Results

By type

          2022-06-06 08:30:01,851 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-06-06 08:30:02,829 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-06-06 08:30:03.700  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Jun 06, 2022 8:30:05 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Jun 06, 2022 8:30:05 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Jun 06, 2022 8:30:05 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Jun 06, 2022 8:30:05 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-06-06 08:30:06.344 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-06-06 08:30:06.663  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-06-06 08:30:06.848  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-06-06 08:30:07.688 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-06-06 08:30:07.694 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
2022-06-06 08:30:07.697 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-06-06 08:30:07.705 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-06-06 08:30:07.754 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2022-06-06 08:30:07.757 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
	{GET [/docs]}: redirectToUi(HttpServletRequest)
2022-06-06 08:30:07.885 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-06-06 08:30:08.573 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Jun 06, 2022 8:30:09 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-06-06 08:30:09.750  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 9.018 seconds (JVM running for 11.142)
Jun 06, 2022 8:30:37 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-06-06 08:30:58.239  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-06 08:30:58.256 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-06 08:30:58.314 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-06-06 08:30:58.320 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-06 08:30:58.353  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-06-06 08:30:58.360  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-06 08:30:58.362  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-06 08:30:58.365 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-06 08:30:58.366 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-06 08:30:58.373 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-06 08:30:58.385 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-06 08:30:58.392 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-06 08:30:58.456 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-06 08:30:58.464 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-06 08:30:58.465 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-06 08:30:58.472 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-06 08:30:59.102  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-06 08:30:59.106  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-06 08:30:59.107 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-06 08:30:59.110 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-06 08:30:59.124  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-06 08:30:59.125  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-06 08:30:59.127 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-06 08:30:59.127 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-06 08:30:59.128 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-06 08:30:59.146 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-06 08:30:59.147 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-06 08:30:59.147 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-06 08:30:59.160 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-06 08:30:59.162 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-06 08:30:59.166 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-06 08:30:59.173 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-06 08:30:59.208 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 285111743824466046918790149707875083774914000257
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Jun 06 08:27:52 UTC 2022
           Final Date: Sat Jun 05 08:27:51 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [5d:7c:f0:e7:34:fd:92:46:c8:d0:b6:3a:ce:91:ad:54:a9:2a:c3:c3]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3dce4f94a08a64ecad4f389b63ce421d634cae5a
                       abff9206578dad2d594caca77720eb8ef4e25284
                       bd837c468b55d210ee83889bf5cef4f1465340d1
                       295d1bbc2c18d236d92adc45069ddd4ab148e034
                       31e089327b571548a25dddcee73adca258fc0ff5
                       3a8c8a4b5e9b619a388ac24e4de98b7050d55fcc
                       7137c582cb77910c3b9726c6b1fd2e873af6fbdd
                       a1203983b8c5b472d8905446fd65fb3336ac35ac
                       b984fd4cba37b86723c4bd5b0db2d4d8dc4b519f
                       31fbd7b777b91e33bd9d51667745018400981fb7
                       917490f1ea2be94a4c4617c589fe541cff284bd0
                       c5ef8eecbaf324a7cd623641427b45fd0051b8e1
                       1f12fdbdc666979d43caa03181bc42acf10387f4
                       0b0a271cc3dc7124ae2e5a1696d67461902e2363
                       3444abe7d70b9eb6f40215d54bdafa0307a2632d
                       6710055f4a71a738fdc3879416b87e7fe48ee5dd
                       69f734394055a6482f27104c55f3ada5745628bd
                       9921fdc00a9b60d0687c2822c6a1b5ee35f839b3
                       b829815ac751574b4531a4380ba312d10831a70c
                       8aaf4244
