Results

By type

          2022-09-25 02:42:16,091 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-09-25 02:42:16,944 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-09-25 02:42:17.763  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Sep 25, 2022 2:42:19 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Sep 25, 2022 2:42:19 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Sep 25, 2022 2:42:19 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Sep 25, 2022 2:42:19 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-09-25 02:42:20.179 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-09-25 02:42:20.465  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-09-25 02:42:20.692  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-09-25 02:42:21.465 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-09-25 02:42:21.468 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
2022-09-25 02:42:21.469 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-09-25 02:42:21.473 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-09-25 02:42:21.512 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2022-09-25 02:42:21.515 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/docs]}: redirectToUi(HttpServletRequest)
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
2022-09-25 02:42:21.641 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-09-25 02:42:22.314 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Sep 25, 2022 2:42:23 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-09-25 02:42:23.267  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 7.907 seconds (JVM running for 9.636)
Sep 25, 2022 2:42:45 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-09-25 02:43:00.792  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-09-25 02:43:00.803 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-09-25 02:43:00.844 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-09-25 02:43:00.848 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-09-25 02:43:00.867  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-09-25 02:43:00.870  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-09-25 02:43:00.872  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-09-25 02:43:00.873 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-09-25 02:43:00.873 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-09-25 02:43:00.878 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-09-25 02:43:00.883 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-09-25 02:43:00.887 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-09-25 02:43:00.934 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-09-25 02:43:00.939 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-09-25 02:43:00.940 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-09-25 02:43:00.943 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-09-25 02:43:01.533  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-09-25 02:43:01.535  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-09-25 02:43:01.536 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-09-25 02:43:01.537 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-09-25 02:43:01.549  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-09-25 02:43:01.550  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-09-25 02:43:01.551 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-09-25 02:43:01.552 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-09-25 02:43:01.552 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-09-25 02:43:01.565 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-09-25 02:43:01.565 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-09-25 02:43:01.566 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-09-25 02:43:01.574 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-09-25 02:43:01.574 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-09-25 02:43:01.575 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-09-25 02:43:01.577 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-09-25 02:43:01.611 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 311348036075959628201110545139150291566400049691
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Sep 25 02:40:15 UTC 2022
           Final Date: Fri Sep 24 02:40:14 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [30:b4:a4:75:da:56:fa:57:b3:51:69:03:aa:27:24:89:53:79:26:70]
            modulus: d43b107d76c078d42a48a4f597a20bf3fbf5929b27a4c71021f546d10485f56de548e89f7260870988739eb1259863fad3e2297d9254726bbc9770a55424655515ce62b5b9ce71b6b3576c7228f126c34486858670a2b3dcab6e4a9175d9662b5d101585e6623b7519963872b140137e88543b2f33eed3a7619d539289c3512d3b50f20a3dd9a601f2e7710dd448b45e261d6ffccbe5b04421e3476c8c2bbe13992cc3a4632f2e153fe56625fbde5922093d47c4e108a8503fa04d7ff4e9dab9abf13672b135bdf66e6d2e090c6ab24ecf642e64cd867f7641096d2fe494f8545a129e405d6865ce6e6697d6b2c02de50318d7317dd2c5fac88571f29dc5a1310c4ba25d4e84a637250c39c2c644376319efd3d24e1043ef2c05a4870586b4efbd492ca3f0dbd109182be753ea6a3275365838c1f50a6402aa8b9a3a6de25cfa149673ec1c8a0a9abcadabac9f9422ae234a12431e519a909d7d1a684a1f12e542182c5209d77f8331b00c5cca5e4be2640778fe5a63463a6dcbbbc8de59e1cf
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3475a497857c953e3e7c2e4a219b758ee0943d14
                       af11300663fa08f966610c8b40b21d9dcf08da8b
                       15377755f928a890c75f97434f8d03c435edbeb0
                       7283e1033ad2e4a59c56f196ca83aad5425e5c84
                       da0c8865bcf927e08d2075c44e5340269e85e9f0
                       754232ca10df8c28442959d548b226f5a292b404
                       933829be63ff9194f88b89cb2dcd11f1aea77082
                       3a3ccfda0b33e36f1d4c6b9c55fc6c131f4c0cf8
                       77e5836c9459df6388cde9cf5de94cd74da6bdfb
                       2cdad92e44f8c7c0eb29d351911288094fcbb44c
                       b0db9921de6c3f85a982da4e124b45965040bfaa
