Results

By type

          2022-12-19 03:05:48,812 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-12-19 03:05:50,212 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-12-19 03:05:50.941  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Dec 19, 2022 3:05:52 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Dec 19, 2022 3:05:52 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Dec 19, 2022 3:05:52 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Dec 19, 2022 3:05:52 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-12-19 03:05:53.420 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-12-19 03:05:53.719  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-12-19 03:05:53.888  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-12-19 03:05:54.594 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-12-19 03:05:54.597 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
2022-12-19 03:05:54.598 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-12-19 03:05:54.602 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-12-19 03:05:54.644 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2022-12-19 03:05:54.648 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/docs]}: redirectToUi(HttpServletRequest)
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
2022-12-19 03:05:54.773 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-12-19 03:05:55.434 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Dec 19, 2022 3:05:56 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-12-19 03:05:56.380  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 8.453 seconds (JVM running for 10.152)
Dec 19, 2022 3:06:16 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-12-19 03:06:34.645  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-19 03:06:34.652 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-19 03:06:34.688 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-12-19 03:06:34.691 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-19 03:06:34.707  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-12-19 03:06:34.709  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-19 03:06:34.710  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-19 03:06:34.711 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-19 03:06:34.711 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-19 03:06:34.715 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-19 03:06:34.723 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-19 03:06:34.726 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-19 03:06:34.778 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-19 03:06:34.784 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-19 03:06:34.784 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-19 03:06:34.787 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-19 03:06:35.891  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-19 03:06:35.893  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-19 03:06:35.894 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-19 03:06:35.895 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-19 03:06:35.903  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-19 03:06:35.904  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-19 03:06:35.905 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-19 03:06:35.905 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-19 03:06:35.905 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-19 03:06:35.918 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-19 03:06:35.919 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-19 03:06:35.919 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-19 03:06:35.924 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-19 03:06:35.925 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-19 03:06:35.925 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-19 03:06:35.926 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-19 03:06:35.954 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 484943126331820726508084340486266808996467367543
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Dec 19 03:00:52 UTC 2022
           Final Date: Sat Dec 18 03:00:51 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [b3:21:34:18:85:24:a5:eb:b5:b3:10:a2:0e:ee:ea:b5:c0:80:a7:ca],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 263e62852e3c323b58420de6cf15a140d4ee4bb1
                       c494ae4d858a2b16f84c2fe6603af0c580b014d0
                       dfb605ab6a6c827b01d96551b14bbdb814e09ec2
                       1055e6255ad3cc9e8cdb09f4f88a3e92e093d51c
                       53feb268184e77c88aab53df23fe0a61bc26428d
                       82ba9b1e4a12f0043d22c980a282b74b941dcee8
                       9b155971bf2c6c4ab967fee8b5c5faf003f69292
                       aaf4296a53aef60f5c354568c2b36ddb91a0c4c3
                       2d09c43fcf8286490dff81fca18b64f6b296db32
                       ef8b0de76f102ede9200f449ae50b3f1b3c0b2f1
                       8c339736cc7663cf6b5980c8055c9a8d888a6d03
                       7fa8511382e13726d4b987cc71c5c2f06cf21016
                       6e1ee472e9ca0e455d5d671411a12e6e0879492e
                       f27b42ab3a42cbb91afb15e43ccbfb3d7c75bbbc
                       6c710443ef9d4d4e9e1354d1b45f6882d6e2d980
                       23e90fb02e86d57050e01c82a8ad88f3f5547674
                       9c0fb92055e458632ab56f484c2bc243db2c5d1f
                       9454ab992de12fd08d786e76dd9747298ae74d15
                       dabfbd85cbcab44d36ed94caeaaf567b23781a7b
