Results

By type

          2022-07-08 10:11:22,408 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-07-08 10:11:23,440 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-07-08 10:11:24.121  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Jul 08, 2022 10:11:26 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Jul 08, 2022 10:11:26 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Jul 08, 2022 10:11:26 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Jul 08, 2022 10:11:26 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-07-08 10:11:26.642 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-07-08 10:11:26.949  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-07-08 10:11:27.115  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-07-08 10:11:27.869 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-07-08 10:11:27.872 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
2022-07-08 10:11:27.873 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-07-08 10:11:27.877 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-07-08 10:11:27.917 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2022-07-08 10:11:27.920 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
	{GET [/docs]}: redirectToUi(HttpServletRequest)
2022-07-08 10:11:28.050 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-07-08 10:11:28.763 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Jul 08, 2022 10:11:29 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-07-08 10:11:29.721  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 8.056 seconds (JVM running for 9.781)
Jul 08, 2022 10:11:50 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-07-08 10:12:21.577  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-07-08 10:12:21.584 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-07-08 10:12:21.620 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-07-08 10:12:21.624 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-07-08 10:12:21.644  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-07-08 10:12:21.647  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-07-08 10:12:21.648  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-07-08 10:12:21.649 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-07-08 10:12:21.650 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-08 10:12:21.654 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-07-08 10:12:21.660 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-07-08 10:12:21.663 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-07-08 10:12:21.697 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-07-08 10:12:21.702 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-08 10:12:21.702 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-08 10:12:21.706 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-08 10:12:26.596  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-07-08 10:12:26.599  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-07-08 10:12:26.599 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-07-08 10:12:26.601 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-08 10:12:26.610  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-07-08 10:12:26.611  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-07-08 10:12:26.612 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-08 10:12:26.612 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-08 10:12:26.612 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-08 10:12:26.623 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-08 10:12:26.624 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-08 10:12:26.624 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-08 10:12:26.629 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-08 10:12:26.630 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-08 10:12:26.630 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-08 10:12:26.632 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-07-08 10:12:26.659 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 342951532179473270014922253845610056244177967865
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jul 08 10:02:57 UTC 2022
           Final Date: Wed Jul 07 10:02:56 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ae:9b:64:55:5e:8b:95:58:70:4f:3f:84:f8:0f:f0:db:bd:6c:04:6e]
            modulus: cdb6f4791cf37bc33f659df030bda865a2445dce3bd1fcfee9c08cbf720ee0750bac95475f8e273b7cbdd65ccf0d47995d149629ab40e86e217e6a709ce6352d93f5db21072c8d2acc5a2aea70aab8df67093f58bc304e604b2a0971d27d5a7d9be1d51fd0d0b6045d6fe352181637f3ba9584fa76f04bc93ed0c71f3fdc50e7da3254d33581b054b61a0bd8bb248e13f3fc48eed85f1a6a3f2436ad4dfb41f4e914d6eef69017a39145ddf4c69d828f58a1f8e4ad79f09f3c65efac4984f2fd3ab90ead32a85d46534f0c7c4e2f5ae808f199865bf576e32b126047b426bde50971d3a192663d0f846ce73daccb86060718765e08bdd854f3dfff8c18f6f7aa1437f284266cc209a9d68fe60b454b7393104498d3f532186683aca65f9cb7957abc0089765fb40f3328bc6f9257091d9d4bca246b7471d987d49dec146fb0dc4dd605459846f8db51372cfeddcc11c712d64512c7cd3334a55737a9212e009cb8a47f30f61835d7a0e2970326ef989e590d42eb562c898bf69435e7d182a9f1