                       d20854bd03d23433ced328023a8ed7e493e51385
                       f0c359b22f7ccfc1e522a85ea03073bc4a18d246
                       988210dc1c217bd0daa3b3a9f55c150816480583
                       f3d6169ba0db23ed99220301a2ced876fd3f5163
                       fde83e0f348c45759a1ace8c4ce6c2a7402a1408
                       367ca0278a389f192eb8deda0564520b3d12569e
                       97bad07e1a230b3756229a95a3d5241fc8ef0b07
                       dee7d620bb4746facf3cb1674d2791b88135e01b
                       da3449fb
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [7d:5a:31:52:76:9c:e6:49:37:65:3d:7d:ca:b7:89:25:73:3b:64:70]
            modulus: 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
    public exponent: 10001

] 
2022-09-25 03:53:34.037  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-09-25 03:53:34.041 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-09-25 03:53:34.044 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-09-25 03:53:34.045 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-09-25 03:53:34.046  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-09-25 03:53:34.047  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-09-25 03:53:34.047  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-09-25 03:53:34.048 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-09-25 03:53:34.048 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-09-25 03:53:34.049 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-09-25 03:53:34.060 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-09-25 03:53:34.061 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-09-25 03:53:34.062 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-09-25 03:53:34.062 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-09-25 03:53:34.260  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-09-25 03:53:34.261  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-09-25 03:53:34.262 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-09-25 03:53:34.262 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-09-25 03:53:34.265  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-09-25 03:53:34.266  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-09-25 03:53:34.266 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-09-25 03:53:34.267 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-09-25 03:53:34.267 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-09-25 03:53:34.268 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-09-25 03:53:34.269 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-09-25 03:53:34.269 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-09-25 03:53:34.271 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-09-25 03:53:34.272 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-09-25 03:53:34.272 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-09-25 03:53:34.274 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-09-25 03:53:34.282 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 311348036075959628201110545139150291566400049691
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Sep 25 02:40:15 UTC 2022
           Final Date: Fri Sep 24 02:40:14 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [30:b4:a4:75:da:56:fa:57:b3:51:69:03:aa:27:24:89:53:79:26:70]
            modulus: d43b107d76c078d42a48a4f597a20bf3fbf5929b27a4c71021f546d10485f56de548e89f7260870988739eb1259863fad3e2297d9254726bbc9770a55424655515ce62b5b9ce71b6b3576c7228f126c34486858670a2b3dcab6e4a9175d9662b5d101585e6623b7519963872b140137e88543b2f33eed3a7619d539289c3512d3b50f20a3dd9a601f2e7710dd448b45e261d6ffccbe5b04421e3476c8c2bbe13992cc3a4632f2e153fe56625fbde5922093d47c4e108a8503fa04d7ff4e9dab9abf13672b135bdf66e6d2e090c6ab24ecf642e64cd867f7641096d2fe494f8545a129e405d6865ce6e6697d6b2c02de50318d7317dd2c5fac88571f29dc5a1310c4ba25d4e84a637250c39c2c644376319efd3d24e1043ef2c05a4870586b4efbd492ca3f0dbd109182be753ea6a3275365838c1f50a6402aa8b9a3a6de25cfa149673ec1c8a0a9abcadabac9f9422ae234a12431e519a909d7d1a684a1f12e542182c5209d77f8331b00c5cca5e4be2640778fe5a63463a6dcbbbc8de59e1cf
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3475a497857c953e3e7c2e4a219b758ee0943d14
                       af11300663fa08f966610c8b40b21d9dcf08da8b
                       15377755f928a890c75f97434f8d03c435edbeb0
                       7283e1033ad2e4a59c56f196ca83aad5425e5c84
                       da0c8865bcf927e08d2075c44e5340269e85e9f0
                       754232ca10df8c28442959d548b226f5a292b404
                       933829be63ff9194f88b89cb2dcd11f1aea77082
                       3a3ccfda0b33e36f1d4c6b9c55fc6c131f4c0cf8
                       77e5836c9459df6388cde9cf5de94cd74da6bdfb
                       2cdad92e44f8c7c0eb29d351911288094fcbb44c
                       b0db9921de6c3f85a982da4e124b45965040bfaa
                       d20854bd03d23433ced328023a8ed7e493e51385
                       f0c359b22f7ccfc1e522a85ea03073bc4a18d246
                       988210dc1c217bd0daa3b3a9f55c150816480583
                       f3d6169ba0db23ed99220301a2ced876fd3f5163
                       fde83e0f348c45759a1ace8c4ce6c2a7402a1408
                       367ca0278a389f192eb8deda0564520b3d12569e
                       97bad07e1a230b3756229a95a3d5241fc8ef0b07
                       dee7d620bb4746facf3cb1674d2791b88135e01b
                       da3449fb
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [4d:9e:e4:32:c5:07:82:55:ca:6c:f9:f4:08:02:f5:a6:f3:98:70:4d]
            modulus: b49d8cef754f8e0cd829d28e3bf3c03cb95eea78233da426b7d83ca75694019b2c822da5653a9af7fcf60e93d35d99ac862404818f2ce598d722958520c25b96c789834f4d7c02719c37c98fcb0dce38d68a2455be91c1fb8c5eca7a6907ae5eb1590ca9db89c231bbda0e003722eb88ef7c70081826e0314835252d7c66ae7c42ab81393e2c2578d0e3ba7d504ef672738c7e34fd152112cc914ac4e09bc762b4ec71af3d5e933893b0f9873f72c07fade02b8c57245efe04ad98ba95439c922a04c394ef605118556c2e506ff82e2db4e29e1ab220c1896582d3f67f954d96156a7ebb98d90d51a83a0271464db29734ca0436ef084c19265c992d485a097d