                       5ae6f4be
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [c1:39:88:05:05:85:88:25:ad:a8:d9:e9:00:0b:97:22:2b:6f:4f:b6],[56:66:d1:a4]
        modulus: b7e34bb86aec5f381fe13561d240926105a657cb99d8b89d5c98dd1d192a6cb768913f37cd7cd12b58aaa180de8357ba762c7bbb49a0ce923b0bc73bb94e5ef2e7d4b34c81b9b7232bdfc41c4fc442bf54d7dd1681f2bbb3c8a134f637f69c9ad0f4c1532f67b74b01306f88386b4a62a4d43926478cc572a78a6866df7e86d92cdf65e1fd7c4d4e8ebc848a723c81a16bcbd1fcec45b11d7c50f815e9be4b01fb179c2c3ddbc0c695feba569decb98dcf4927cc1c4da4c4d7fb3784938b1c24fc9f8922e455d0a12203cb5b3dd2f07f7d28ef4818490754d0a24e76bf97fc301ba9ad75f4fdab41452c9292336c63913e70d2e6f621809d77d619d064f8e10f
public exponent: 10001

] 
2022-12-19 04:45:45.009  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-19 04:45:45.011 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-19 04:45:45.014 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-12-19 04:45:45.015 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-19 04:45:45.016  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-12-19 04:45:45.017  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-19 04:45:45.017  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-19 04:45:45.018 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-19 04:45:45.019 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-19 04:45:45.019 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-19 04:45:45.023 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-19 04:45:45.025 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-19 04:45:45.025 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-19 04:45:45.025 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-19 04:45:45.777  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-19 04:45:45.778  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-19 04:45:45.778 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-19 04:45:45.779 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-19 04:45:45.782  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-19 04:45:45.782  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-19 04:45:45.783 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-19 04:45:45.783 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-19 04:45:45.783 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-19 04:45:45.784 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-19 04:45:45.785 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-19 04:45:45.785 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-19 04:45:45.786 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-19 04:45:45.786 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-19 04:45:45.787 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-19 04:45:45.788 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-19 04:45:45.795 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 484943126331820726508084340486266808996467367543
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Dec 19 03:00:52 UTC 2022
           Final Date: Sat Dec 18 03:00:51 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [b3:21:34:18:85:24:a5:eb:b5:b3:10:a2:0e:ee:ea:b5:c0:80:a7:ca],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 263e62852e3c323b58420de6cf15a140d4ee4bb1
                       c494ae4d858a2b16f84c2fe6603af0c580b014d0
                       dfb605ab6a6c827b01d96551b14bbdb814e09ec2
                       1055e6255ad3cc9e8cdb09f4f88a3e92e093d51c
                       53feb268184e77c88aab53df23fe0a61bc26428d
                       82ba9b1e4a12f0043d22c980a282b74b941dcee8
                       9b155971bf2c6c4ab967fee8b5c5faf003f69292
                       aaf4296a53aef60f5c354568c2b36ddb91a0c4c3
                       2d09c43fcf8286490dff81fca18b64f6b296db32
                       ef8b0de76f102ede9200f449ae50b3f1b3c0b2f1
                       8c339736cc7663cf6b5980c8055c9a8d888a6d03
                       7fa8511382e13726d4b987cc71c5c2f06cf21016
                       6e1ee472e9ca0e455d5d671411a12e6e0879492e
                       f27b42ab3a42cbb91afb15e43ccbfb3d7c75bbbc
                       6c710443ef9d4d4e9e1354d1b45f6882d6e2d980
                       23e90fb02e86d57050e01c82a8ad88f3f5547674
                       9c0fb92055e458632ab56f484c2bc243db2c5d1f
                       9454ab992de12fd08d786e76dd9747298ae74d15
                       dabfbd85cbcab44d36ed94caeaaf567b23781a7b
                       5ae6f4be
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ea:aa:a8:38:70:62:ee:17:ba:0f:45:4b:42:4e:bd:9e:73:a5:39:7e],[56:66:d1:a4]
        modulus: cbece9d271e1408374ea3c039ee4d7e2b7362cf91d87021fa38f6588cb41e956962040173671dc09c071f479133e0c2340f0dbe95ddaf33fa5f3da7a59c1ea81c16ed347b28eb38813a28ce27df09292b05eb35920a693a747f486420fd02592c9f38fded7bf3e12de1817f59e6e850169fc0bf44e4dcf35bd2e64fffe128bca24e8249f154ad5fecdfe2c6b87327f798c8715c4dc5609103c6168106cb82d2a932a6000599d3d5a7d05f0953499ebfce521e54d29691e58b472033666e55c70bc1f72ff2ea58e5957e1ede2318aee87840e884fe1ec04878e9fe315577537fed046b3c0a7bc7c2f5768afb6f39913d2e20192b9ced578040ada56a981df7647
public exponent: 10001

] 