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ba:96:71:9a:ae:26:70:ad:d5:b0:fc:cd:dc:8c:04:70:88:c9:f6:34]
            modulus: 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
    public exponent: 10001

] 
2022-06-06 10:32:12.044  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-06 10:32:12.047 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-06 10:32:12.051 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-06 10:32:12.052 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-06 10:32:12.053  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-06 10:32:12.054  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-06 10:32:12.054  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-06 10:32:12.055 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-06 10:32:12.055 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-06 10:32:12.056 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-06 10:32:12.064 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-06 10:32:12.066 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-06 10:32:12.066 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-06 10:32:12.067 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-06 10:32:12.303  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-06 10:32:12.305  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-06 10:32:12.305 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-06 10:32:12.306 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-06 10:32:12.309  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-06 10:32:12.310  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-06 10:32:12.311 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-06 10:32:12.311 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-06 10:32:12.312 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-06 10:32:12.313 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-06 10:32:12.313 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-06 10:32:12.314 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-06 10:32:12.315 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-06 10:32:12.315 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-06 10:32:12.316 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-06 10:32:12.317 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-06 10:32:12.323 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 285111743824466046918790149707875083774914000257
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Jun 06 08:27:52 UTC 2022
           Final Date: Sat Jun 05 08:27:51 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [5d:7c:f0:e7:34:fd:92:46:c8:d0:b6:3a:ce:91:ad:54:a9:2a:c3:c3]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3dce4f94a08a64ecad4f389b63ce421d634cae5a
                       abff9206578dad2d594caca77720eb8ef4e25284
                       bd837c468b55d210ee83889bf5cef4f1465340d1
                       295d1bbc2c18d236d92adc45069ddd4ab148e034
                       31e089327b571548a25dddcee73adca258fc0ff5
                       3a8c8a4b5e9b619a388ac24e4de98b7050d55fcc
                       7137c582cb77910c3b9726c6b1fd2e873af6fbdd
                       a1203983b8c5b472d8905446fd65fb3336ac35ac
                       b984fd4cba37b86723c4bd5b0db2d4d8dc4b519f
                       31fbd7b777b91e33bd9d51667745018400981fb7
                       917490f1ea2be94a4c4617c589fe541cff284bd0
                       c5ef8eecbaf324a7cd623641427b45fd0051b8e1
                       1f12fdbdc666979d43caa03181bc42acf10387f4
                       0b0a271cc3dc7124ae2e5a1696d67461902e2363
                       3444abe7d70b9eb6f40215d54bdafa0307a2632d
                       6710055f4a71a738fdc3879416b87e7fe48ee5dd
                       69f734394055a6482f27104c55f3ada5745628bd
                       9921fdc00a9b60d0687c2822c6a1b5ee35f839b3
                       b829815ac751574b4531a4380ba312d10831a70c
                       8aaf4244
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ed:a2:87:63:de:d3:5c:e4:a0:ef:bb:e6:0f:1a:18:db:0f:3a:de:bf]
            modulus: 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
    public exponent: 10001

] 
2022-06-06 10:34:00.017  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-06 10:34:00.018 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-06 10:34:00.021 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-06-06 10:34:00.022 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-06 10:34:00.023  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-06-06 10:34:00.024  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-06 10:34:00.024  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-06 10:34:00.024 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-06 10:34:00.025 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-06 10:34:00.028 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-06 10:34:00.043 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-06 10:34:00.044 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-06 10:34:00.045 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-06 10:34:00.045 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-06 10:34:00.177  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-06 10:34:00.178  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-06 10:34:00.179 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-06 10:34:00.180 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-06 10:34:00.183  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-06 10:34:00.184  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-06 10:34:00.185 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-06 10:34:00.185 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-06 10:34:00.186 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-06 10:34:00.188 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-06 10:34:00.188 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-06 10:34:00.189 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-06 10:34:00.190 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-06 10:34:00.191 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-06 10:34:00.191 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-06 10:34:00.193 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-06 10:34:00.199 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 285111743824466046918790149707875083774914000257