    public exponent: 10001

] 
2022-09-25 03:55:17.542  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-09-25 03:55:17.547 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-09-25 03:55:17.550 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-09-25 03:55:17.552 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-09-25 03:55:17.553  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-09-25 03:55:17.555  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-09-25 03:55:17.556  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-09-25 03:55:17.557 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-09-25 03:55:17.557 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-09-25 03:55:17.559 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-09-25 03:55:17.567 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-09-25 03:55:17.568 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-09-25 03:55:17.569 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-09-25 03:55:17.569 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-09-25 03:55:17.715  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-09-25 03:55:17.716  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-09-25 03:55:17.717 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-09-25 03:55:17.717 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-09-25 03:55:17.721  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-09-25 03:55:17.721  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-09-25 03:55:17.722 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-09-25 03:55:17.722 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-09-25 03:55:17.723 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-09-25 03:55:17.724 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-09-25 03:55:17.725 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-09-25 03:55:17.725 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-09-25 03:55:17.727 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-09-25 03:55:17.727 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-09-25 03:55:17.728 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-09-25 03:55:17.730 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-09-25 03:55:17.738 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 311348036075959628201110545139150291566400049691
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Sep 25 02:40:15 UTC 2022
           Final Date: Fri Sep 24 02:40:14 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [30:b4:a4:75:da:56:fa:57:b3:51:69:03:aa:27:24:89:53:79:26:70]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3475a497857c953e3e7c2e4a219b758ee0943d14
                       af11300663fa08f966610c8b40b21d9dcf08da8b
                       15377755f928a890c75f97434f8d03c435edbeb0
                       7283e1033ad2e4a59c56f196ca83aad5425e5c84
                       da0c8865bcf927e08d2075c44e5340269e85e9f0
                       754232ca10df8c28442959d548b226f5a292b404
                       933829be63ff9194f88b89cb2dcd11f1aea77082
                       3a3ccfda0b33e36f1d4c6b9c55fc6c131f4c0cf8
                       77e5836c9459df6388cde9cf5de94cd74da6bdfb
                       2cdad92e44f8c7c0eb29d351911288094fcbb44c
                       b0db9921de6c3f85a982da4e124b45965040bfaa
                       d20854bd03d23433ced328023a8ed7e493e51385
                       f0c359b22f7ccfc1e522a85ea03073bc4a18d246
                       988210dc1c217bd0daa3b3a9f55c150816480583
                       f3d6169ba0db23ed99220301a2ced876fd3f5163
                       fde83e0f348c45759a1ace8c4ce6c2a7402a1408
                       367ca0278a389f192eb8deda0564520b3d12569e
                       97bad07e1a230b3756229a95a3d5241fc8ef0b07
                       dee7d620bb4746facf3cb1674d2791b88135e01b
                       da3449fb
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [63:9c:7d:5c:e3:b8:5a:ee:42:e3:91:13:7e:1a:6c:74:68:0e:1a:0e]
            modulus: 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
    public exponent: 10001

] 
2022-09-25 03:56:57.689  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-09-25 03:56:57.691 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-09-25 03:56:57.692 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-09-25 03:56:57.693 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-09-25 03:56:57.694  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-09-25 03:56:57.694  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-09-25 03:56:57.695  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-09-25 03:56:57.695 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-09-25 03:56:57.696 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-09-25 03:56:57.696 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-09-25 03:56:57.701 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-09-25 03:56:57.702 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-09-25 03:56:57.702 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-09-25 03:56:57.703 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-09-25 03:56:57.874  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-09-25 03:56:57.875  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-09-25 03:56:57.875 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-09-25 03:56:57.876 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-09-25 03:56:57.878  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-09-25 03:56:57.879  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-09-25 03:56:57.880 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-09-25 03:56:57.880 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-09-25 03:56:57.881 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-09-25 03:56:57.881 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-09-25 03:56:57.882 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-09-25 03:56:57.883 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-09-25 03:56:57.884 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-09-25 03:56:57.884 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-09-25 03:56:57.884 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-09-25 03:56:57.885 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-09-25 03:56:57.890 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 311348036075959628201110545139150291566400049691
