Results

By type

          2022-06-24 05:15:34,786 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-06-24 05:15:35,713 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-06-24 05:15:36.440  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Jun 24, 2022 5:15:38 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Jun 24, 2022 5:15:38 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Jun 24, 2022 5:15:38 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Jun 24, 2022 5:15:38 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-06-24 05:15:38.946 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-06-24 05:15:39.233  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-06-24 05:15:39.395  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-06-24 05:15:40.141 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-06-24 05:15:40.144 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
2022-06-24 05:15:40.146 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-06-24 05:15:40.150 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-06-24 05:15:40.189 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2022-06-24 05:15:40.192 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
	{GET [/docs]}: redirectToUi(HttpServletRequest)
2022-06-24 05:15:40.315 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-06-24 05:15:40.845 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Jun 24, 2022 5:15:41 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-06-24 05:15:41.804  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 7.827 seconds (JVM running for 9.584)
Jun 24, 2022 5:16:10 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-06-24 05:16:27.145  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-24 05:16:27.154 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-24 05:16:27.189 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-06-24 05:16:27.193 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-24 05:16:27.212  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-06-24 05:16:27.214  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-24 05:16:27.215  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-24 05:16:27.216 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-24 05:16:27.217 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-24 05:16:27.221 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-24 05:16:27.227 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-24 05:16:27.230 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-24 05:16:27.272 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-24 05:16:27.277 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-24 05:16:27.277 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-24 05:16:27.281 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-24 05:16:28.063  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-24 05:16:28.066  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-24 05:16:28.066 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-24 05:16:28.068 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-24 05:16:28.077  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-24 05:16:28.078  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-24 05:16:28.079 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-24 05:16:28.079 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-24 05:16:28.080 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-24 05:16:28.094 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-24 05:16:28.094 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-24 05:16:28.094 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-24 05:16:28.100 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-24 05:16:28.100 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-24 05:16:28.101 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-24 05:16:28.102 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-24 05:16:28.132 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 223904999455805704837666803545061931672344918992
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jun 24 05:12:21 UTC 2022
           Final Date: Wed Jun 23 05:12:20 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [e9:70:ac:31:45:e1:a0:3d:80:b8:48:e9:59:5f:39:76:f6:5f:20:be]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 156b4a026c97d44102df32d75b720d3c7a2fc351
                       990b537fb556c17d4f407566d1e8666d4323e994
                       05cece13792e1a3d6c3b00c32a7ad472fc7b5dfa
                       c89f54c5d37a6c5e3962e74ab94552818b7f2ce2
                       193d4a38c94b193c42ad6fc824199c8adc965a64
                       6eacc8f2fdf5b4f4fde86ac9b6331eb13d107821
                       d9df9939c5a66b0ca44d09516bbf34329a34ffab
                       79ec5921b4ed19d683d0d75f45b306e35dd10e4c
                       aafce397c58e4457b4c1bfbad9417121d915922f
                       c07e5b04cf6111adaa7bc7c7d4e29c7a0819dc10
                       63f0e796617ae49dcfbb21e33d1772b4b3a12e7e
                       b241379c05682009bed6ad07f6033a819f041e71
                       0f8d96f3344a545a59a7048751021bfd6a6be97b
                       b7dcc1921ec4370aaf7274e73d70218bcc1f845e
                       f1ae0c1098172dc21d274d588f7fd1a88a5cef4a
                       6760c2b86f154c9b2171350e836d9fb17fc8da97
                       c2b9a09765a3085648c801d8074088893cc78f20
                       ec72762a291b8644b02c59f7590e945fde176087
                       7912a2158b25758ce369a341890e085bdb28a0e6
                       60cadb66
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [51:f2:01:5b:3a:c5:82:0e:f7:d9:ea:9f:46:ec:bc:36:ec:ed:dd:f8]
            modulus: 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
    public exponent: 10001

] 