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Jun 06 08:27:52 UTC 2022
           Final Date: Sat Jun 05 08:27:51 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [5d:7c:f0:e7:34:fd:92:46:c8:d0:b6:3a:ce:91:ad:54:a9:2a:c3:c3]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3dce4f94a08a64ecad4f389b63ce421d634cae5a
                       abff9206578dad2d594caca77720eb8ef4e25284
                       bd837c468b55d210ee83889bf5cef4f1465340d1
                       295d1bbc2c18d236d92adc45069ddd4ab148e034
                       31e089327b571548a25dddcee73adca258fc0ff5
                       3a8c8a4b5e9b619a388ac24e4de98b7050d55fcc
                       7137c582cb77910c3b9726c6b1fd2e873af6fbdd
                       a1203983b8c5b472d8905446fd65fb3336ac35ac
                       b984fd4cba37b86723c4bd5b0db2d4d8dc4b519f
                       31fbd7b777b91e33bd9d51667745018400981fb7
                       917490f1ea2be94a4c4617c589fe541cff284bd0
                       c5ef8eecbaf324a7cd623641427b45fd0051b8e1
                       1f12fdbdc666979d43caa03181bc42acf10387f4
                       0b0a271cc3dc7124ae2e5a1696d67461902e2363
                       3444abe7d70b9eb6f40215d54bdafa0307a2632d
                       6710055f4a71a738fdc3879416b87e7fe48ee5dd
                       69f734394055a6482f27104c55f3ada5745628bd
                       9921fdc00a9b60d0687c2822c6a1b5ee35f839b3
                       b829815ac751574b4531a4380ba312d10831a70c
                       8aaf4244
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ed:01:1c:ee:0b:bd:7b:b2:ba:c0:fa:e9:da:ad:ba:c7:5e:4b:10:3b]
            modulus: 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
    public exponent: 10001

] 
2022-06-06 10:35:12.240  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-06 10:35:12.242 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-06 10:35:12.245 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-06-06 10:35:12.246 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-06 10:35:12.246  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-06-06 10:35:12.247  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-06 10:35:12.248  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-06 10:35:12.248 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-06 10:35:12.249 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-06 10:35:12.249 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-06 10:35:12.256 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-06 10:35:12.257 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-06 10:35:12.257 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-06 10:35:12.257 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-06 10:35:12.426  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-06 10:35:12.427  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-06 10:35:12.427 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-06 10:35:12.428 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-06 10:35:12.430  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-06 10:35:12.431  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-06 10:35:12.432 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-06 10:35:12.433 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-06 10:35:12.433 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-06 10:35:12.434 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-06 10:35:12.435 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-06 10:35:12.435 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-06 10:35:12.436 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-06 10:35:12.437 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-06 10:35:12.437 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-06 10:35:12.438 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-06 10:35:12.460 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 285111743824466046918790149707875083774914000257
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Jun 06 08:27:52 UTC 2022
           Final Date: Sat Jun 05 08:27:51 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [5d:7c:f0:e7:34:fd:92:46:c8:d0:b6:3a:ce:91:ad:54:a9:2a:c3:c3]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3dce4f94a08a64ecad4f389b63ce421d634cae5a
                       abff9206578dad2d594caca77720eb8ef4e25284
                       bd837c468b55d210ee83889bf5cef4f1465340d1
                       295d1bbc2c18d236d92adc45069ddd4ab148e034
                       31e089327b571548a25dddcee73adca258fc0ff5
                       3a8c8a4b5e9b619a388ac24e4de98b7050d55fcc
                       7137c582cb77910c3b9726c6b1fd2e873af6fbdd
                       a1203983b8c5b472d8905446fd65fb3336ac35ac
                       b984fd4cba37b86723c4bd5b0db2d4d8dc4b519f