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Sep 25 02:40:15 UTC 2022
           Final Date: Fri Sep 24 02:40:14 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [30:b4:a4:75:da:56:fa:57:b3:51:69:03:aa:27:24:89:53:79:26:70]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3475a497857c953e3e7c2e4a219b758ee0943d14
                       af11300663fa08f966610c8b40b21d9dcf08da8b
                       15377755f928a890c75f97434f8d03c435edbeb0
                       7283e1033ad2e4a59c56f196ca83aad5425e5c84
                       da0c8865bcf927e08d2075c44e5340269e85e9f0
                       754232ca10df8c28442959d548b226f5a292b404
                       933829be63ff9194f88b89cb2dcd11f1aea77082
                       3a3ccfda0b33e36f1d4c6b9c55fc6c131f4c0cf8
                       77e5836c9459df6388cde9cf5de94cd74da6bdfb
                       2cdad92e44f8c7c0eb29d351911288094fcbb44c
                       b0db9921de6c3f85a982da4e124b45965040bfaa
                       d20854bd03d23433ced328023a8ed7e493e51385
                       f0c359b22f7ccfc1e522a85ea03073bc4a18d246
                       988210dc1c217bd0daa3b3a9f55c150816480583
                       f3d6169ba0db23ed99220301a2ced876fd3f5163
                       fde83e0f348c45759a1ace8c4ce6c2a7402a1408
                       367ca0278a389f192eb8deda0564520b3d12569e
                       97bad07e1a230b3756229a95a3d5241fc8ef0b07
                       dee7d620bb4746facf3cb1674d2791b88135e01b
                       da3449fb
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [a3:19:24:b0:e0:6c:8c:70:ff:d6:44:35:34:96:f2:92:2f:8c:fc:3a]
            modulus: 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
    public exponent: 10001

] 
2022-09-25 03:58:49.214  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-09-25 03:58:49.215 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-09-25 03:58:49.217 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-09-25 03:58:49.218 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-09-25 03:58:49.219  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-09-25 03:58:49.220  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-09-25 03:58:49.221  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-09-25 03:58:49.221 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-09-25 03:58:49.221 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-09-25 03:58:49.222 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-09-25 03:58:49.227 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-09-25 03:58:49.227 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-09-25 03:58:49.228 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-09-25 03:58:49.228 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-09-25 03:58:49.401  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-09-25 03:58:49.402  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-09-25 03:58:49.402 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-09-25 03:58:49.403 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-09-25 03:58:49.404  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-09-25 03:58:49.405  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-09-25 03:58:49.405 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-09-25 03:58:49.406 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-09-25 03:58:49.406 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-09-25 03:58:49.407 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-09-25 03:58:49.407 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-09-25 03:58:49.407 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-09-25 03:58:49.408 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-09-25 03:58:49.409 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-09-25 03:58:49.409 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-09-25 03:58:49.410 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-09-25 03:58:49.414 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 311348036075959628201110545139150291566400049691
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Sep 25 02:40:15 UTC 2022
           Final Date: Fri Sep 24 02:40:14 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [30:b4:a4:75:da:56:fa:57:b3:51:69:03:aa:27:24:89:53:79:26:70]
            modulus: d43b107d76c078d42a48a4f597a20bf3fbf5929b27a4c71021f546d10485f56de548e89f7260870988739eb1259863fad3e2297d9254726bbc9770a55424655515ce62b5b9ce71b6b3576c7228f126c34486858670a2b3dcab6e4a9175d9662b5d101585e6623b7519963872b140137e88543b2f33eed3a7619d539289c3512d3b50f20a3dd9a601f2e7710dd448b45e261d6ffccbe5b04421e3476c8c2bbe13992cc3a4632f2e153fe56625fbde5922093d47c4e108a8503fa04d7ff4e9dab9abf13672b135bdf66e6d2e090c6ab24ecf642e64cd867f7641096d2fe494f8545a129e405d6865ce6e6697d6b2c02de50318d7317dd2c5fac88571f29dc5a1310c4ba25d4e84a637250c39c2c644376319efd3d24e1043ef2c05a4870586b4efbd492ca3f0dbd109182be753ea6a3275365838c1f50a6402aa8b9a3a6de25cfa149673ec1c8a0a9abcadabac9f9422ae234a12431e519a909d7d1a684a1f12e542182c5209d77f8331b00c5cca5e4be2640778fe5a63463a6dcbbbc8de59e1cf
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3475a497857c953e3e7c2e4a219b758ee0943d14
                       af11300663fa08f966610c8b40b21d9dcf08da8b
                       15377755f928a890c75f97434f8d03c435edbeb0
                       7283e1033ad2e4a59c56f196ca83aad5425e5c84
                       da0c8865bcf927e08d2075c44e5340269e85e9f0
                       754232ca10df8c28442959d548b226f5a292b404