2022-06-24 07:30:47.666  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-24 07:30:47.670 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-24 07:30:47.673 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-24 07:30:47.675 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-24 07:30:47.675  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-24 07:30:47.677  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-24 07:30:47.677  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-24 07:30:47.678 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-24 07:30:47.678 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-24 07:30:47.679 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-24 07:30:47.688 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-24 07:30:47.689 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-24 07:30:47.689 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-24 07:30:47.690 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-24 07:30:48.098  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-24 07:30:48.099  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-24 07:30:48.100 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-24 07:30:48.100 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-24 07:30:48.103  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-24 07:30:48.103  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-24 07:30:48.104 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-24 07:30:48.104 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-24 07:30:48.105 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-24 07:30:48.106 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-24 07:30:48.106 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-24 07:30:48.107 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-24 07:30:48.107 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-24 07:30:48.108 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-24 07:30:48.108 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-24 07:30:48.110 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-24 07:30:48.115 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 223904999455805704837666803545061931672344918992
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jun 24 05:12:21 UTC 2022
           Final Date: Wed Jun 23 05:12:20 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [e9:70:ac:31:45:e1:a0:3d:80:b8:48:e9:59:5f:39:76:f6:5f:20:be]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 156b4a026c97d44102df32d75b720d3c7a2fc351
                       990b537fb556c17d4f407566d1e8666d4323e994
                       05cece13792e1a3d6c3b00c32a7ad472fc7b5dfa
                       c89f54c5d37a6c5e3962e74ab94552818b7f2ce2
                       193d4a38c94b193c42ad6fc824199c8adc965a64
                       6eacc8f2fdf5b4f4fde86ac9b6331eb13d107821
                       d9df9939c5a66b0ca44d09516bbf34329a34ffab
                       79ec5921b4ed19d683d0d75f45b306e35dd10e4c
                       aafce397c58e4457b4c1bfbad9417121d915922f
                       c07e5b04cf6111adaa7bc7c7d4e29c7a0819dc10
                       63f0e796617ae49dcfbb21e33d1772b4b3a12e7e
                       b241379c05682009bed6ad07f6033a819f041e71
                       0f8d96f3344a545a59a7048751021bfd6a6be97b
                       b7dcc1921ec4370aaf7274e73d70218bcc1f845e
                       f1ae0c1098172dc21d274d588f7fd1a88a5cef4a
                       6760c2b86f154c9b2171350e836d9fb17fc8da97
                       c2b9a09765a3085648c801d8074088893cc78f20
                       ec72762a291b8644b02c59f7590e945fde176087
                       7912a2158b25758ce369a341890e085bdb28a0e6
                       60cadb66
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ae:47:20:e6:c3:58:f2:86:ba:6b:77:b0:a7:ea:62:ed:d6:d7:5c:f6]
            modulus: b9e48e932ed57d6e24324b30cfca454722ecdc041d95d894137fc072f29212b34676061ca8c9ba1d87af3642bc36d7db2502953f7cb8de0a179fd84fbb3eb91fc4cec435482ab53d30c80f466a4b33c0fd566bdb93fce8b2d901bb06889f4f581142a0ffcd80f3c65e3aaf0469956ad519d159b6260428e7ab6ab1785911a3f482dab6f66d9473af365e97b2558888c0444a2288a78959a8e3e4855b54ddb0eb9a90ab8650d30bfdb785e2755387a7354e052ef28e759c70928fb34930e665378330196353b495ca794a0a50066db5d9523a24d338ee5131efbfeeb069f200b78a152da5d35b2f9ca4d9c3f47c118f26f44d14bfa61b8b8d74614681d61312fd
    public exponent: 10001

] 
2022-06-24 07:32:35.899  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-24 07:32:35.900 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-24 07:32:35.902 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-06-24 07:32:35.903 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-24 07:32:35.903  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-06-24 07:32:35.904  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-24 07:32:35.904  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-24 07:32:35.905 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-24 07:32:35.905 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-24 07:32:35.906 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-24 07:32:35.913 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-24 07:32:35.914 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-24 07:32:35.914 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-24 07:32:35.914 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-24 07:32:36.144  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-24 07:32:36.144  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-24 07:32:36.145 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-24 07:32:36.145 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-24 07:32:36.148  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-24 07:32:36.148  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-24 07:32:36.149 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-24 07:32:36.149 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-24 07:32:36.149 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-24 07:32:36.150 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-24 07:32:36.150 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-24 07:32:36.151 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-24 07:32:36.151 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-24 07:32:36.152 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-24 07:32:36.152 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-24 07:32:36.153 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-24 07:32:36.156 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 223904999455805704837666803545061931672344918992