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: c50449ea581e156df8c8495f3e10702ee6971f74
                       1aff4ff8b972dca2e44383d48c58790e7c0c1064
                       7f7d02623f0947354b74b28fc9c267805867fe96
                       6a1cec221057b49014e1f8f2dd1f212be435c7a9
                       39a610c51c3a41ff4d68e3af09cde8fb236eb0cd
                       a06ee2419efcdbe52d825685d3057502dbbf69ff
                       5a2cbb23697f03c471a6dbd024dfc3affbec2a0b
                       5fcc27b9c9bc13ca6a5eb29a1198c3518f1c545e
                       a375adf2b50cdfea4fcffd842045167a4f978027
                       2b08aac86315a122e65c1ecd427f8a27268d51d0
                       759cdd2a73006d0bee7c3682a5fecc9c7b204233
                       049ea77d20b2579d6756e90ba66becff0221002b
                       878635452167503472c3fc9a606d919ec7e98c3e
                       4c5e4a4d0422a3cff8ba9556b7d6cbe4cf624e72
                       88d3f2507a3074831f8d5363edc7e4a27e27f0b8
                       c6a3a95aa5693c3c11cc3f196138e6307457dbf1
                       58a122d51ba3d55037f4a7b653cb2df63681305e
                       55bb9ea895654cd0ccc3a95ff5bc67b0419fada7
                       36ebe37c44f86458f9a1059c73fc585dc9e805dd
                       6088ed2b
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [b5:fa:da:4e:fb:04:83:3d:c3:d8:05:fe:57:72:0b:b8:a0:d8:9d:ec]
            modulus: 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
    public exponent: 10001

] 
2022-07-08 11:34:53.390  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-07-08 11:34:53.394 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-07-08 11:34:53.398 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-07-08 11:34:53.399 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-07-08 11:34:53.400  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-07-08 11:34:53.401  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-07-08 11:34:53.401  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-07-08 11:34:53.402 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-07-08 11:34:53.402 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-07-08 11:34:53.403 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-07-08 11:34:53.414 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-07-08 11:34:53.415 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-08 11:34:53.416 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-08 11:34:53.416 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-08 11:34:54.644  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-07-08 11:34:54.645  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-07-08 11:34:54.645 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-07-08 11:34:54.646 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-08 11:34:54.649  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-07-08 11:34:54.649  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-07-08 11:34:54.650 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-08 11:34:54.650 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-08 11:34:54.651 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-08 11:34:54.652 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-08 11:34:54.653 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-08 11:34:54.653 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-08 11:34:54.654 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-08 11:34:54.655 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-08 11:34:54.655 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-08 11:34:54.656 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-07-08 11:34:54.662 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 342951532179473270014922253845610056244177967865
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jul 08 10:02:57 UTC 2022
           Final Date: Wed Jul 07 10:02:56 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ae:9b:64:55:5e:8b:95:58:70:4f:3f:84:f8:0f:f0:db:bd:6c:04:6e]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: c50449ea581e156df8c8495f3e10702ee6971f74
                       1aff4ff8b972dca2e44383d48c58790e7c0c1064
                       7f7d02623f0947354b74b28fc9c267805867fe96
                       6a1cec221057b49014e1f8f2dd1f212be435c7a9
                       39a610c51c3a41ff4d68e3af09cde8fb236eb0cd
                       a06ee2419efcdbe52d825685d3057502dbbf69ff
                       5a2cbb23697f03c471a6dbd024dfc3affbec2a0b
                       5fcc27b9c9bc13ca6a5eb29a1198c3518f1c545e
                       a375adf2b50cdfea4fcffd842045167a4f978027
                       2b08aac86315a122e65c1ecd427f8a27268d51d0
                       759cdd2a73006d0bee7c3682a5fecc9c7b204233
                       049ea77d20b2579d6756e90ba66becff0221002b
                       878635452167503472c3fc9a606d919ec7e98c3e
                       4c5e4a4d0422a3cff8ba9556b7d6cbe4cf624e72
                       88d3f2507a3074831f8d5363edc7e4a27e27f0b8
                       c6a3a95aa5693c3c11cc3f196138e6307457dbf1
                       58a122d51ba3d55037f4a7b653cb2df63681305e
