Results

By type

          2022-11-10 02:56:08,419 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-11-10 02:56:09,263 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-11-10 02:56:10.170  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Nov 10, 2022 2:56:12 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Nov 10, 2022 2:56:12 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Nov 10, 2022 2:56:12 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Nov 10, 2022 2:56:12 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-11-10 02:56:12.728 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-11-10 02:56:12.990  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-11-10 02:56:13.149  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-11-10 02:56:13.888 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-11-10 02:56:13.891 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
2022-11-10 02:56:13.892 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-11-10 02:56:13.896 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-11-10 02:56:13.935 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
2022-11-10 02:56:13.938 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/docs]}: redirectToUi(HttpServletRequest)
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
2022-11-10 02:56:14.061 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-11-10 02:56:14.766 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Nov 10, 2022 2:56:15 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-11-10 02:56:15.612  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 7.995 seconds (JVM running for 9.764)
Nov 10, 2022 2:56:42 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-11-10 02:57:01.729  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-10 02:57:01.736 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-10 02:57:01.779 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-11-10 02:57:01.784 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-10 02:57:01.802  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-11-10 02:57:01.804  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-10 02:57:01.805  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-10 02:57:01.806 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-10 02:57:01.807 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-10 02:57:01.811 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-10 02:57:01.817 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-10 02:57:01.824 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-10 02:57:01.858 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-10 02:57:01.863 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-10 02:57:01.863 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-10 02:57:01.866 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-10 02:57:02.455  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-10 02:57:02.458  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-10 02:57:02.458 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-10 02:57:02.460 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-10 02:57:02.469  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-10 02:57:02.470  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-10 02:57:02.471 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-10 02:57:02.471 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-10 02:57:02.472 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-10 02:57:02.484 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-10 02:57:02.484 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-10 02:57:02.485 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-10 02:57:02.491 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-10 02:57:02.491 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-10 02:57:02.492 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-10 02:57:02.493 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-10 02:57:02.523 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 91004947467823869948326835000018548283237995394
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Nov 10 02:53:37 UTC 2022
           Final Date: Tue Nov 09 02:53:36 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f1:4d:1c:b0:17:7f:78:51:d2:6d:0e:ea:f9:f9:f0:67:be:14:23:74]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3bf95fc6fb2cab451f11cfbe5bc5a33e451bf4b1
                       67fea886634766edb6eb608665a28e777343ce63
                       89235fd027c82434c1bfaaf6c64a10f7a7235828
                       3aa54118b310d4cb0d74e6cc6ef3b1c20fbe3120
                       d271475231cdf771e7848423f40552eab5a38e3a
                       30cff1bc0999467f316ae17c3c678bb9640a5796
                       c34c4a01616c893c5a30e83b2c8c90e660ae80cf
                       ad20f2c4846f7075d44cda9a338ea852b73d7fe3
                       3882fb554379df232b60d362d2eb4ccca03761bd
                       71e037097bf5152cacab73e9e0d3b40ce301c8f9
                       00df750f04b668aef8d8bff1655495eebed01c98
                       3e905f003f367547a5a0af807b47417f626885db
                       8b491c6a84dfcfbda978408f880590caf513ad81
                       65d3dfc58bfc643d6d3e514c6363d9f80dfe64f5
                       22108614b0719dc1c3011ec893af6e34b67db5aa
                       3de9bceaecfcc14a988602375e28d661b1f71c34
                       dd4e52ae5000318eb1573875bc82fd06541d2e46
                       5677e8265ed5b71a47c463a153ff9f8937f81872
                       63d644254ca6133177d431a7c5d936e9c741cd61
                       0af70a97