                       933829be63ff9194f88b89cb2dcd11f1aea77082
                       3a3ccfda0b33e36f1d4c6b9c55fc6c131f4c0cf8
                       77e5836c9459df6388cde9cf5de94cd74da6bdfb
                       2cdad92e44f8c7c0eb29d351911288094fcbb44c
                       b0db9921de6c3f85a982da4e124b45965040bfaa
                       d20854bd03d23433ced328023a8ed7e493e51385
                       f0c359b22f7ccfc1e522a85ea03073bc4a18d246
                       988210dc1c217bd0daa3b3a9f55c150816480583
                       f3d6169ba0db23ed99220301a2ced876fd3f5163
                       fde83e0f348c45759a1ace8c4ce6c2a7402a1408
                       367ca0278a389f192eb8deda0564520b3d12569e
                       97bad07e1a230b3756229a95a3d5241fc8ef0b07
                       dee7d620bb4746facf3cb1674d2791b88135e01b
                       da3449fb
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [94:e4:ae:a0:07:ce:4d:f9:49:78:01:54:8f:a1:58:9a:72:d9:55:59]
            modulus: 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
    public exponent: 10001

] 
2022-09-25 04:05:13.278  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-09-25 04:05:13.284 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-09-25 04:05:13.287 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-09-25 04:05:13.288 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-09-25 04:05:13.288  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-09-25 04:05:13.291  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-09-25 04:05:13.292  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-09-25 04:05:13.292 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-09-25 04:05:13.293 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-09-25 04:05:13.294 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-09-25 04:05:13.301 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-09-25 04:05:13.302 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-09-25 04:05:13.302 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-09-25 04:05:13.303 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-09-25 04:05:13.470  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-09-25 04:05:13.471  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-09-25 04:05:13.471 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-09-25 04:05:13.472 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-09-25 04:05:13.473  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-09-25 04:05:13.474  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-09-25 04:05:13.475 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-09-25 04:05:13.475 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-09-25 04:05:13.475 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-09-25 04:05:13.477 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-09-25 04:05:13.477 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-09-25 04:05:13.478 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-09-25 04:05:13.479 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-09-25 04:05:13.479 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-09-25 04:05:13.480 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-09-25 04:05:13.481 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-09-25 04:05:13.486 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 311348036075959628201110545139150291566400049691
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Sep 25 02:40:15 UTC 2022
           Final Date: Fri Sep 24 02:40:14 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [30:b4:a4:75:da:56:fa:57:b3:51:69:03:aa:27:24:89:53:79:26:70]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3475a497857c953e3e7c2e4a219b758ee0943d14
                       af11300663fa08f966610c8b40b21d9dcf08da8b
                       15377755f928a890c75f97434f8d03c435edbeb0
                       7283e1033ad2e4a59c56f196ca83aad5425e5c84
                       da0c8865bcf927e08d2075c44e5340269e85e9f0
                       754232ca10df8c28442959d548b226f5a292b404
                       933829be63ff9194f88b89cb2dcd11f1aea77082
                       3a3ccfda0b33e36f1d4c6b9c55fc6c131f4c0cf8
                       77e5836c9459df6388cde9cf5de94cd74da6bdfb
                       2cdad92e44f8c7c0eb29d351911288094fcbb44c
                       b0db9921de6c3f85a982da4e124b45965040bfaa
                       d20854bd03d23433ced328023a8ed7e493e51385
                       f0c359b22f7ccfc1e522a85ea03073bc4a18d246
                       988210dc1c217bd0daa3b3a9f55c150816480583
                       f3d6169ba0db23ed99220301a2ced876fd3f5163
                       fde83e0f348c45759a1ace8c4ce6c2a7402a1408
                       367ca0278a389f192eb8deda0564520b3d12569e
                       97bad07e1a230b3756229a95a3d5241fc8ef0b07
                       dee7d620bb4746facf3cb1674d2791b88135e01b
                       da3449fb
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [46:1a:63:3d:88:74:89:b3:0d:db:33:93:35:0b:8d:14:c2:09:94:61]
            modulus: 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
    public exponent: 10001

] 