2022-12-19 04:47:32.891  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-19 04:47:32.894 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-19 04:47:32.897 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-12-19 04:47:32.899 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-19 04:47:32.899  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-12-19 04:47:32.900  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-19 04:47:32.901  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-19 04:47:32.901 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-19 04:47:32.902 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-19 04:47:32.903 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-19 04:47:32.909 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-19 04:47:32.910 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-19 04:47:32.910 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-19 04:47:32.911 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-19 04:47:33.169  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-19 04:47:33.171  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-19 04:47:33.171 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-19 04:47:33.172 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-19 04:47:33.175  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-19 04:47:33.176  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-19 04:47:33.177 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-19 04:47:33.177 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-19 04:47:33.178 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-19 04:47:33.180 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-19 04:47:33.181 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-19 04:47:33.181 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-19 04:47:33.183 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-19 04:47:33.184 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-19 04:47:33.184 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-19 04:47:33.186 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-19 04:47:33.191 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 484943126331820726508084340486266808996467367543
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Dec 19 03:00:52 UTC 2022
           Final Date: Sat Dec 18 03:00:51 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [b3:21:34:18:85:24:a5:eb:b5:b3:10:a2:0e:ee:ea:b5:c0:80:a7:ca],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 263e62852e3c323b58420de6cf15a140d4ee4bb1
                       c494ae4d858a2b16f84c2fe6603af0c580b014d0
                       dfb605ab6a6c827b01d96551b14bbdb814e09ec2
                       1055e6255ad3cc9e8cdb09f4f88a3e92e093d51c
                       53feb268184e77c88aab53df23fe0a61bc26428d
                       82ba9b1e4a12f0043d22c980a282b74b941dcee8
                       9b155971bf2c6c4ab967fee8b5c5faf003f69292
                       aaf4296a53aef60f5c354568c2b36ddb91a0c4c3
                       2d09c43fcf8286490dff81fca18b64f6b296db32
                       ef8b0de76f102ede9200f449ae50b3f1b3c0b2f1
                       8c339736cc7663cf6b5980c8055c9a8d888a6d03
                       7fa8511382e13726d4b987cc71c5c2f06cf21016
                       6e1ee472e9ca0e455d5d671411a12e6e0879492e
                       f27b42ab3a42cbb91afb15e43ccbfb3d7c75bbbc
                       6c710443ef9d4d4e9e1354d1b45f6882d6e2d980
                       23e90fb02e86d57050e01c82a8ad88f3f5547674
                       9c0fb92055e458632ab56f484c2bc243db2c5d1f
                       9454ab992de12fd08d786e76dd9747298ae74d15
                       dabfbd85cbcab44d36ed94caeaaf567b23781a7b
                       5ae6f4be
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [bc:d6:9e:d9:2d:02:ba:1d:67:2e:73:a7:2f:6d:92:27:28:17:d2:13],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-12-19 04:49:29.333  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-19 04:49:29.334 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-19 04:49:29.336 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-12-19 04:49:29.337 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-19 04:49:29.337  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-12-19 04:49:29.338  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-19 04:49:29.352  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-19 04:49:29.352 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-19 04:49:29.353 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-19 04:49:29.353 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-19 04:49:29.357 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-19 04:49:29.357 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-19 04:49:29.358 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-19 04:49:29.358 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-19 04:49:29.702  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-19 04:49:29.703  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-19 04:49:29.703 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-19 04:49:29.703 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-19 04:49:29.705  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-19 04:49:29.705  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-19 04:49:29.705 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-19 04:49:29.706 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-19 04:49:29.706 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-19 04:49:29.707 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-19 04:49:29.707 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-19 04:49:29.708 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-19 04:49:29.708 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-19 04:49:29.709 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-19 04:49:29.709 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-19 04:49:29.710 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-19 04:49:29.714 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 484943126331820726508084340486266808996467367543