                       31fbd7b777b91e33bd9d51667745018400981fb7
                       917490f1ea2be94a4c4617c589fe541cff284bd0
                       c5ef8eecbaf324a7cd623641427b45fd0051b8e1
                       1f12fdbdc666979d43caa03181bc42acf10387f4
                       0b0a271cc3dc7124ae2e5a1696d67461902e2363
                       3444abe7d70b9eb6f40215d54bdafa0307a2632d
                       6710055f4a71a738fdc3879416b87e7fe48ee5dd
                       69f734394055a6482f27104c55f3ada5745628bd
                       9921fdc00a9b60d0687c2822c6a1b5ee35f839b3
                       b829815ac751574b4531a4380ba312d10831a70c
                       8aaf4244
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ed:a9:5f:87:a3:5e:9b:03:fb:8c:7c:76:35:b8:fd:d1:06:88:70:0b]
            modulus: 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
    public exponent: 10001

] 
2022-06-06 10:37:32.024  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-06 10:37:32.028 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-06 10:37:32.031 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-06 10:37:32.033 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-06 10:37:32.033  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-06 10:37:32.035  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-06 10:37:32.035  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-06 10:37:32.036 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-06 10:37:32.037 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-06 10:37:32.039 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-06 10:37:32.048 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-06 10:37:32.050 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-06 10:37:32.050 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-06 10:37:32.050 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-06 10:37:32.207  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-06 10:37:32.208  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-06 10:37:32.208 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-06 10:37:32.208 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-06 10:37:32.210  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-06 10:37:32.211  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-06 10:37:32.211 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-06 10:37:32.212 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-06 10:37:32.212 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-06 10:37:32.213 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-06 10:37:32.214 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-06 10:37:32.215 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-06 10:37:32.216 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-06 10:37:32.216 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-06 10:37:32.217 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-06 10:37:32.218 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-06 10:37:32.222 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 285111743824466046918790149707875083774914000257
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Jun 06 08:27:52 UTC 2022
           Final Date: Sat Jun 05 08:27:51 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [5d:7c:f0:e7:34:fd:92:46:c8:d0:b6:3a:ce:91:ad:54:a9:2a:c3:c3]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3dce4f94a08a64ecad4f389b63ce421d634cae5a
                       abff9206578dad2d594caca77720eb8ef4e25284
                       bd837c468b55d210ee83889bf5cef4f1465340d1
                       295d1bbc2c18d236d92adc45069ddd4ab148e034
                       31e089327b571548a25dddcee73adca258fc0ff5
                       3a8c8a4b5e9b619a388ac24e4de98b7050d55fcc
                       7137c582cb77910c3b9726c6b1fd2e873af6fbdd
                       a1203983b8c5b472d8905446fd65fb3336ac35ac
                       b984fd4cba37b86723c4bd5b0db2d4d8dc4b519f
                       31fbd7b777b91e33bd9d51667745018400981fb7
                       917490f1ea2be94a4c4617c589fe541cff284bd0
                       c5ef8eecbaf324a7cd623641427b45fd0051b8e1
                       1f12fdbdc666979d43caa03181bc42acf10387f4
                       0b0a271cc3dc7124ae2e5a1696d67461902e2363
                       3444abe7d70b9eb6f40215d54bdafa0307a2632d
                       6710055f4a71a738fdc3879416b87e7fe48ee5dd
                       69f734394055a6482f27104c55f3ada5745628bd
                       9921fdc00a9b60d0687c2822c6a1b5ee35f839b3
                       b829815ac751574b4531a4380ba312d10831a70c
                       8aaf4244
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [d6:fe:50:a0:da:43:1a:0f:8f:8a:25:44:c0:ba:0e:f4:01:ee:8c:a2]
            modulus: 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
    public exponent: 10001

] 