2022-09-25 04:09:12.601  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-09-25 04:09:12.604 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-09-25 04:09:12.605 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-09-25 04:09:12.606 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-09-25 04:09:12.609  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-09-25 04:09:12.609  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-09-25 04:09:12.610  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-09-25 04:09:12.610 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-09-25 04:09:12.611 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-09-25 04:09:12.611 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-09-25 04:09:12.622 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-09-25 04:09:12.623 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-09-25 04:09:12.623 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-09-25 04:09:12.623 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-09-25 04:09:12.748  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-09-25 04:09:12.749  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-09-25 04:09:12.749 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-09-25 04:09:12.750 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-09-25 04:09:12.753  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-09-25 04:09:12.753  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-09-25 04:09:12.754 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-09-25 04:09:12.754 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-09-25 04:09:12.754 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-09-25 04:09:12.755 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-09-25 04:09:12.755 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-09-25 04:09:12.756 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-09-25 04:09:12.756 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-09-25 04:09:12.757 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-09-25 04:09:12.757 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-09-25 04:09:12.758 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-09-25 04:09:12.761 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 311348036075959628201110545139150291566400049691
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Sep 25 02:40:15 UTC 2022
           Final Date: Fri Sep 24 02:40:14 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [30:b4:a4:75:da:56:fa:57:b3:51:69:03:aa:27:24:89:53:79:26:70]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3475a497857c953e3e7c2e4a219b758ee0943d14
                       af11300663fa08f966610c8b40b21d9dcf08da8b
                       15377755f928a890c75f97434f8d03c435edbeb0
                       7283e1033ad2e4a59c56f196ca83aad5425e5c84
                       da0c8865bcf927e08d2075c44e5340269e85e9f0
                       754232ca10df8c28442959d548b226f5a292b404
                       933829be63ff9194f88b89cb2dcd11f1aea77082
                       3a3ccfda0b33e36f1d4c6b9c55fc6c131f4c0cf8
                       77e5836c9459df6388cde9cf5de94cd74da6bdfb
                       2cdad92e44f8c7c0eb29d351911288094fcbb44c
                       b0db9921de6c3f85a982da4e124b45965040bfaa
                       d20854bd03d23433ced328023a8ed7e493e51385
                       f0c359b22f7ccfc1e522a85ea03073bc4a18d246
                       988210dc1c217bd0daa3b3a9f55c150816480583
                       f3d6169ba0db23ed99220301a2ced876fd3f5163
                       fde83e0f348c45759a1ace8c4ce6c2a7402a1408
                       367ca0278a389f192eb8deda0564520b3d12569e
                       97bad07e1a230b3756229a95a3d5241fc8ef0b07
                       dee7d620bb4746facf3cb1674d2791b88135e01b
                       da3449fb
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [73:33:a6:8a:8b:72:e3:e3:38:6e:c4:de:3e:19:5c:b3:1b:4b:ed:bf]
            modulus: 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
    public exponent: 10001

] 
2022-09-25 04:15:22.709  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-09-25 04:15:22.712 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-09-25 04:15:22.714 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-09-25 04:15:22.715 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-09-25 04:15:22.715  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-09-25 04:15:22.718  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-09-25 04:15:22.719  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-09-25 04:15:22.719 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-09-25 04:15:22.720 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-09-25 04:15:22.720 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-09-25 04:15:22.726 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-09-25 04:15:22.727 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-09-25 04:15:22.727 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-09-25 04:15:22.728 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-09-25 04:15:22.906  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-09-25 04:15:22.906  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-09-25 04:15:22.907 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-09-25 04:15:22.907 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-09-25 04:15:22.909  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-09-25 04:15:22.910  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-09-25 04:15:22.910 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-09-25 04:15:22.911 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-09-25 04:15:22.911 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-09-25 04:15:22.912 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-09-25 04:15:22.913 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-09-25 04:15:22.913 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-09-25 04:15:22.914 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-09-25 04:15:22.914 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-09-25 04:15:22.915 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-09-25 04:15:22.916 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-09-25 04:15:22.922 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 311348036075959628201110545139150291566400049691
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Sep 25 02:40:15 UTC 2022
           Final Date: Fri Sep 24 02:40:14 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [30:b4:a4:75:da:56:fa:57:b3:51:69:03:aa:27:24:89:53:79:26:70]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3475a497857c953e3e7c2e4a219b758ee0943d14
                       af11300663fa08f966610c8b40b21d9dcf08da8b