                       55bb9ea895654cd0ccc3a95ff5bc67b0419fada7
                       36ebe37c44f86458f9a1059c73fc585dc9e805dd
                       6088ed2b
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ea:da:42:05:6a:c2:4e:ad:48:b2:8f:a7:62:e4:e4:5c:4b:0e:9d:67]
            modulus: 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
    public exponent: 10001

] 
2022-07-08 11:36:41.122  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-07-08 11:36:41.123 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-07-08 11:36:41.125 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-07-08 11:36:41.127 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-07-08 11:36:41.127  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-07-08 11:36:41.128  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-07-08 11:36:41.129  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-07-08 11:36:41.129 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-07-08 11:36:41.130 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-07-08 11:36:41.130 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-07-08 11:36:41.143 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-07-08 11:36:41.143 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-08 11:36:41.144 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-08 11:36:41.144 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-08 11:36:42.394  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-07-08 11:36:42.395  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-07-08 11:36:42.395 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-07-08 11:36:42.396 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-08 11:36:42.400  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-07-08 11:36:42.400  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-07-08 11:36:42.401 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-08 11:36:42.401 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-08 11:36:42.401 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-08 11:36:42.402 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-08 11:36:42.402 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-08 11:36:42.403 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-08 11:36:42.404 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-08 11:36:42.404 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-08 11:36:42.405 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-08 11:36:42.406 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-07-08 11:36:42.409 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 342951532179473270014922253845610056244177967865
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jul 08 10:02:57 UTC 2022
           Final Date: Wed Jul 07 10:02:56 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ae:9b:64:55:5e:8b:95:58:70:4f:3f:84:f8:0f:f0:db:bd:6c:04:6e]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: c50449ea581e156df8c8495f3e10702ee6971f74
                       1aff4ff8b972dca2e44383d48c58790e7c0c1064
                       7f7d02623f0947354b74b28fc9c267805867fe96
                       6a1cec221057b49014e1f8f2dd1f212be435c7a9
                       39a610c51c3a41ff4d68e3af09cde8fb236eb0cd
                       a06ee2419efcdbe52d825685d3057502dbbf69ff
                       5a2cbb23697f03c471a6dbd024dfc3affbec2a0b
                       5fcc27b9c9bc13ca6a5eb29a1198c3518f1c545e
                       a375adf2b50cdfea4fcffd842045167a4f978027
                       2b08aac86315a122e65c1ecd427f8a27268d51d0
                       759cdd2a73006d0bee7c3682a5fecc9c7b204233
                       049ea77d20b2579d6756e90ba66becff0221002b
                       878635452167503472c3fc9a606d919ec7e98c3e
                       4c5e4a4d0422a3cff8ba9556b7d6cbe4cf624e72
                       88d3f2507a3074831f8d5363edc7e4a27e27f0b8
                       c6a3a95aa5693c3c11cc3f196138e6307457dbf1
                       58a122d51ba3d55037f4a7b653cb2df63681305e
                       55bb9ea895654cd0ccc3a95ff5bc67b0419fada7
                       36ebe37c44f86458f9a1059c73fc585dc9e805dd
                       6088ed2b
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [1e:c6:84:0d:87:36:38:91:c0:19:fc:db:e3:fa:e2:68:47:cf:d3:80]
            modulus: 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
    public exponent: 10001

] 