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jun 24 05:12:21 UTC 2022
           Final Date: Wed Jun 23 05:12:20 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [e9:70:ac:31:45:e1:a0:3d:80:b8:48:e9:59:5f:39:76:f6:5f:20:be]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 156b4a026c97d44102df32d75b720d3c7a2fc351
                       990b537fb556c17d4f407566d1e8666d4323e994
                       05cece13792e1a3d6c3b00c32a7ad472fc7b5dfa
                       c89f54c5d37a6c5e3962e74ab94552818b7f2ce2
                       193d4a38c94b193c42ad6fc824199c8adc965a64
                       6eacc8f2fdf5b4f4fde86ac9b6331eb13d107821
                       d9df9939c5a66b0ca44d09516bbf34329a34ffab
                       79ec5921b4ed19d683d0d75f45b306e35dd10e4c
                       aafce397c58e4457b4c1bfbad9417121d915922f
                       c07e5b04cf6111adaa7bc7c7d4e29c7a0819dc10
                       63f0e796617ae49dcfbb21e33d1772b4b3a12e7e
                       b241379c05682009bed6ad07f6033a819f041e71
                       0f8d96f3344a545a59a7048751021bfd6a6be97b
                       b7dcc1921ec4370aaf7274e73d70218bcc1f845e
                       f1ae0c1098172dc21d274d588f7fd1a88a5cef4a
                       6760c2b86f154c9b2171350e836d9fb17fc8da97
                       c2b9a09765a3085648c801d8074088893cc78f20
                       ec72762a291b8644b02c59f7590e945fde176087
                       7912a2158b25758ce369a341890e085bdb28a0e6
                       60cadb66
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [c4:8e:de:d9:62:15:b3:77:1c:08:1d:a6:b4:a2:c9:81:ab:24:46:b0]
            modulus: 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
    public exponent: 10001

] 
2022-06-24 07:33:44.916  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-24 07:33:44.919 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-24 07:33:44.923 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-06-24 07:33:44.924 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-24 07:33:44.925  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-06-24 07:33:44.926  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-24 07:33:44.927  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-24 07:33:44.927 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-24 07:33:44.928 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-24 07:33:44.929 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-24 07:33:44.934 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-24 07:33:44.935 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-24 07:33:44.936 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-24 07:33:44.936 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-24 07:33:45.221  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-24 07:33:45.222  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-24 07:33:45.222 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-24 07:33:45.222 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-24 07:33:45.244  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-24 07:33:45.245  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-24 07:33:45.245 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-24 07:33:45.246 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-24 07:33:45.246 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-24 07:33:45.247 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-24 07:33:45.247 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-24 07:33:45.248 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-24 07:33:45.248 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-24 07:33:45.249 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-24 07:33:45.249 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-24 07:33:45.250 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-24 07:33:45.255 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 223904999455805704837666803545061931672344918992
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jun 24 05:12:21 UTC 2022
           Final Date: Wed Jun 23 05:12:20 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [e9:70:ac:31:45:e1:a0:3d:80:b8:48:e9:59:5f:39:76:f6:5f:20:be]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 156b4a026c97d44102df32d75b720d3c7a2fc351
                       990b537fb556c17d4f407566d1e8666d4323e994
                       05cece13792e1a3d6c3b00c32a7ad472fc7b5dfa
                       c89f54c5d37a6c5e3962e74ab94552818b7f2ce2
                       193d4a38c94b193c42ad6fc824199c8adc965a64
                       6eacc8f2fdf5b4f4fde86ac9b6331eb13d107821
                       d9df9939c5a66b0ca44d09516bbf34329a34ffab
                       79ec5921b4ed19d683d0d75f45b306e35dd10e4c
                       aafce397c58e4457b4c1bfbad9417121d915922f
                       c07e5b04cf6111adaa7bc7c7d4e29c7a0819dc10
                       63f0e796617ae49dcfbb21e33d1772b4b3a12e7e