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [08:38:8a:59:a8:82:7b:72:1b:d9:f7:c8:ce:6a:8b:fe:db:fe:29:ee]
            modulus: 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
    public exponent: 10001

] 
2022-11-10 04:10:29.160  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-10 04:10:29.163 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-10 04:10:29.168 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-10 04:10:29.170 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-10 04:10:29.170  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-10 04:10:29.171  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-10 04:10:29.172  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-10 04:10:29.172 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-10 04:10:29.173 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-10 04:10:29.174 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-10 04:10:29.190 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-10 04:10:29.193 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-10 04:10:29.193 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-10 04:10:29.194 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-10 04:10:29.419  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-10 04:10:29.420  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-10 04:10:29.420 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-10 04:10:29.421 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-10 04:10:29.423  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-10 04:10:29.424  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-10 04:10:29.424 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-10 04:10:29.425 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-10 04:10:29.425 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-10 04:10:29.426 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-10 04:10:29.426 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-10 04:10:29.427 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-10 04:10:29.428 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-10 04:10:29.428 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-10 04:10:29.428 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-10 04:10:29.429 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-10 04:10:29.435 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 91004947467823869948326835000018548283237995394
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Nov 10 02:53:37 UTC 2022
           Final Date: Tue Nov 09 02:53:36 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f1:4d:1c:b0:17:7f:78:51:d2:6d:0e:ea:f9:f9:f0:67:be:14:23:74]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3bf95fc6fb2cab451f11cfbe5bc5a33e451bf4b1
                       67fea886634766edb6eb608665a28e777343ce63
                       89235fd027c82434c1bfaaf6c64a10f7a7235828
                       3aa54118b310d4cb0d74e6cc6ef3b1c20fbe3120
                       d271475231cdf771e7848423f40552eab5a38e3a
                       30cff1bc0999467f316ae17c3c678bb9640a5796
                       c34c4a01616c893c5a30e83b2c8c90e660ae80cf
                       ad20f2c4846f7075d44cda9a338ea852b73d7fe3
                       3882fb554379df232b60d362d2eb4ccca03761bd
                       71e037097bf5152cacab73e9e0d3b40ce301c8f9
                       00df750f04b668aef8d8bff1655495eebed01c98
                       3e905f003f367547a5a0af807b47417f626885db
                       8b491c6a84dfcfbda978408f880590caf513ad81
                       65d3dfc58bfc643d6d3e514c6363d9f80dfe64f5
                       22108614b0719dc1c3011ec893af6e34b67db5aa
                       3de9bceaecfcc14a988602375e28d661b1f71c34
                       dd4e52ae5000318eb1573875bc82fd06541d2e46
                       5677e8265ed5b71a47c463a153ff9f8937f81872
                       63d644254ca6133177d431a7c5d936e9c741cd61
                       0af70a97
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [f7:51:89:4e:4a:d6:b6:c6:50:2d:bb:7a:83:7d:e4:15:a8:c8:e4:85]
            modulus: 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
    public exponent: 10001

] 
2022-11-10 04:12:17.966  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-10 04:12:17.967 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-10 04:12:17.969 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-11-10 04:12:17.970 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-10 04:12:17.970  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-11-10 04:12:17.971  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-10 04:12:17.972  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-10 04:12:17.972 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-10 04:12:17.972 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-10 04:12:17.973 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-10 04:12:17.985 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-10 04:12:17.986 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-10 04:12:17.987 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-10 04:12:17.987 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-10 04:12:18.142  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-10 04:12:18.143  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-10 04:12:18.144 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-10 04:12:18.145 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-10 04:12:18.147  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-10 04:12:18.147  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-10 04:12:18.148 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-10 04:12:18.148 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-10 04:12:18.149 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-10 04:12:18.150 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-10 04:12:18.150 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-10 04:12:18.151 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-10 04:12:18.152 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-10 04:12:18.152 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-10 04:12:18.153 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-10 04:12:18.154 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-10 04:12:18.158 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 91004947467823869948326835000018548283237995394