2022-07-08 11:37:43.012  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-07-08 11:37:43.013 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-07-08 11:37:43.015 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-07-08 11:37:43.015 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-07-08 11:37:43.016  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-07-08 11:37:43.017  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-07-08 11:37:43.017  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-07-08 11:37:43.018 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-07-08 11:37:43.018 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-07-08 11:37:43.018 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-07-08 11:37:43.023 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-07-08 11:37:43.024 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-08 11:37:43.024 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-08 11:37:43.024 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-08 11:37:44.064  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-07-08 11:37:44.064  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-07-08 11:37:44.065 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-07-08 11:37:44.065 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-08 11:37:44.067  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-07-08 11:37:44.067  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-07-08 11:37:44.068 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-08 11:37:44.068 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-08 11:37:44.069 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-08 11:37:44.069 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-08 11:37:44.070 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-08 11:37:44.070 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-08 11:37:44.071 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-08 11:37:44.071 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-08 11:37:44.071 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-08 11:37:44.072 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-07-08 11:37:44.076 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 342951532179473270014922253845610056244177967865
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jul 08 10:02:57 UTC 2022
           Final Date: Wed Jul 07 10:02:56 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ae:9b:64:55:5e:8b:95:58:70:4f:3f:84:f8:0f:f0:db:bd:6c:04:6e]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: c50449ea581e156df8c8495f3e10702ee6971f74
                       1aff4ff8b972dca2e44383d48c58790e7c0c1064
                       7f7d02623f0947354b74b28fc9c267805867fe96
                       6a1cec221057b49014e1f8f2dd1f212be435c7a9
                       39a610c51c3a41ff4d68e3af09cde8fb236eb0cd
                       a06ee2419efcdbe52d825685d3057502dbbf69ff
                       5a2cbb23697f03c471a6dbd024dfc3affbec2a0b
                       5fcc27b9c9bc13ca6a5eb29a1198c3518f1c545e
                       a375adf2b50cdfea4fcffd842045167a4f978027
                       2b08aac86315a122e65c1ecd427f8a27268d51d0
                       759cdd2a73006d0bee7c3682a5fecc9c7b204233
                       049ea77d20b2579d6756e90ba66becff0221002b
                       878635452167503472c3fc9a606d919ec7e98c3e
                       4c5e4a4d0422a3cff8ba9556b7d6cbe4cf624e72
                       88d3f2507a3074831f8d5363edc7e4a27e27f0b8
                       c6a3a95aa5693c3c11cc3f196138e6307457dbf1
                       58a122d51ba3d55037f4a7b653cb2df63681305e
                       55bb9ea895654cd0ccc3a95ff5bc67b0419fada7
                       36ebe37c44f86458f9a1059c73fc585dc9e805dd
                       6088ed2b
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [b5:fa:32:0e:0d:ff:79:4a:63:07:09:93:47:e6:18:c8:54:96:8b:aa]
            modulus: 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
    public exponent: 10001

] 
2022-07-08 11:39:43.541  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-07-08 11:39:43.543 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-07-08 11:39:43.544 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-07-08 11:39:43.545 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-07-08 11:39:43.545  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-07-08 11:39:43.546  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-07-08 11:39:43.546  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-07-08 11:39:43.547 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-07-08 11:39:43.547 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-07-08 11:39:43.547 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-07-08 11:39:43.552 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-07-08 11:39:43.553 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-08 11:39:43.553 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-08 11:39:43.553 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-08 11:39:44.248  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-07-08 11:39:44.249  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-07-08 11:39:44.250 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-07-08 11:39:44.251 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-08 11:39:44.253  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-07-08 11:39:44.254  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-07-08 11:39:44.254 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-08 11:39:44.255 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-08 11:39:44.255 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-08 11:39:44.256 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-08 11:39:44.256 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-08 11:39:44.256 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-08 11:39:44.257 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-08 11:39:44.257 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-08 11:39:44.258 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-08 11:39:44.258 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-07-08 11:39:44.262 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 342951532179473270014922253845610056244177967865