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Dec 19 03:00:52 UTC 2022
           Final Date: Sat Dec 18 03:00:51 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [b3:21:34:18:85:24:a5:eb:b5:b3:10:a2:0e:ee:ea:b5:c0:80:a7:ca],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 263e62852e3c323b58420de6cf15a140d4ee4bb1
                       c494ae4d858a2b16f84c2fe6603af0c580b014d0
                       dfb605ab6a6c827b01d96551b14bbdb814e09ec2
                       1055e6255ad3cc9e8cdb09f4f88a3e92e093d51c
                       53feb268184e77c88aab53df23fe0a61bc26428d
                       82ba9b1e4a12f0043d22c980a282b74b941dcee8
                       9b155971bf2c6c4ab967fee8b5c5faf003f69292
                       aaf4296a53aef60f5c354568c2b36ddb91a0c4c3
                       2d09c43fcf8286490dff81fca18b64f6b296db32
                       ef8b0de76f102ede9200f449ae50b3f1b3c0b2f1
                       8c339736cc7663cf6b5980c8055c9a8d888a6d03
                       7fa8511382e13726d4b987cc71c5c2f06cf21016
                       6e1ee472e9ca0e455d5d671411a12e6e0879492e
                       f27b42ab3a42cbb91afb15e43ccbfb3d7c75bbbc
                       6c710443ef9d4d4e9e1354d1b45f6882d6e2d980
                       23e90fb02e86d57050e01c82a8ad88f3f5547674
                       9c0fb92055e458632ab56f484c2bc243db2c5d1f
                       9454ab992de12fd08d786e76dd9747298ae74d15
                       dabfbd85cbcab44d36ed94caeaaf567b23781a7b
                       5ae6f4be
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [58:74:8e:8d:1f:63:28:5c:22:bb:02:48:f8:9f:45:6f:00:2d:aa:fb],[56:66:d1:a4]
        modulus: bbe75be795f2dc968c684c3edbff8d9b944380bdaf397833e7af44fc67ff3d38946443be352d23f1b1111fda98b9815410d59b503719ebf318b6a613796a19765b321b3c3ec2f268e745b8c45b747e4014d14a3737cb5cef691eff124299f9a95bfaaff440988eaa3e57a5aa96ce33128ee9e56603ab44d80f8d5aa4be46c0a1371e5780d92d97f1d87eefbd2acf033e19f00e0dc689a565f9bdb2885a2ddb06cd94d2c6fddcbfd189ce1e2664ed238975e566f6f01c57871155b6323f6160962754a39c2e0473abecca06db541844434b01237ef13e9b5f90c18cee5112e651b76d7776efc4f99abd09507adadaa8a1b4a007dbd0db84b4019bcfbf30d17a45
public exponent: 10001

] 
2022-12-19 04:52:18.831  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-19 04:52:18.832 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-19 04:52:18.834 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-12-19 04:52:18.834 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-19 04:52:18.835  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-12-19 04:52:18.835  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-19 04:52:18.836  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-19 04:52:18.836 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-19 04:52:18.837 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-19 04:52:18.837 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-19 04:52:18.841 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-19 04:52:18.842 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-19 04:52:18.842 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-19 04:52:18.843 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-19 04:52:19.487  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-19 04:52:19.487  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-19 04:52:19.488 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-19 04:52:19.488 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-19 04:52:19.490  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-19 04:52:19.490  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-19 04:52:19.491 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-19 04:52:19.491 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-19 04:52:19.492 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-19 04:52:19.492 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-19 04:52:19.493 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-19 04:52:19.493 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-19 04:52:19.493 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-19 04:52:19.494 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-19 04:52:19.494 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-19 04:52:19.495 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-19 04:52:19.497 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 484943126331820726508084340486266808996467367543
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Dec 19 03:00:52 UTC 2022
           Final Date: Sat Dec 18 03:00:51 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [b3:21:34:18:85:24:a5:eb:b5:b3:10:a2:0e:ee:ea:b5:c0:80:a7:ca],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 263e62852e3c323b58420de6cf15a140d4ee4bb1
                       c494ae4d858a2b16f84c2fe6603af0c580b014d0
                       dfb605ab6a6c827b01d96551b14bbdb814e09ec2
                       1055e6255ad3cc9e8cdb09f4f88a3e92e093d51c
                       53feb268184e77c88aab53df23fe0a61bc26428d
                       82ba9b1e4a12f0043d22c980a282b74b941dcee8
                       9b155971bf2c6c4ab967fee8b5c5faf003f69292
                       aaf4296a53aef60f5c354568c2b36ddb91a0c4c3
                       2d09c43fcf8286490dff81fca18b64f6b296db32
                       ef8b0de76f102ede9200f449ae50b3f1b3c0b2f1
                       8c339736cc7663cf6b5980c8055c9a8d888a6d03
                       7fa8511382e13726d4b987cc71c5c2f06cf21016