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Nov 10 02:53:37 UTC 2022
           Final Date: Tue Nov 09 02:53:36 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f1:4d:1c:b0:17:7f:78:51:d2:6d:0e:ea:f9:f9:f0:67:be:14:23:74]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3bf95fc6fb2cab451f11cfbe5bc5a33e451bf4b1
                       67fea886634766edb6eb608665a28e777343ce63
                       89235fd027c82434c1bfaaf6c64a10f7a7235828
                       3aa54118b310d4cb0d74e6cc6ef3b1c20fbe3120
                       d271475231cdf771e7848423f40552eab5a38e3a
                       30cff1bc0999467f316ae17c3c678bb9640a5796
                       c34c4a01616c893c5a30e83b2c8c90e660ae80cf
                       ad20f2c4846f7075d44cda9a338ea852b73d7fe3
                       3882fb554379df232b60d362d2eb4ccca03761bd
                       71e037097bf5152cacab73e9e0d3b40ce301c8f9
                       00df750f04b668aef8d8bff1655495eebed01c98
                       3e905f003f367547a5a0af807b47417f626885db
                       8b491c6a84dfcfbda978408f880590caf513ad81
                       65d3dfc58bfc643d6d3e514c6363d9f80dfe64f5
                       22108614b0719dc1c3011ec893af6e34b67db5aa
                       3de9bceaecfcc14a988602375e28d661b1f71c34
                       dd4e52ae5000318eb1573875bc82fd06541d2e46
                       5677e8265ed5b71a47c463a153ff9f8937f81872
                       63d644254ca6133177d431a7c5d936e9c741cd61
                       0af70a97
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [09:3f:bc:8d:42:25:30:1a:b9:18:35:91:8e:8f:55:66:49:6f:ec:66]
            modulus: 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
    public exponent: 10001

] 
2022-11-10 04:13:11.143  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-10 04:13:11.145 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-10 04:13:11.146 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-11-10 04:13:11.147 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-10 04:13:11.148  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-11-10 04:13:11.149  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-10 04:13:11.149  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-10 04:13:11.150 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-10 04:13:11.150 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-10 04:13:11.151 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-10 04:13:11.155 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-10 04:13:11.156 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-10 04:13:11.156 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-10 04:13:11.157 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-10 04:13:11.301  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-10 04:13:11.301  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-10 04:13:11.302 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-10 04:13:11.302 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-10 04:13:11.304  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-10 04:13:11.305  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-10 04:13:11.306 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-10 04:13:11.306 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-10 04:13:11.307 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-10 04:13:11.307 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-10 04:13:11.308 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-10 04:13:11.308 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-10 04:13:11.309 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-10 04:13:11.310 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-10 04:13:11.310 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-10 04:13:11.311 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-10 04:13:11.315 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 91004947467823869948326835000018548283237995394
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Nov 10 02:53:37 UTC 2022
           Final Date: Tue Nov 09 02:53:36 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f1:4d:1c:b0:17:7f:78:51:d2:6d:0e:ea:f9:f9:f0:67:be:14:23:74]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3bf95fc6fb2cab451f11cfbe5bc5a33e451bf4b1
                       67fea886634766edb6eb608665a28e777343ce63
                       89235fd027c82434c1bfaaf6c64a10f7a7235828
                       3aa54118b310d4cb0d74e6cc6ef3b1c20fbe3120
                       d271475231cdf771e7848423f40552eab5a38e3a
                       30cff1bc0999467f316ae17c3c678bb9640a5796
                       c34c4a01616c893c5a30e83b2c8c90e660ae80cf
                       ad20f2c4846f7075d44cda9a338ea852b73d7fe3
                       3882fb554379df232b60d362d2eb4ccca03761bd