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jul 08 10:02:57 UTC 2022
           Final Date: Wed Jul 07 10:02:56 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ae:9b:64:55:5e:8b:95:58:70:4f:3f:84:f8:0f:f0:db:bd:6c:04:6e]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: c50449ea581e156df8c8495f3e10702ee6971f74
                       1aff4ff8b972dca2e44383d48c58790e7c0c1064
                       7f7d02623f0947354b74b28fc9c267805867fe96
                       6a1cec221057b49014e1f8f2dd1f212be435c7a9
                       39a610c51c3a41ff4d68e3af09cde8fb236eb0cd
                       a06ee2419efcdbe52d825685d3057502dbbf69ff
                       5a2cbb23697f03c471a6dbd024dfc3affbec2a0b
                       5fcc27b9c9bc13ca6a5eb29a1198c3518f1c545e
                       a375adf2b50cdfea4fcffd842045167a4f978027
                       2b08aac86315a122e65c1ecd427f8a27268d51d0
                       759cdd2a73006d0bee7c3682a5fecc9c7b204233
                       049ea77d20b2579d6756e90ba66becff0221002b
                       878635452167503472c3fc9a606d919ec7e98c3e
                       4c5e4a4d0422a3cff8ba9556b7d6cbe4cf624e72
                       88d3f2507a3074831f8d5363edc7e4a27e27f0b8
                       c6a3a95aa5693c3c11cc3f196138e6307457dbf1
                       58a122d51ba3d55037f4a7b653cb2df63681305e
                       55bb9ea895654cd0ccc3a95ff5bc67b0419fada7
                       36ebe37c44f86458f9a1059c73fc585dc9e805dd
                       6088ed2b
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [5a:3e:a5:40:53:a4:65:48:de:10:98:80:df:5f:22:f1:e3:c0:ba:cd]
            modulus: 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
    public exponent: 10001

] 
2022-07-08 11:48:43.792  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-07-08 11:48:43.794 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-07-08 11:48:43.797 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-07-08 11:48:43.798 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-07-08 11:48:43.799  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-07-08 11:48:43.799  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-07-08 11:48:43.800  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-07-08 11:48:43.800 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-07-08 11:48:43.801 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-07-08 11:48:43.801 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-07-08 11:48:43.808 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-07-08 11:48:43.809 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-08 11:48:43.809 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-08 11:48:43.809 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-08 11:48:44.286  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-07-08 11:48:44.286  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-07-08 11:48:44.287 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-07-08 11:48:44.287 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-08 11:48:44.289  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-07-08 11:48:44.289  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-07-08 11:48:44.289 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-08 11:48:44.290 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-08 11:48:44.290 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-08 11:48:44.291 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-08 11:48:44.291 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-08 11:48:44.291 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-08 11:48:44.292 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-08 11:48:44.292 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-08 11:48:44.293 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-08 11:48:44.293 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-07-08 11:48:44.297 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 342951532179473270014922253845610056244177967865
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jul 08 10:02:57 UTC 2022
           Final Date: Wed Jul 07 10:02:56 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ae:9b:64:55:5e:8b:95:58:70:4f:3f:84:f8:0f:f0:db:bd:6c:04:6e]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: c50449ea581e156df8c8495f3e10702ee6971f74
                       1aff4ff8b972dca2e44383d48c58790e7c0c1064
                       7f7d02623f0947354b74b28fc9c267805867fe96
                       6a1cec221057b49014e1f8f2dd1f212be435c7a9
                       39a610c51c3a41ff4d68e3af09cde8fb236eb0cd
                       a06ee2419efcdbe52d825685d3057502dbbf69ff
                       5a2cbb23697f03c471a6dbd024dfc3affbec2a0b