                       b241379c05682009bed6ad07f6033a819f041e71
                       0f8d96f3344a545a59a7048751021bfd6a6be97b
                       b7dcc1921ec4370aaf7274e73d70218bcc1f845e
                       f1ae0c1098172dc21d274d588f7fd1a88a5cef4a
                       6760c2b86f154c9b2171350e836d9fb17fc8da97
                       c2b9a09765a3085648c801d8074088893cc78f20
                       ec72762a291b8644b02c59f7590e945fde176087
                       7912a2158b25758ce369a341890e085bdb28a0e6
                       60cadb66
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ae:b5:4f:bf:c3:57:f5:f4:4b:56:84:77:41:28:11:90:2a:e1:09:b5]
            modulus: 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
    public exponent: 10001

] 
2022-06-24 07:36:04.375  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-24 07:36:04.378 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-24 07:36:04.380 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-24 07:36:04.381 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-24 07:36:04.382  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-24 07:36:04.383  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-24 07:36:04.384  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-24 07:36:04.385 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-24 07:36:04.385 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-24 07:36:04.386 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-24 07:36:04.395 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-24 07:36:04.396 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-24 07:36:04.396 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-24 07:36:04.397 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-24 07:36:04.685  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-24 07:36:04.686  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-24 07:36:04.687 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-24 07:36:04.687 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-24 07:36:04.689  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-24 07:36:04.690  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-24 07:36:04.690 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-24 07:36:04.690 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-24 07:36:04.691 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-24 07:36:04.692 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-24 07:36:04.692 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-24 07:36:04.692 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-24 07:36:04.693 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-24 07:36:04.694 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-24 07:36:04.694 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-24 07:36:04.695 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-24 07:36:04.699 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 223904999455805704837666803545061931672344918992
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jun 24 05:12:21 UTC 2022
           Final Date: Wed Jun 23 05:12:20 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [e9:70:ac:31:45:e1:a0:3d:80:b8:48:e9:59:5f:39:76:f6:5f:20:be]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 156b4a026c97d44102df32d75b720d3c7a2fc351
                       990b537fb556c17d4f407566d1e8666d4323e994
                       05cece13792e1a3d6c3b00c32a7ad472fc7b5dfa
                       c89f54c5d37a6c5e3962e74ab94552818b7f2ce2
                       193d4a38c94b193c42ad6fc824199c8adc965a64
                       6eacc8f2fdf5b4f4fde86ac9b6331eb13d107821
                       d9df9939c5a66b0ca44d09516bbf34329a34ffab
                       79ec5921b4ed19d683d0d75f45b306e35dd10e4c
                       aafce397c58e4457b4c1bfbad9417121d915922f
                       c07e5b04cf6111adaa7bc7c7d4e29c7a0819dc10
                       63f0e796617ae49dcfbb21e33d1772b4b3a12e7e
                       b241379c05682009bed6ad07f6033a819f041e71
                       0f8d96f3344a545a59a7048751021bfd6a6be97b
                       b7dcc1921ec4370aaf7274e73d70218bcc1f845e
                       f1ae0c1098172dc21d274d588f7fd1a88a5cef4a
                       6760c2b86f154c9b2171350e836d9fb17fc8da97
                       c2b9a09765a3085648c801d8074088893cc78f20
                       ec72762a291b8644b02c59f7590e945fde176087
                       7912a2158b25758ce369a341890e085bdb28a0e6
                       60cadb66
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [6d:84:f0:0e:c1:67:7e:60:fe:37:db:e3:9b:07:a0:9e:31:b4:3e:59]
            modulus: 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
    public exponent: 10001

] 
2022-06-24 07:51:53.786  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-24 07:51:53.789 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-24 07:51:53.791 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-06-24 07:51:53.792 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-24 07:51:53.793  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-06-24 07:51:53.793  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-24 07:51:53.794  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-24 07:51:53.794 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-24 07:51:53.795 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-24 07:51:53.795 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-24 07:51:53.801 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-24 07:51:53.802 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-24 07:51:53.803 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-24 07:51:53.803 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-24 07:51:54.131  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-24 07:51:54.132  