                       71e037097bf5152cacab73e9e0d3b40ce301c8f9
                       00df750f04b668aef8d8bff1655495eebed01c98
                       3e905f003f367547a5a0af807b47417f626885db
                       8b491c6a84dfcfbda978408f880590caf513ad81
                       65d3dfc58bfc643d6d3e514c6363d9f80dfe64f5
                       22108614b0719dc1c3011ec893af6e34b67db5aa
                       3de9bceaecfcc14a988602375e28d661b1f71c34
                       dd4e52ae5000318eb1573875bc82fd06541d2e46
                       5677e8265ed5b71a47c463a153ff9f8937f81872
                       63d644254ca6133177d431a7c5d936e9c741cd61
                       0af70a97
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [97:47:29:89:42:99:3d:34:40:89:22:d9:34:33:08:67:7e:80:87:33]
            modulus: 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
    public exponent: 10001

] 
2022-11-10 04:15:48.682  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-10 04:15:48.684 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-10 04:15:48.685 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-10 04:15:48.685 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-10 04:15:48.686  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-11-10 04:15:48.686  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-10 04:15:48.687  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-10 04:15:48.687 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-10 04:15:48.687 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-10 04:15:48.688 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-10 04:15:48.692 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-10 04:15:48.693 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-10 04:15:48.693 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-10 04:15:48.693 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-10 04:15:48.855  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-10 04:15:48.856  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-10 04:15:48.856 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-10 04:15:48.856 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-10 04:15:48.859  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-10 04:15:48.860  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-10 04:15:48.860 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-10 04:15:48.861 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-10 04:15:48.861 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-10 04:15:48.862 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-10 04:15:48.862 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-10 04:15:48.862 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-10 04:15:48.863 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-10 04:15:48.863 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-10 04:15:48.863 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-10 04:15:48.864 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-10 04:15:48.868 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 91004947467823869948326835000018548283237995394
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Nov 10 02:53:37 UTC 2022
           Final Date: Tue Nov 09 02:53:36 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f1:4d:1c:b0:17:7f:78:51:d2:6d:0e:ea:f9:f9:f0:67:be:14:23:74]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3bf95fc6fb2cab451f11cfbe5bc5a33e451bf4b1
                       67fea886634766edb6eb608665a28e777343ce63
                       89235fd027c82434c1bfaaf6c64a10f7a7235828
                       3aa54118b310d4cb0d74e6cc6ef3b1c20fbe3120
                       d271475231cdf771e7848423f40552eab5a38e3a
                       30cff1bc0999467f316ae17c3c678bb9640a5796
                       c34c4a01616c893c5a30e83b2c8c90e660ae80cf
                       ad20f2c4846f7075d44cda9a338ea852b73d7fe3
                       3882fb554379df232b60d362d2eb4ccca03761bd
                       71e037097bf5152cacab73e9e0d3b40ce301c8f9
                       00df750f04b668aef8d8bff1655495eebed01c98
                       3e905f003f367547a5a0af807b47417f626885db
                       8b491c6a84dfcfbda978408f880590caf513ad81
                       65d3dfc58bfc643d6d3e514c6363d9f80dfe64f5
                       22108614b0719dc1c3011ec893af6e34b67db5aa
                       3de9bceaecfcc14a988602375e28d661b1f71c34
                       dd4e52ae5000318eb1573875bc82fd06541d2e46
                       5677e8265ed5b71a47c463a153ff9f8937f81872
                       63d644254ca6133177d431a7c5d936e9c741cd61
                       0af70a97
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [21:f4:b3:87:ec:d0:6b:27:f5:f8:7a:b8:da:bb:49:2e:bf:2e:a8:34]
            modulus: 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
    public exponent: 10001

] 