                       6e1ee472e9ca0e455d5d671411a12e6e0879492e
                       f27b42ab3a42cbb91afb15e43ccbfb3d7c75bbbc
                       6c710443ef9d4d4e9e1354d1b45f6882d6e2d980
                       23e90fb02e86d57050e01c82a8ad88f3f5547674
                       9c0fb92055e458632ab56f484c2bc243db2c5d1f
                       9454ab992de12fd08d786e76dd9747298ae74d15
                       dabfbd85cbcab44d36ed94caeaaf567b23781a7b
                       5ae6f4be
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [e8:b9:72:44:3a:fe:a2:f2:40:78:d1:9b:ff:8f:7a:7b:d1:8c:83:2d],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-12-19 04:59:06.516  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-19 04:59:06.518 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-19 04:59:06.522 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-12-19 04:59:06.523 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-19 04:59:06.523  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-12-19 04:59:06.524  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-19 04:59:06.524  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-19 04:59:06.525 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-19 04:59:06.525 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-19 04:59:06.526 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-19 04:59:06.531 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-19 04:59:06.532 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-19 04:59:06.532 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-19 04:59:06.533 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-19 04:59:06.917  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-19 04:59:06.918  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-19 04:59:06.919 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-19 04:59:06.919 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-19 04:59:06.921  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-19 04:59:06.921  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-19 04:59:06.922 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-19 04:59:06.923 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-19 04:59:06.923 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-19 04:59:06.924 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-19 04:59:06.925 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-19 04:59:06.925 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-19 04:59:06.926 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-19 04:59:06.927 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-19 04:59:06.928 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-19 04:59:06.928 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-19 04:59:06.932 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 484943126331820726508084340486266808996467367543
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Dec 19 03:00:52 UTC 2022
           Final Date: Sat Dec 18 03:00:51 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [b3:21:34:18:85:24:a5:eb:b5:b3:10:a2:0e:ee:ea:b5:c0:80:a7:ca],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 263e62852e3c323b58420de6cf15a140d4ee4bb1
                       c494ae4d858a2b16f84c2fe6603af0c580b014d0
                       dfb605ab6a6c827b01d96551b14bbdb814e09ec2
                       1055e6255ad3cc9e8cdb09f4f88a3e92e093d51c
                       53feb268184e77c88aab53df23fe0a61bc26428d
                       82ba9b1e4a12f0043d22c980a282b74b941dcee8
                       9b155971bf2c6c4ab967fee8b5c5faf003f69292
                       aaf4296a53aef60f5c354568c2b36ddb91a0c4c3
                       2d09c43fcf8286490dff81fca18b64f6b296db32
                       ef8b0de76f102ede9200f449ae50b3f1b3c0b2f1
                       8c339736cc7663cf6b5980c8055c9a8d888a6d03
                       7fa8511382e13726d4b987cc71c5c2f06cf21016
                       6e1ee472e9ca0e455d5d671411a12e6e0879492e
                       f27b42ab3a42cbb91afb15e43ccbfb3d7c75bbbc
                       6c710443ef9d4d4e9e1354d1b45f6882d6e2d980
                       23e90fb02e86d57050e01c82a8ad88f3f5547674
                       9c0fb92055e458632ab56f484c2bc243db2c5d1f
                       9454ab992de12fd08d786e76dd9747298ae74d15
                       dabfbd85cbcab44d36ed94caeaaf567b23781a7b
                       5ae6f4be
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [1b:76:d6:de:68:d6:e9:55:d2:d7:4d:82:a0:ad:89:57:11:9a:d3:d1],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-12-19 05:04:54.581  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-19 05:04:54.582 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-19 05:04:54.584 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-12-19 05:04:54.585 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-19 05:04:54.585  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-12-19 05:04:54.585  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-19 05:04:54.586  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-19 05:04:54.586 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-19 05:04:54.586 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-19 05:04:54.587 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-19 05:04:54.590 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-19 05:04:54.591 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-19 05:04:54.591 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-19 05:04:54.591 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-19 05:04:54.794  