                       5fcc27b9c9bc13ca6a5eb29a1198c3518f1c545e
                       a375adf2b50cdfea4fcffd842045167a4f978027
                       2b08aac86315a122e65c1ecd427f8a27268d51d0
                       759cdd2a73006d0bee7c3682a5fecc9c7b204233
                       049ea77d20b2579d6756e90ba66becff0221002b
                       878635452167503472c3fc9a606d919ec7e98c3e
                       4c5e4a4d0422a3cff8ba9556b7d6cbe4cf624e72
                       88d3f2507a3074831f8d5363edc7e4a27e27f0b8
                       c6a3a95aa5693c3c11cc3f196138e6307457dbf1
                       58a122d51ba3d55037f4a7b653cb2df63681305e
                       55bb9ea895654cd0ccc3a95ff5bc67b0419fada7
                       36ebe37c44f86458f9a1059c73fc585dc9e805dd
                       6088ed2b
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [2a:d0:7a:ea:b5:7f:2d:81:8b:a1:cb:31:42:c6:04:a0:d6:81:50:ff]
            modulus: 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
    public exponent: 10001

] 
2022-07-08 11:54:02.323  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-07-08 11:54:02.325 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-07-08 11:54:02.328 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-07-08 11:54:02.329 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-07-08 11:54:02.329  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-07-08 11:54:02.330  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-07-08 11:54:02.331  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-07-08 11:54:02.331 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-07-08 11:54:02.332 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-07-08 11:54:02.332 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-07-08 11:54:02.338 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-07-08 11:54:02.339 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-08 11:54:02.339 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-08 11:54:02.339 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-08 11:54:02.843  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-07-08 11:54:02.844  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-07-08 11:54:02.844 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-07-08 11:54:02.845 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-08 11:54:02.847  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-07-08 11:54:02.847  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-07-08 11:54:02.848 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-08 11:54:02.848 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-08 11:54:02.849 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-08 11:54:02.849 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-08 11:54:02.850 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-08 11:54:02.850 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-08 11:54:02.851 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-08 11:54:02.852 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-08 11:54:02.852 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-08 11:54:02.853 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-07-08 11:54:02.857 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 342951532179473270014922253845610056244177967865
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jul 08 10:02:57 UTC 2022
           Final Date: Wed Jul 07 10:02:56 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ae:9b:64:55:5e:8b:95:58:70:4f:3f:84:f8:0f:f0:db:bd:6c:04:6e]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: c50449ea581e156df8c8495f3e10702ee6971f74
                       1aff4ff8b972dca2e44383d48c58790e7c0c1064
                       7f7d02623f0947354b74b28fc9c267805867fe96
                       6a1cec221057b49014e1f8f2dd1f212be435c7a9
                       39a610c51c3a41ff4d68e3af09cde8fb236eb0cd
                       a06ee2419efcdbe52d825685d3057502dbbf69ff
                       5a2cbb23697f03c471a6dbd024dfc3affbec2a0b
                       5fcc27b9c9bc13ca6a5eb29a1198c3518f1c545e
                       a375adf2b50cdfea4fcffd842045167a4f978027
                       2b08aac86315a122e65c1ecd427f8a27268d51d0
                       759cdd2a73006d0bee7c3682a5fecc9c7b204233
                       049ea77d20b2579d6756e90ba66becff0221002b
                       878635452167503472c3fc9a606d919ec7e98c3e
                       4c5e4a4d0422a3cff8ba9556b7d6cbe4cf624e72
                       88d3f2507a3074831f8d5363edc7e4a27e27f0b8
                       c6a3a95aa5693c3c11cc3f196138e6307457dbf1
                       58a122d51ba3d55037f4a7b653cb2df63681305e
                       55bb9ea895654cd0ccc3a95ff5bc67b0419fada7
                       36ebe37c44f86458f9a1059c73fc585dc9e805dd
                       6088ed2b
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [16:4e:a2:aa:a2:c3:76:ff:a1:89:46:31:3f:d3:bd:3a:80:90:59:00]