                       15377755f928a890c75f97434f8d03c435edbeb0
                       7283e1033ad2e4a59c56f196ca83aad5425e5c84
                       da0c8865bcf927e08d2075c44e5340269e85e9f0
                       754232ca10df8c28442959d548b226f5a292b404
                       933829be63ff9194f88b89cb2dcd11f1aea77082
                       3a3ccfda0b33e36f1d4c6b9c55fc6c131f4c0cf8
                       77e5836c9459df6388cde9cf5de94cd74da6bdfb
                       2cdad92e44f8c7c0eb29d351911288094fcbb44c
                       b0db9921de6c3f85a982da4e124b45965040bfaa
                       d20854bd03d23433ced328023a8ed7e493e51385
                       f0c359b22f7ccfc1e522a85ea03073bc4a18d246
                       988210dc1c217bd0daa3b3a9f55c150816480583
                       f3d6169ba0db23ed99220301a2ced876fd3f5163
                       fde83e0f348c45759a1ace8c4ce6c2a7402a1408
                       367ca0278a389f192eb8deda0564520b3d12569e
                       97bad07e1a230b3756229a95a3d5241fc8ef0b07
                       dee7d620bb4746facf3cb1674d2791b88135e01b
                       da3449fb
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [b9:e8:a1:5b:c1:0c:1a:2a:18:ca:c3:9a:e2:11:b6:df:38:9f:0f:c9]
            modulus: daa98432fe2e1c8994568d68333faf498450b241db6871cfad05c024330e0984c3ff3d4d402c607f400399e3d99857f1a08b9b8dd0b707810bc0eb359eda05a830c315453b907909ffd9e3d1887c50dc7634dca314f904c04bdc55dbb4377aa7a0184e7e05390015181a0444bd716b21fa66bb1f98f9237ab4e0e579ea32e1725c08555a2ae703c94e3faa2047661dc43073670e123462059f7c9c85500eaec5d2f6c9114989b7835b713d1fc5054376a3d3cb53b8c96ac7b403614a9eb9b3fdf6199e38e09d4d18a08313a62e674e812994d78003981305547fc5b6b5c5030c9c6a6e568523223a8bf5dac2db56ee5f11f74cd51a0a5ab72f08ef1a497a3171
    public exponent: 10001

] 
2022-09-25 04:19:54.772  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-09-25 04:19:54.778 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-09-25 04:19:54.781 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-09-25 04:19:54.782 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-09-25 04:19:54.783  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-09-25 04:19:54.784  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-09-25 04:19:54.784  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-09-25 04:19:54.785 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-09-25 04:19:54.785 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-09-25 04:19:54.786 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-09-25 04:19:54.792 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-09-25 04:19:54.794 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-09-25 04:19:54.794 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-09-25 04:19:54.794 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-09-25 04:19:54.973  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-09-25 04:19:54.974  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-09-25 04:19:54.974 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-09-25 04:19:54.975 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-09-25 04:19:54.976  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-09-25 04:19:54.977  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-09-25 04:19:54.977 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-09-25 04:19:54.977 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-09-25 04:19:54.978 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-09-25 04:19:54.978 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-09-25 04:19:54.979 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-09-25 04:19:54.979 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-09-25 04:19:54.980 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-09-25 04:19:54.980 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-09-25 04:19:54.981 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-09-25 04:19:54.982 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-09-25 04:19:54.986 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 311348036075959628201110545139150291566400049691
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Sep 25 02:40:15 UTC 2022
           Final Date: Fri Sep 24 02:40:14 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [30:b4:a4:75:da:56:fa:57:b3:51:69:03:aa:27:24:89:53:79:26:70]
            modulus: d43b107d76c078d42a48a4f597a20bf3fbf5929b27a4c71021f546d10485f56de548e89f7260870988739eb1259863fad3e2297d9254726bbc9770a55424655515ce62b5b9ce71b6b3576c7228f126c34486858670a2b3dcab6e4a9175d9662b5d101585e6623b7519963872b140137e88543b2f33eed3a7619d539289c3512d3b50f20a3dd9a601f2e7710dd448b45e261d6ffccbe5b04421e3476c8c2bbe13992cc3a4632f2e153fe56625fbde5922093d47c4e108a8503fa04d7ff4e9dab9abf13672b135bdf66e6d2e090c6ab24ecf642e64cd867f7641096d2fe494f8545a129e405d6865ce6e6697d6b2c02de50318d7317dd2c5fac88571f29dc5a1310c4ba25d4e84a637250c39c2c644376319efd3d24e1043ef2c05a4870586b4efbd492ca3f0dbd109182be753ea6a3275365838c1f50a6402aa8b9a3a6de25cfa149673ec1c8a0a9abcadabac9f9422ae234a12431e519a909d7d1a684a1f12e542182c5209d77f8331b00c5cca5e4be2640778fe5a63463a6dcbbbc8de59e1cf
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3475a497857c953e3e7c2e4a219b758ee0943d14
                       af11300663fa08f966610c8b40b21d9dcf08da8b
                       15377755f928a890c75f97434f8d03c435edbeb0
                       7283e1033ad2e4a59c56f196ca83aad5425e5c84
                       da0c8865bcf927e08d2075c44e5340269e85e9f0
                       754232ca10df8c28442959d548b226f5a292b404
                       933829be63ff9194f88b89cb2dcd11f1aea77082
                       3a3ccfda0b33e36f1d4c6b9c55fc6c131f4c0cf8
                       77e5836c9459df6388cde9cf5de94cd74da6bdfb
                       2cdad92e44f8c7c0eb29d351911288094fcbb44c
                       b0db9921de6c3f85a982da4e124b45965040bfaa
                       d20854bd03d23433ced328023a8ed7e493e51385
                       f0c359b22f7ccfc1e522a85ea03073bc4a18d246