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-24 07:51:54.132 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-24 07:51:54.132 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-24 07:51:54.134  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-24 07:51:54.134  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-24 07:51:54.134 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-24 07:51:54.135 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-24 07:51:54.135 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-24 07:51:54.136 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-24 07:51:54.136 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-24 07:51:54.136 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-24 07:51:54.137 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-24 07:51:54.138 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-24 07:51:54.138 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-24 07:51:54.139 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-24 07:51:54.143 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 223904999455805704837666803545061931672344918992
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jun 24 05:12:21 UTC 2022
           Final Date: Wed Jun 23 05:12:20 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [e9:70:ac:31:45:e1:a0:3d:80:b8:48:e9:59:5f:39:76:f6:5f:20:be]
            modulus: b297359d3783369d6d31a9595dfc2f295d1681c7fc70de95138947dc6790014eb2f0d8afbc012d65e482dddac35cd6089fff5890e8051118c17f20d4ce8779033df30c3511d3cf67777a12697b0a1b051e13946660872358e152bd4356cc9d10be266821d351a8d7d203f2f16b5aa9e1d182282df5caa943b464f783af3a83fbd9b2b7230611fa156914101b9a7d496cf831b304aa34eb7af41b0642a4826ed116723627644440f97410447be9a2076f4cc7dc87afc44c5e159f8e6e022d12a07144d7d3d026bc04b15afc59f959d2577f223a369971f9c568c878c07a65506611477a21f8110fbaf461b994ebb674682ed70c76986a301ccdc8cefa0f21478e396ef7613d389d216ec39bd5b0b2ca1cd6f17a5d4e1fe3eba6fdf12f71b00a4722e3adc881fa2d8ffeb4d85317ffca0fc87064120efd5f74cdfcc070f0ebbdc2e1b0d5b3106002dc717e3e9c50bf9cdaa0f5cf76d180bcb37340d2e13a68443255f79dbe3fc7a38816e31ec011556bd61acd7b7f93b2586dcaea79d1e4c3d0c3
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 156b4a026c97d44102df32d75b720d3c7a2fc351
                       990b537fb556c17d4f407566d1e8666d4323e994
                       05cece13792e1a3d6c3b00c32a7ad472fc7b5dfa
                       c89f54c5d37a6c5e3962e74ab94552818b7f2ce2
                       193d4a38c94b193c42ad6fc824199c8adc965a64
                       6eacc8f2fdf5b4f4fde86ac9b6331eb13d107821
                       d9df9939c5a66b0ca44d09516bbf34329a34ffab
                       79ec5921b4ed19d683d0d75f45b306e35dd10e4c
                       aafce397c58e4457b4c1bfbad9417121d915922f
                       c07e5b04cf6111adaa7bc7c7d4e29c7a0819dc10
                       63f0e796617ae49dcfbb21e33d1772b4b3a12e7e
                       b241379c05682009bed6ad07f6033a819f041e71
                       0f8d96f3344a545a59a7048751021bfd6a6be97b
                       b7dcc1921ec4370aaf7274e73d70218bcc1f845e
                       f1ae0c1098172dc21d274d588f7fd1a88a5cef4a
                       6760c2b86f154c9b2171350e836d9fb17fc8da97
                       c2b9a09765a3085648c801d8074088893cc78f20
                       ec72762a291b8644b02c59f7590e945fde176087
                       7912a2158b25758ce369a341890e085bdb28a0e6
                       60cadb66
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [75:13:90:51:b7:7d:69:e2:8d:f3:3b:01:17:58:2e:9c:d2:93:68:47]
            modulus: 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
    public exponent: 10001

] 
2022-06-24 07:57:17.782  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-24 07:57:17.784 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-24 07:57:17.787 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-06-24 07:57:17.789 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-24 07:57:17.789  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-06-24 07:57:17.790  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-24 07:57:17.791  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-24 07:57:17.791 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-24 07:57:17.792 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-24 07:57:17.792 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-24 07:57:17.798 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-24 07:57:17.799 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-24 07:57:17.799 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-24 07:57:17.800 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-24 07:57:18.254  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-24 07:57:18.254  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-24 07:57:18.255 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-24 07:57:18.255 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-24 07:57:18.256  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-24 07:57:18.257  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-24 07:57:18.257 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-24 07:57:18.257 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-24 07:57:18.258 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-24 07:57:18.259 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-24 07:57:18.259 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-24 07:57:18.260 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-24 07:57:18.261 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-24 07:57:18.261 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-24 07:57:18.262 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-24 07:57:18.263 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-24 07:57:18.267 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 223904999455805704837666803545061931672344918992