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-19 05:04:54.795  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-19 05:04:54.795 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-19 05:04:54.796 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-19 05:04:54.797  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-19 05:04:54.797  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-19 05:04:54.798 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-19 05:04:54.798 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-19 05:04:54.798 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-19 05:04:54.799 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-19 05:04:54.799 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-19 05:04:54.800 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-19 05:04:54.800 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-19 05:04:54.801 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-19 05:04:54.801 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-19 05:04:54.802 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-19 05:04:54.804 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 484943126331820726508084340486266808996467367543
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Dec 19 03:00:52 UTC 2022
           Final Date: Sat Dec 18 03:00:51 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [b3:21:34:18:85:24:a5:eb:b5:b3:10:a2:0e:ee:ea:b5:c0:80:a7:ca],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 263e62852e3c323b58420de6cf15a140d4ee4bb1
                       c494ae4d858a2b16f84c2fe6603af0c580b014d0
                       dfb605ab6a6c827b01d96551b14bbdb814e09ec2
                       1055e6255ad3cc9e8cdb09f4f88a3e92e093d51c
                       53feb268184e77c88aab53df23fe0a61bc26428d
                       82ba9b1e4a12f0043d22c980a282b74b941dcee8
                       9b155971bf2c6c4ab967fee8b5c5faf003f69292
                       aaf4296a53aef60f5c354568c2b36ddb91a0c4c3
                       2d09c43fcf8286490dff81fca18b64f6b296db32
                       ef8b0de76f102ede9200f449ae50b3f1b3c0b2f1
                       8c339736cc7663cf6b5980c8055c9a8d888a6d03
                       7fa8511382e13726d4b987cc71c5c2f06cf21016
                       6e1ee472e9ca0e455d5d671411a12e6e0879492e
                       f27b42ab3a42cbb91afb15e43ccbfb3d7c75bbbc
                       6c710443ef9d4d4e9e1354d1b45f6882d6e2d980
                       23e90fb02e86d57050e01c82a8ad88f3f5547674
                       9c0fb92055e458632ab56f484c2bc243db2c5d1f
                       9454ab992de12fd08d786e76dd9747298ae74d15
                       dabfbd85cbcab44d36ed94caeaaf567b23781a7b
                       5ae6f4be
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [1e:59:a1:60:ff:33:cf:52:b0:ab:1e:0b:90:4e:7a:ae:e0:85:7f:5d],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-12-19 05:05:21.489  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-19 05:05:21.491 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-19 05:05:21.496 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-12-19 05:05:21.497 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-19 05:05:21.497  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-12-19 05:05:21.499  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-19 05:05:21.500  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-19 05:05:21.501 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-19 05:05:21.501 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-19 05:05:21.502 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-19 05:05:21.506 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-19 05:05:21.506 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-19 05:05:21.507 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-19 05:05:21.507 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-19 05:05:21.888  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-19 05:05:21.888  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-19 05:05:21.889 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-19 05:05:21.889 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-19 05:05:21.890  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-19 05:05:21.891  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-19 05:05:21.892 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-19 05:05:21.892 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-19 05:05:21.892 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-19 05:05:21.894 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-19 05:05:21.894 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-19 05:05:21.895 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-19 05:05:21.896 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-19 05:05:21.896 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-19 05:05:21.897 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-19 05:05:21.898 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-19 05:05:21.902 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 484943126331820726508084340486266808996467367543
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Dec 19 03:00:52 UTC 2022
           Final Date: Sat Dec 18 03:00:51 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [b3:21:34:18:85:24:a5:eb:b5:b3:10:a2:0e:ee:ea:b5:c0:80:a7:ca],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 263e62852e3c323b58420de6cf15a140d4ee4bb1
                       c494ae4d858a2b16f84c2fe6603af0c580b014d0
                       dfb605ab6a6c827b01d96551b14bbdb814e09ec2