                       988210dc1c217bd0daa3b3a9f55c150816480583
                       f3d6169ba0db23ed99220301a2ced876fd3f5163
                       fde83e0f348c45759a1ace8c4ce6c2a7402a1408
                       367ca0278a389f192eb8deda0564520b3d12569e
                       97bad07e1a230b3756229a95a3d5241fc8ef0b07
                       dee7d620bb4746facf3cb1674d2791b88135e01b
                       da3449fb
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [53:a7:39:b1:6f:0a:f0:ad:b7:36:fa:7a:a9:0c:36:22:4e:26:f8:6a]
            modulus: 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
    public exponent: 10001

] 
2022-09-25 04:20:11.589  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-09-25 04:20:11.590 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-09-25 04:20:11.591 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-09-25 04:20:11.592 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-09-25 04:20:11.592  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-09-25 04:20:11.592  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-09-25 04:20:11.593  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-09-25 04:20:11.593 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-09-25 04:20:11.593 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-09-25 04:20:11.594 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-09-25 04:20:11.599 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-09-25 04:20:11.599 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-09-25 04:20:11.599 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-09-25 04:20:11.600 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-09-25 04:20:11.751  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-09-25 04:20:11.752  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-09-25 04:20:11.752 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-09-25 04:20:11.752 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-09-25 04:20:11.754  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-09-25 04:20:11.754  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-09-25 04:20:11.755 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-09-25 04:20:11.755 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-09-25 04:20:11.755 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-09-25 04:20:11.756 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-09-25 04:20:11.756 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-09-25 04:20:11.756 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-09-25 04:20:11.757 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-09-25 04:20:11.757 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-09-25 04:20:11.757 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-09-25 04:20:11.758 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-09-25 04:20:11.762 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 311348036075959628201110545139150291566400049691
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Sep 25 02:40:15 UTC 2022
           Final Date: Fri Sep 24 02:40:14 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [30:b4:a4:75:da:56:fa:57:b3:51:69:03:aa:27:24:89:53:79:26:70]
            modulus: d43b107d76c078d42a48a4f597a20bf3fbf5929b27a4c71021f546d10485f56de548e89f7260870988739eb1259863fad3e2297d9254726bbc9770a55424655515ce62b5b9ce71b6b3576c7228f126c34486858670a2b3dcab6e4a9175d9662b5d101585e6623b7519963872b140137e88543b2f33eed3a7619d539289c3512d3b50f20a3dd9a601f2e7710dd448b45e261d6ffccbe5b04421e3476c8c2bbe13992cc3a4632f2e153fe56625fbde5922093d47c4e108a8503fa04d7ff4e9dab9abf13672b135bdf66e6d2e090c6ab24ecf642e64cd867f7641096d2fe494f8545a129e405d6865ce6e6697d6b2c02de50318d7317dd2c5fac88571f29dc5a1310c4ba25d4e84a637250c39c2c644376319efd3d24e1043ef2c05a4870586b4efbd492ca3f0dbd109182be753ea6a3275365838c1f50a6402aa8b9a3a6de25cfa149673ec1c8a0a9abcadabac9f9422ae234a12431e519a909d7d1a684a1f12e542182c5209d77f8331b00c5cca5e4be2640778fe5a63463a6dcbbbc8de59e1cf
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3475a497857c953e3e7c2e4a219b758ee0943d14
                       af11300663fa08f966610c8b40b21d9dcf08da8b
                       15377755f928a890c75f97434f8d03c435edbeb0
                       7283e1033ad2e4a59c56f196ca83aad5425e5c84
                       da0c8865bcf927e08d2075c44e5340269e85e9f0
                       754232ca10df8c28442959d548b226f5a292b404
                       933829be63ff9194f88b89cb2dcd11f1aea77082
                       3a3ccfda0b33e36f1d4c6b9c55fc6c131f4c0cf8
                       77e5836c9459df6388cde9cf5de94cd74da6bdfb
                       2cdad92e44f8c7c0eb29d351911288094fcbb44c
                       b0db9921de6c3f85a982da4e124b45965040bfaa
                       d20854bd03d23433ced328023a8ed7e493e51385
                       f0c359b22f7ccfc1e522a85ea03073bc4a18d246
                       988210dc1c217bd0daa3b3a9f55c150816480583
                       f3d6169ba0db23ed99220301a2ced876fd3f5163
                       fde83e0f348c45759a1ace8c4ce6c2a7402a1408
                       367ca0278a389f192eb8deda0564520b3d12569e
                       97bad07e1a230b3756229a95a3d5241fc8ef0b07
                       dee7d620bb4746facf3cb1674d2791b88135e01b
                       da3449fb
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [50:ff:62:c9:20:a4:37:12:ef:f2:a4:8f:02:ca:be:92:54:a9:b4:f8]
            modulus: 9df598c88d2a155e5e942a5b76f1f9e880e743188cc221208d812ab7fa7884d27e426766511ceaf842dcdcc185effd90d815b67b71901cec152c23c494bad3989403de9ade670b32b263adb7f61c7fe5f6116ad69bdfa3166c9e903cc20f5d69d6f663624d005f4ce37c8c07e88c8ee30aad7b2090b9a1874e8a278c47c80062e4029759b1b6db18ac28b1a3231278510d45618edc45bfc2951925f9ccdea593d0887b2792ab1cdd78818180139cc7c61305c8ff04a3ecaf03f08f239016ca16d50d06139931818879e14b02fdfddafa352ddef1438c33e93bb9d44f84f8e9adebaf7b0b5c4d8dbd3a29709197ec517d1dc5b119d449ceea8068991e9711451d
    public exponent: 10001

]