2022-06-06 10:51:16.850  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-06 10:51:16.853 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-06 10:51:16.857 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-06-06 10:51:16.858 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-06 10:51:16.859  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-06-06 10:51:16.860  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-06 10:51:16.860  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-06 10:51:16.861 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-06 10:51:16.862 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-06 10:51:16.862 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-06 10:51:16.872 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-06 10:51:16.873 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-06 10:51:16.874 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-06 10:51:16.874 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-06 10:51:17.052  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-06 10:51:17.053  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-06 10:51:17.054 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-06 10:51:17.054 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-06 10:51:17.056  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-06 10:51:17.056  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-06 10:51:17.057 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-06 10:51:17.057 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-06 10:51:17.057 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-06 10:51:17.059 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-06 10:51:17.059 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-06 10:51:17.059 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-06 10:51:17.061 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-06 10:51:17.061 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-06 10:51:17.061 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-06 10:51:17.062 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-06 10:51:17.068 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 285111743824466046918790149707875083774914000257
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Jun 06 08:27:52 UTC 2022
           Final Date: Sat Jun 05 08:27:51 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [5d:7c:f0:e7:34:fd:92:46:c8:d0:b6:3a:ce:91:ad:54:a9:2a:c3:c3]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3dce4f94a08a64ecad4f389b63ce421d634cae5a
                       abff9206578dad2d594caca77720eb8ef4e25284
                       bd837c468b55d210ee83889bf5cef4f1465340d1
                       295d1bbc2c18d236d92adc45069ddd4ab148e034
                       31e089327b571548a25dddcee73adca258fc0ff5
                       3a8c8a4b5e9b619a388ac24e4de98b7050d55fcc
                       7137c582cb77910c3b9726c6b1fd2e873af6fbdd
                       a1203983b8c5b472d8905446fd65fb3336ac35ac
                       b984fd4cba37b86723c4bd5b0db2d4d8dc4b519f
                       31fbd7b777b91e33bd9d51667745018400981fb7
                       917490f1ea2be94a4c4617c589fe541cff284bd0
                       c5ef8eecbaf324a7cd623641427b45fd0051b8e1
                       1f12fdbdc666979d43caa03181bc42acf10387f4
                       0b0a271cc3dc7124ae2e5a1696d67461902e2363
                       3444abe7d70b9eb6f40215d54bdafa0307a2632d
                       6710055f4a71a738fdc3879416b87e7fe48ee5dd
                       69f734394055a6482f27104c55f3ada5745628bd
                       9921fdc00a9b60d0687c2822c6a1b5ee35f839b3
                       b829815ac751574b4531a4380ba312d10831a70c
                       8aaf4244
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [6e:a9:f3:dd:d2:5a:6b:2d:46:93:b0:b1:b4:df:78:05:99:6d:29:62]
            modulus: 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
    public exponent: 10001

] 
2022-06-06 10:56:29.637  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-06 10:56:29.640 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-06 10:56:29.643 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-06-06 10:56:29.645 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-06 10:56:29.645  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-06-06 10:56:29.646  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-06 10:56:29.647  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-06 10:56:29.648 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-06 10:56:29.648 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-06 10:56:29.649 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-06 10:56:29.656 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-06 10:56:29.657 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-06 10:56:29.658 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-06 10:56:29.658 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-06 10:56:29.848  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-06 10:56:29.849  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-06 10:56:29.849 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-06 10:56:29.850 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-06 10:56:29.851  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-06 10:56:29.852  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-06 10:56:29.852 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-06 10:56:29.852 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-06 10:56:29.853 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-06 10:56:29.853 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-06 10:56:29.854 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-06 10:56:29.855 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-06 10:56:29.856 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-06 10:56:29.856 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-06 10:56:29.857 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-06 10:56:29.857 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-06 10:56:29.862 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 285111743824466046918790149707875083774914000257
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Jun 06 08:27:52 UTC 2022