            modulus: ad57daaef64a578241bd51410dd096d8c653da7771e5584bfcd28bf25bc843cbf39ac4de641cb3e035159b27d85c88d17d66fc50fc468c35c7fb21e3eeb62f53f2c419730dbd2b11791e453dcc47c699d9277de89eb746118125700b8d6b6241e41f669def55fde9e66f1949b1c18fd83f4f7d99dce6c116cf9fa6e99b838acd17211ec3a3d4bb934c1d02fe312cf85dcfc53caf02451570769f3c7e5ba2c577fd6b50c89d44f84820245c634e2f9543abb8499940798769ab7c18673fd03f2816a8f9a21532ec7f5f094ccbce16a8c5020e101771ab11b2fecee578f559f1985f743937983eb8a3e904c15f24bc89006de6abacb2829054b547348e76c350eb
    public exponent: 10001

] 
2022-07-08 11:54:19.434  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-07-08 11:54:19.435 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-07-08 11:54:19.437 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-07-08 11:54:19.438 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-07-08 11:54:19.438  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-07-08 11:54:19.439  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-07-08 11:54:19.439  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-07-08 11:54:19.440 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-07-08 11:54:19.440 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-07-08 11:54:19.441 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-07-08 11:54:19.445 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-07-08 11:54:19.446 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-08 11:54:19.447 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-08 11:54:19.448 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-08 11:54:19.769  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-07-08 11:54:19.770  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-07-08 11:54:19.771 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-07-08 11:54:19.771 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-08 11:54:19.774  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-07-08 11:54:19.775  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-07-08 11:54:19.775 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-08 11:54:19.776 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-08 11:54:19.777 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-08 11:54:19.778 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-08 11:54:19.778 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-08 11:54:19.779 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-08 11:54:19.781 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-08 11:54:19.781 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-08 11:54:19.782 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-08 11:54:19.783 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-07-08 11:54:19.790 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 342951532179473270014922253845610056244177967865
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jul 08 10:02:57 UTC 2022
           Final Date: Wed Jul 07 10:02:56 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ae:9b:64:55:5e:8b:95:58:70:4f:3f:84:f8:0f:f0:db:bd:6c:04:6e]
            modulus: cdb6f4791cf37bc33f659df030bda865a2445dce3bd1fcfee9c08cbf720ee0750bac95475f8e273b7cbdd65ccf0d47995d149629ab40e86e217e6a709ce6352d93f5db21072c8d2acc5a2aea70aab8df67093f58bc304e604b2a0971d27d5a7d9be1d51fd0d0b6045d6fe352181637f3ba9584fa76f04bc93ed0c71f3fdc50e7da3254d33581b054b61a0bd8bb248e13f3fc48eed85f1a6a3f2436ad4dfb41f4e914d6eef69017a39145ddf4c69d828f58a1f8e4ad79f09f3c65efac4984f2fd3ab90ead32a85d46534f0c7c4e2f5ae808f199865bf576e32b126047b426bde50971d3a192663d0f846ce73daccb86060718765e08bdd854f3dfff8c18f6f7aa1437f284266cc209a9d68fe60b454b7393104498d3f532186683aca65f9cb7957abc0089765fb40f3328bc6f9257091d9d4bca246b7471d987d49dec146fb0dc4dd605459846f8db51372cfeddcc11c712d64512c7cd3334a55737a9212e009cb8a47f30f61835d7a0e2970326ef989e590d42eb562c898bf69435e7d182a9f1
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: c50449ea581e156df8c8495f3e10702ee6971f74
                       1aff4ff8b972dca2e44383d48c58790e7c0c1064
                       7f7d02623f0947354b74b28fc9c267805867fe96
                       6a1cec221057b49014e1f8f2dd1f212be435c7a9
                       39a610c51c3a41ff4d68e3af09cde8fb236eb0cd
                       a06ee2419efcdbe52d825685d3057502dbbf69ff
                       5a2cbb23697f03c471a6dbd024dfc3affbec2a0b
                       5fcc27b9c9bc13ca6a5eb29a1198c3518f1c545e
                       a375adf2b50cdfea4fcffd842045167a4f978027
                       2b08aac86315a122e65c1ecd427f8a27268d51d0
                       759cdd2a73006d0bee7c3682a5fecc9c7b204233
                       049ea77d20b2579d6756e90ba66becff0221002b
                       878635452167503472c3fc9a606d919ec7e98c3e
                       4c5e4a4d0422a3cff8ba9556b7d6cbe4cf624e72
                       88d3f2507a3074831f8d5363edc7e4a27e27f0b8
                       c6a3a95aa5693c3c11cc3f196138e6307457dbf1
                       58a122d51ba3d55037f4a7b653cb2df63681305e
                       55bb9ea895654cd0ccc3a95ff5bc67b0419fada7
                       36ebe37c44f86458f9a1059c73fc585dc9e805dd
                       6088ed2b
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [cb:2b:61:9e:c5:94:ab:37:80:af:69:c0:2c:cd:28:47:60:2b:d9:43]
            modulus: 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
    public exponent: 10001

]