                       1055e6255ad3cc9e8cdb09f4f88a3e92e093d51c
                       53feb268184e77c88aab53df23fe0a61bc26428d
                       82ba9b1e4a12f0043d22c980a282b74b941dcee8
                       9b155971bf2c6c4ab967fee8b5c5faf003f69292
                       aaf4296a53aef60f5c354568c2b36ddb91a0c4c3
                       2d09c43fcf8286490dff81fca18b64f6b296db32
                       ef8b0de76f102ede9200f449ae50b3f1b3c0b2f1
                       8c339736cc7663cf6b5980c8055c9a8d888a6d03
                       7fa8511382e13726d4b987cc71c5c2f06cf21016
                       6e1ee472e9ca0e455d5d671411a12e6e0879492e
                       f27b42ab3a42cbb91afb15e43ccbfb3d7c75bbbc
                       6c710443ef9d4d4e9e1354d1b45f6882d6e2d980
                       23e90fb02e86d57050e01c82a8ad88f3f5547674
                       9c0fb92055e458632ab56f484c2bc243db2c5d1f
                       9454ab992de12fd08d786e76dd9747298ae74d15
                       dabfbd85cbcab44d36ed94caeaaf567b23781a7b
                       5ae6f4be
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [da:be:bf:f3:df:6b:22:a3:57:d6:de:41:6f:c7:0a:34:b4:f3:22:fe],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-12-19 05:27:56.243  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-19 05:27:56.246 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-19 05:27:56.250 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-12-19 05:27:56.252 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-19 05:27:56.253  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-12-19 05:27:56.254  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-19 05:27:56.254  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-19 05:27:56.255 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-19 05:27:56.256 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-19 05:27:56.257 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-19 05:27:56.261 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-19 05:27:56.262 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-19 05:27:56.262 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-19 05:27:56.263 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-19 05:27:56.472  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-19 05:27:56.472  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-19 05:27:56.473 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-19 05:27:56.473 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-19 05:27:56.475  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-19 05:27:56.475  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-19 05:27:56.476 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-19 05:27:56.476 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-19 05:27:56.477 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-19 05:27:56.478 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-19 05:27:56.478 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-19 05:27:56.478 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-19 05:27:56.479 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-19 05:27:56.479 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-19 05:27:56.480 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-19 05:27:56.480 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-19 05:27:56.485 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 484943126331820726508084340486266808996467367543
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Dec 19 03:00:52 UTC 2022
           Final Date: Sat Dec 18 03:00:51 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [b3:21:34:18:85:24:a5:eb:b5:b3:10:a2:0e:ee:ea:b5:c0:80:a7:ca],[56:66:d1:a4]
        modulus: d4ad3045775618b8fc041bd523043beef1d3d5b56583c24715bd3428ea990aa76a3741b8a6b4f6784d431143e6d15211483ef668a866913704f4d05fd5cbb48e54a40da1700578a72dcad05733ecb707349bb15fd513b60d8c0ab3e6095867638f299d3813e17bc373f9bc512ec59f51f34377a9df3e74def55afdb56604c27bcd5e68930493e33feab86e6a9aad919a092d1bd53a143abdd25ea98bf38b398f263193e34b9e39dff389867dcd7670b21d30d1c5fffd87f149353943d9c92aff5e86a502fda6d28ae384eb3a72b17957a0e71b8d05850fea2572eda8ac38d8c98acbcb605172bfe3408e76ec570ec1219a97f1b526922e6bcf2953e7d117b44a0f247e6b2d2c7ebecdffa106d995a1791d7ffa81a942865334fd913f35185519e790b77f33d4210321e36ebb8fd630b4f9b84267af0bc88e82addf5d8c15d629cef0a6b6ec2a4931095244447719758adb527d51e5ec058761bf3c1b277a2c345141b47658161442174e7c1e4b4c5917d975c550383d6643503c81a74d3aff4f
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 263e62852e3c323b58420de6cf15a140d4ee4bb1
                       c494ae4d858a2b16f84c2fe6603af0c580b014d0
                       dfb605ab6a6c827b01d96551b14bbdb814e09ec2
                       1055e6255ad3cc9e8cdb09f4f88a3e92e093d51c
                       53feb268184e77c88aab53df23fe0a61bc26428d
                       82ba9b1e4a12f0043d22c980a282b74b941dcee8
                       9b155971bf2c6c4ab967fee8b5c5faf003f69292
                       aaf4296a53aef60f5c354568c2b36ddb91a0c4c3
                       2d09c43fcf8286490dff81fca18b64f6b296db32
                       ef8b0de76f102ede9200f449ae50b3f1b3c0b2f1
                       8c339736cc7663cf6b5980c8055c9a8d888a6d03
                       7fa8511382e13726d4b987cc71c5c2f06cf21016
                       6e1ee472e9ca0e455d5d671411a12e6e0879492e
                       f27b42ab3a42cbb91afb15e43ccbfb3d7c75bbbc
                       6c710443ef9d4d4e9e1354d1b45f6882d6e2d980
                       23e90fb02e86d57050e01c82a8ad88f3f5547674
                       9c0fb92055e458632ab56f484c2bc243db2c5d1f