           Final Date: Sat Jun 05 08:27:51 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [5d:7c:f0:e7:34:fd:92:46:c8:d0:b6:3a:ce:91:ad:54:a9:2a:c3:c3]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3dce4f94a08a64ecad4f389b63ce421d634cae5a
                       abff9206578dad2d594caca77720eb8ef4e25284
                       bd837c468b55d210ee83889bf5cef4f1465340d1
                       295d1bbc2c18d236d92adc45069ddd4ab148e034
                       31e089327b571548a25dddcee73adca258fc0ff5
                       3a8c8a4b5e9b619a388ac24e4de98b7050d55fcc
                       7137c582cb77910c3b9726c6b1fd2e873af6fbdd
                       a1203983b8c5b472d8905446fd65fb3336ac35ac
                       b984fd4cba37b86723c4bd5b0db2d4d8dc4b519f
                       31fbd7b777b91e33bd9d51667745018400981fb7
                       917490f1ea2be94a4c4617c589fe541cff284bd0
                       c5ef8eecbaf324a7cd623641427b45fd0051b8e1
                       1f12fdbdc666979d43caa03181bc42acf10387f4
                       0b0a271cc3dc7124ae2e5a1696d67461902e2363
                       3444abe7d70b9eb6f40215d54bdafa0307a2632d
                       6710055f4a71a738fdc3879416b87e7fe48ee5dd
                       69f734394055a6482f27104c55f3ada5745628bd
                       9921fdc00a9b60d0687c2822c6a1b5ee35f839b3
                       b829815ac751574b4531a4380ba312d10831a70c
                       8aaf4244
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [c0:28:7f:8e:9c:6c:bc:c6:9b:c7:51:bf:10:99:9a:4a:81:a4:a1:5c]
            modulus: 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
    public exponent: 10001

] 
2022-06-06 10:56:44.319  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-06 10:56:44.321 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-06 10:56:44.323 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-06-06 10:56:44.323 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-06 10:56:44.324  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-06-06 10:56:44.325  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-06 10:56:44.325  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-06 10:56:44.326 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-06 10:56:44.326 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-06 10:56:44.327 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-06 10:56:44.332 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-06 10:56:44.347 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-06 10:56:44.348 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-06 10:56:44.348 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-06 10:56:44.488  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-06 10:56:44.489  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-06 10:56:44.490 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-06 10:56:44.490 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-06 10:56:44.492  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-06 10:56:44.492  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-06 10:56:44.493 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-06 10:56:44.493 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-06 10:56:44.494 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-06 10:56:44.495 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-06 10:56:44.495 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-06 10:56:44.496 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-06 10:56:44.498 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-06 10:56:44.499 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-06 10:56:44.499 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-06 10:56:44.501 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-06 10:56:44.506 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 285111743824466046918790149707875083774914000257
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Jun 06 08:27:52 UTC 2022
           Final Date: Sat Jun 05 08:27:51 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [5d:7c:f0:e7:34:fd:92:46:c8:d0:b6:3a:ce:91:ad:54:a9:2a:c3:c3]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3dce4f94a08a64ecad4f389b63ce421d634cae5a
                       abff9206578dad2d594caca77720eb8ef4e25284
                       bd837c468b55d210ee83889bf5cef4f1465340d1
                       295d1bbc2c18d236d92adc45069ddd4ab148e034
                       31e089327b571548a25dddcee73adca258fc0ff5
                       3a8c8a4b5e9b619a388ac24e4de98b7050d55fcc
                       7137c582cb77910c3b9726c6b1fd2e873af6fbdd
                       a1203983b8c5b472d8905446fd65fb3336ac35ac
                       b984fd4cba37b86723c4bd5b0db2d4d8dc4b519f
                       31fbd7b777b91e33bd9d51667745018400981fb7
                       917490f1ea2be94a4c4617c589fe541cff284bd0
                       c5ef8eecbaf324a7cd623641427b45fd0051b8e1
                       1f12fdbdc666979d43caa03181bc42acf10387f4
                       0b0a271cc3dc7124ae2e5a1696d67461902e2363
                       3444abe7d70b9eb6f40215d54bdafa0307a2632d
                       6710055f4a71a738fdc3879416b87e7fe48ee5dd
                       69f734394055a6482f27104c55f3ada5745628bd
                       9921fdc00a9b60d0687c2822c6a1b5ee35f839b3
                       b829815ac751574b4531a4380ba312d10831a70c
                       8aaf4244
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [c2:77:3e:20:f1:8d:43:0a:f2:7e:eb:ca:a7:c5:c0:23:70:f6:13:3c]
            modulus: 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
    public exponent: 10001

]