2022-11-10 04:24:01.332  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-10 04:24:01.336 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-10 04:24:01.339 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-11-10 04:24:01.340 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-10 04:24:01.341  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-11-10 04:24:01.342  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-10 04:24:01.343  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-10 04:24:01.344 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-10 04:24:01.344 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-10 04:24:01.345 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-10 04:24:01.354 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-10 04:24:01.355 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-10 04:24:01.355 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-10 04:24:01.356 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-10 04:24:01.536  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-10 04:24:01.537  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-10 04:24:01.537 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-10 04:24:01.538 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-10 04:24:01.539  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-10 04:24:01.540  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-10 04:24:01.540 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-10 04:24:01.541 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-10 04:24:01.541 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-10 04:24:01.542 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-10 04:24:01.543 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-10 04:24:01.543 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-10 04:24:01.544 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-10 04:24:01.544 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-10 04:24:01.545 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-10 04:24:01.546 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-10 04:24:01.550 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 91004947467823869948326835000018548283237995394
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Nov 10 02:53:37 UTC 2022
           Final Date: Tue Nov 09 02:53:36 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f1:4d:1c:b0:17:7f:78:51:d2:6d:0e:ea:f9:f9:f0:67:be:14:23:74]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3bf95fc6fb2cab451f11cfbe5bc5a33e451bf4b1
                       67fea886634766edb6eb608665a28e777343ce63
                       89235fd027c82434c1bfaaf6c64a10f7a7235828
                       3aa54118b310d4cb0d74e6cc6ef3b1c20fbe3120
                       d271475231cdf771e7848423f40552eab5a38e3a
                       30cff1bc0999467f316ae17c3c678bb9640a5796
                       c34c4a01616c893c5a30e83b2c8c90e660ae80cf
                       ad20f2c4846f7075d44cda9a338ea852b73d7fe3
                       3882fb554379df232b60d362d2eb4ccca03761bd
                       71e037097bf5152cacab73e9e0d3b40ce301c8f9
                       00df750f04b668aef8d8bff1655495eebed01c98
                       3e905f003f367547a5a0af807b47417f626885db
                       8b491c6a84dfcfbda978408f880590caf513ad81
                       65d3dfc58bfc643d6d3e514c6363d9f80dfe64f5
                       22108614b0719dc1c3011ec893af6e34b67db5aa
                       3de9bceaecfcc14a988602375e28d661b1f71c34
                       dd4e52ae5000318eb1573875bc82fd06541d2e46
                       5677e8265ed5b71a47c463a153ff9f8937f81872
                       63d644254ca6133177d431a7c5d936e9c741cd61
                       0af70a97
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [62:fa:5a:64:66:85:da:d5:28:9b:11:f8:eb:db:c2:c7:64:dc:3d:e7]
            modulus: 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
    public exponent: 10001

] 
2022-11-10 04:28:45.713  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-10 04:28:45.715 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-10 04:28:45.717 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-11-10 04:28:45.718 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-10 04:28:45.719  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-11-10 04:28:45.720  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-10 04:28:45.720  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-10 04:28:45.721 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-10 04:28:45.721 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-10 04:28:45.722 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-10 04:28:45.727 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-10 04:28:45.728 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-10 04:28:45.728 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-10 04:28:45.728 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-10 04:28:45.970  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-10 04:28:45.971  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-10 04:28:45.971 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-10 04:28:45.971 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-10 04:28:45.973  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-10 04:28:45.973  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-10 04:28:45.974 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-10 04:28:45.974 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-10 04:28:45.974 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-10 04:28:45.975 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-10 04:28:45.976 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-10 04:28:45.976 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-10 04:28:45.977 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-10 04:28:45.977 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-10 04:28:45.978 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-10 04:28:45.979 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-10 04:28:45.983 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 91004947467823869948326835000018548283237995394
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Nov 10 02:53:37 UTC 2022