                       9454ab992de12fd08d786e76dd9747298ae74d15
                       dabfbd85cbcab44d36ed94caeaaf567b23781a7b
                       5ae6f4be
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [42:02:53:9d:20:6b:b7:03:84:9b:64:f2:ec:47:51:bd:7b:f7:eb:2a],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-12-19 05:28:01.004  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-19 05:28:01.006 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-19 05:28:01.007 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-12-19 05:28:01.008 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-19 05:28:01.008  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-12-19 05:28:01.009  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-19 05:28:01.010  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-19 05:28:01.010 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-19 05:28:01.010 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-19 05:28:01.011 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-19 05:28:01.015 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-19 05:28:01.015 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-19 05:28:01.016 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-19 05:28:01.016 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-19 05:28:01.238  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-19 05:28:01.238  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-19 05:28:01.238 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-19 05:28:01.239 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-19 05:28:01.240  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-19 05:28:01.240  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-19 05:28:01.240 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-19 05:28:01.240 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-19 05:28:01.241 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-19 05:28:01.241 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-19 05:28:01.241 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-19 05:28:01.241 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-19 05:28:01.242 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-19 05:28:01.242 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-19 05:28:01.242 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-19 05:28:01.243 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-19 05:28:01.245 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 484943126331820726508084340486266808996467367543
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Dec 19 03:00:52 UTC 2022
           Final Date: Sat Dec 18 03:00:51 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [b3:21:34:18:85:24:a5:eb:b5:b3:10:a2:0e:ee:ea:b5:c0:80:a7:ca],[56:66:d1:a4]
        modulus: d4ad3045775618b8fc041bd523043beef1d3d5b56583c24715bd3428ea990aa76a3741b8a6b4f6784d431143e6d15211483ef668a866913704f4d05fd5cbb48e54a40da1700578a72dcad05733ecb707349bb15fd513b60d8c0ab3e6095867638f299d3813e17bc373f9bc512ec59f51f34377a9df3e74def55afdb56604c27bcd5e68930493e33feab86e6a9aad919a092d1bd53a143abdd25ea98bf38b398f263193e34b9e39dff389867dcd7670b21d30d1c5fffd87f149353943d9c92aff5e86a502fda6d28ae384eb3a72b17957a0e71b8d05850fea2572eda8ac38d8c98acbcb605172bfe3408e76ec570ec1219a97f1b526922e6bcf2953e7d117b44a0f247e6b2d2c7ebecdffa106d995a1791d7ffa81a942865334fd913f35185519e790b77f33d4210321e36ebb8fd630b4f9b84267af0bc88e82addf5d8c15d629cef0a6b6ec2a4931095244447719758adb527d51e5ec058761bf3c1b277a2c345141b47658161442174e7c1e4b4c5917d975c550383d6643503c81a74d3aff4f
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 263e62852e3c323b58420de6cf15a140d4ee4bb1
                       c494ae4d858a2b16f84c2fe6603af0c580b014d0
                       dfb605ab6a6c827b01d96551b14bbdb814e09ec2
                       1055e6255ad3cc9e8cdb09f4f88a3e92e093d51c
                       53feb268184e77c88aab53df23fe0a61bc26428d
                       82ba9b1e4a12f0043d22c980a282b74b941dcee8
                       9b155971bf2c6c4ab967fee8b5c5faf003f69292
                       aaf4296a53aef60f5c354568c2b36ddb91a0c4c3
                       2d09c43fcf8286490dff81fca18b64f6b296db32
                       ef8b0de76f102ede9200f449ae50b3f1b3c0b2f1
                       8c339736cc7663cf6b5980c8055c9a8d888a6d03
                       7fa8511382e13726d4b987cc71c5c2f06cf21016
                       6e1ee472e9ca0e455d5d671411a12e6e0879492e
                       f27b42ab3a42cbb91afb15e43ccbfb3d7c75bbbc
                       6c710443ef9d4d4e9e1354d1b45f6882d6e2d980
                       23e90fb02e86d57050e01c82a8ad88f3f5547674
                       9c0fb92055e458632ab56f484c2bc243db2c5d1f
                       9454ab992de12fd08d786e76dd9747298ae74d15
                       dabfbd85cbcab44d36ed94caeaaf567b23781a7b
                       5ae6f4be
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [8b:61:84:4d:32:11:64:6d:b9:a8:d3:b7:d9:f6:30:22:57:81:3c:ab],[56:66:d1:a4]
        modulus: c2846b7759f8fd01ce60fd0c8268fdded45d38018f9a21a0927bc285af26e2747932ebd3a58435126634971e16732b4d92fc9b1ab6cf537ee869656af1b871025adcae4f7c3eb7ab6b409df46f3794b4f7dea3e49ae603077029630b0e39edfa9d2b1610509d5c212e54bac5697f74ff12c16a39980a45096d4ee9e9c49b95768e76c5cf35cf4e54bd734912f8563f89c96b892ff1d612612c8b536aac6b637a363f32e6cf178c85a1b3d5877097e84e84417fc987083349e558baa62f37a69195bbdce8029cb2168b5a735da6132bd3eb1b70e71e3c97d6f449932442c4edd3eb1899ece4b8bfb121cc729eb7fbbaa0616906b2c384589a9d02ecddf741fa17
public exponent: 10001

]