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jun 24 05:12:21 UTC 2022
           Final Date: Wed Jun 23 05:12:20 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [e9:70:ac:31:45:e1:a0:3d:80:b8:48:e9:59:5f:39:76:f6:5f:20:be]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 156b4a026c97d44102df32d75b720d3c7a2fc351
                       990b537fb556c17d4f407566d1e8666d4323e994
                       05cece13792e1a3d6c3b00c32a7ad472fc7b5dfa
                       c89f54c5d37a6c5e3962e74ab94552818b7f2ce2
                       193d4a38c94b193c42ad6fc824199c8adc965a64
                       6eacc8f2fdf5b4f4fde86ac9b6331eb13d107821
                       d9df9939c5a66b0ca44d09516bbf34329a34ffab
                       79ec5921b4ed19d683d0d75f45b306e35dd10e4c
                       aafce397c58e4457b4c1bfbad9417121d915922f
                       c07e5b04cf6111adaa7bc7c7d4e29c7a0819dc10
                       63f0e796617ae49dcfbb21e33d1772b4b3a12e7e
                       b241379c05682009bed6ad07f6033a819f041e71
                       0f8d96f3344a545a59a7048751021bfd6a6be97b
                       b7dcc1921ec4370aaf7274e73d70218bcc1f845e
                       f1ae0c1098172dc21d274d588f7fd1a88a5cef4a
                       6760c2b86f154c9b2171350e836d9fb17fc8da97
                       c2b9a09765a3085648c801d8074088893cc78f20
                       ec72762a291b8644b02c59f7590e945fde176087
                       7912a2158b25758ce369a341890e085bdb28a0e6
                       60cadb66
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [2e:ff:50:4c:9a:a7:14:1b:2a:6f:d5:89:14:d5:29:f6:e2:b3:ac:58]
            modulus: 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
    public exponent: 10001

] 
2022-06-24 07:57:32.897  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-24 07:57:32.898 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-24 07:57:32.899 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-06-24 07:57:32.900 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-24 07:57:32.900  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-06-24 07:57:32.900  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-24 07:57:32.901  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-24 07:57:32.901 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-24 07:57:32.901 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-24 07:57:32.902 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-24 07:57:32.906 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-24 07:57:32.907 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-24 07:57:32.907 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-24 07:57:32.907 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-24 07:57:33.178  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-24 07:57:33.179  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-24 07:57:33.179 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-24 07:57:33.179 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-24 07:57:33.181  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-24 07:57:33.181  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-24 07:57:33.182 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-24 07:57:33.182 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-24 07:57:33.182 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-24 07:57:33.183 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-24 07:57:33.183 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-24 07:57:33.184 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-24 07:57:33.184 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-24 07:57:33.185 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-24 07:57:33.185 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-24 07:57:33.186 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-24 07:57:33.189 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 223904999455805704837666803545061931672344918992
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jun 24 05:12:21 UTC 2022
           Final Date: Wed Jun 23 05:12:20 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [e9:70:ac:31:45:e1:a0:3d:80:b8:48:e9:59:5f:39:76:f6:5f:20:be]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 156b4a026c97d44102df32d75b720d3c7a2fc351
                       990b537fb556c17d4f407566d1e8666d4323e994
                       05cece13792e1a3d6c3b00c32a7ad472fc7b5dfa
                       c89f54c5d37a6c5e3962e74ab94552818b7f2ce2
                       193d4a38c94b193c42ad6fc824199c8adc965a64
                       6eacc8f2fdf5b4f4fde86ac9b6331eb13d107821
                       d9df9939c5a66b0ca44d09516bbf34329a34ffab
                       79ec5921b4ed19d683d0d75f45b306e35dd10e4c
                       aafce397c58e4457b4c1bfbad9417121d915922f
                       c07e5b04cf6111adaa7bc7c7d4e29c7a0819dc10
                       63f0e796617ae49dcfbb21e33d1772b4b3a12e7e
                       b241379c05682009bed6ad07f6033a819f041e71
                       0f8d96f3344a545a59a7048751021bfd6a6be97b
                       b7dcc1921ec4370aaf7274e73d70218bcc1f845e
                       f1ae0c1098172dc21d274d588f7fd1a88a5cef4a
                       6760c2b86f154c9b2171350e836d9fb17fc8da97
                       c2b9a09765a3085648c801d8074088893cc78f20
                       ec72762a291b8644b02c59f7590e945fde176087
                       7912a2158b25758ce369a341890e085bdb28a0e6
                       60cadb66
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ea:ad:bf:38:f7:42:da:5d:3e:c2:c1:2b:14:9a:0e:f5:47:c6:2e:80]
            modulus: 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
    public exponent: 10001

]