           Final Date: Tue Nov 09 02:53:36 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f1:4d:1c:b0:17:7f:78:51:d2:6d:0e:ea:f9:f9:f0:67:be:14:23:74]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3bf95fc6fb2cab451f11cfbe5bc5a33e451bf4b1
                       67fea886634766edb6eb608665a28e777343ce63
                       89235fd027c82434c1bfaaf6c64a10f7a7235828
                       3aa54118b310d4cb0d74e6cc6ef3b1c20fbe3120
                       d271475231cdf771e7848423f40552eab5a38e3a
                       30cff1bc0999467f316ae17c3c678bb9640a5796
                       c34c4a01616c893c5a30e83b2c8c90e660ae80cf
                       ad20f2c4846f7075d44cda9a338ea852b73d7fe3
                       3882fb554379df232b60d362d2eb4ccca03761bd
                       71e037097bf5152cacab73e9e0d3b40ce301c8f9
                       00df750f04b668aef8d8bff1655495eebed01c98
                       3e905f003f367547a5a0af807b47417f626885db
                       8b491c6a84dfcfbda978408f880590caf513ad81
                       65d3dfc58bfc643d6d3e514c6363d9f80dfe64f5
                       22108614b0719dc1c3011ec893af6e34b67db5aa
                       3de9bceaecfcc14a988602375e28d661b1f71c34
                       dd4e52ae5000318eb1573875bc82fd06541d2e46
                       5677e8265ed5b71a47c463a153ff9f8937f81872
                       63d644254ca6133177d431a7c5d936e9c741cd61
                       0af70a97
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [3f:80:d3:77:de:3f:cd:c4:95:7b:60:c2:1c:59:f7:8a:d3:7b:0b:af]
            modulus: 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
    public exponent: 10001

] 
2022-11-10 04:29:01.015  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-11-10 04:29:01.017 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-11-10 04:29:01.018 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-11-10 04:29:01.019 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-11-10 04:29:01.019  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-11-10 04:29:01.020  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-11-10 04:29:01.020  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-11-10 04:29:01.021 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-11-10 04:29:01.021 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-11-10 04:29:01.022 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-11-10 04:29:01.026 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-11-10 04:29:01.027 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-10 04:29:01.027 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-11-10 04:29:01.028 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-10 04:29:01.158  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-11-10 04:29:01.159  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-11-10 04:29:01.159 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-11-10 04:29:01.160 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-11-10 04:29:01.161  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-11-10 04:29:01.162  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-11-10 04:29:01.163 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-10 04:29:01.163 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-10 04:29:01.163 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-10 04:29:01.164 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-10 04:29:01.165 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-10 04:29:01.165 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-10 04:29:01.166 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-11-10 04:29:01.167 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-11-10 04:29:01.167 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-11-10 04:29:01.168 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-11-10 04:29:01.173 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 91004947467823869948326835000018548283237995394
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Nov 10 02:53:37 UTC 2022
           Final Date: Tue Nov 09 02:53:36 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f1:4d:1c:b0:17:7f:78:51:d2:6d:0e:ea:f9:f9:f0:67:be:14:23:74]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3bf95fc6fb2cab451f11cfbe5bc5a33e451bf4b1
                       67fea886634766edb6eb608665a28e777343ce63
                       89235fd027c82434c1bfaaf6c64a10f7a7235828
                       3aa54118b310d4cb0d74e6cc6ef3b1c20fbe3120
                       d271475231cdf771e7848423f40552eab5a38e3a
                       30cff1bc0999467f316ae17c3c678bb9640a5796
                       c34c4a01616c893c5a30e83b2c8c90e660ae80cf
                       ad20f2c4846f7075d44cda9a338ea852b73d7fe3
                       3882fb554379df232b60d362d2eb4ccca03761bd
                       71e037097bf5152cacab73e9e0d3b40ce301c8f9
                       00df750f04b668aef8d8bff1655495eebed01c98
                       3e905f003f367547a5a0af807b47417f626885db
                       8b491c6a84dfcfbda978408f880590caf513ad81
                       65d3dfc58bfc643d6d3e514c6363d9f80dfe64f5
                       22108614b0719dc1c3011ec893af6e34b67db5aa
                       3de9bceaecfcc14a988602375e28d661b1f71c34
                       dd4e52ae5000318eb1573875bc82fd06541d2e46
                       5677e8265ed5b71a47c463a153ff9f8937f81872
                       63d644254ca6133177d431a7c5d936e9c741cd61
                       0af70a97
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [e0:13:f7:e9:53:ae:89:e5:90:c2:ff:e3:13:70:3f:6a:ff:4c:cd:21]
            modulus: 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
    public exponent: 10001

]