8c7cd8184b7f8428a8ed3e
                       d68d03bbafe9dbafb88c8ab04fdddeb57d6ac736
                       be528604d4d08b2cd2941ffa792128162b00fe25
                       fcb29a102c80c92bda2afb715de5055c165f5ef8
                       b5c03dd3b08076a344adea35e0aabc0209f619ef
                       c23811a0c5a17bcd646f369c33d61566443987cf
                       5a12f6aaf5f00a9b53d032f2816caa8c235ec857
                       a9bd5139faee1c8735713106985276095e731d28
                       8f6885adb0a999a9387116b3c7859223cd3911ef
                       ada89f8b93efa8023e41667c4e86a3ecf74872fc
                       6888dc13e29323a2c0e40340918c21c34690edf5
                       9a77f0e4e41a33867d71b2071b0fdc84ea91adee
                       78eb95f1be200d439cb90bfaca0a320f9debe174
                       c90850e5
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [fd:af:8f:61:c3:8f:40:71:cd:d8:1c:08:57:98:af:8c:af:77:5a:f4]
            modulus: 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
    public exponent: 10001

]