Results

By type

          2022-12-22 03:25:47,269 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-12-22 03:25:51,013 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-12-22 03:25:53.384  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Dec 22, 2022 3:26:00 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Dec 22, 2022 3:26:00 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Dec 22, 2022 3:26:00 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Dec 22, 2022 3:26:00 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-12-22 03:26:01.915 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-12-22 03:26:02.751  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-12-22 03:26:02.967  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-12-22 03:26:04.964 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-12-22 03:26:04.976 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
2022-12-22 03:26:04.980 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-12-22 03:26:04.994 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-12-22 03:26:05.074 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2022-12-22 03:26:05.078 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
	{GET [/docs]}: redirectToUi(HttpServletRequest)
2022-12-22 03:26:05.244 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-12-22 03:26:07.463 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Dec 22, 2022 3:26:08 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-12-22 03:26:09.244  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 24.67 seconds (JVM running for 31.136)
Dec 22, 2022 3:26:14 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-12-22 05:00:34.630  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-22 05:00:34.643 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-22 05:00:34.716 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-12-22 05:00:34.723 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-22 05:00:34.766  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-12-22 05:00:34.772  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-22 05:00:34.774  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-22 05:00:34.778 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-22 05:00:34.779 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-22 05:00:34.797 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-22 05:00:34.819 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-22 05:00:34.832 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-22 05:00:35.296 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-22 05:00:35.307 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-22 05:00:35.307 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-22 05:00:35.315 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-22 05:00:36.040  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-22 05:00:36.068  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-22 05:00:36.070 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-22 05:00:36.071 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-22 05:00:36.082  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-22 05:00:36.083  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-22 05:00:36.083 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-22 05:00:36.084 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-22 05:00:36.084 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-22 05:00:36.158 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-22 05:00:36.161 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-22 05:00:36.162 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-22 05:00:36.175 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-22 05:00:36.176 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-22 05:00:36.177 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-22 05:00:36.180 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-22 05:00:36.249 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 21243899847271194886328724035968118052931249094
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Dec 22 02:55:46 UTC 2022
           Final Date: Tue Dec 21 02:55:45 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [09:51:99:b3:01:8e:60:73:72:91:4e:69:0d:2b:9e:36:7a:42:64:88],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5b9c7af186cb2e111326bbad55993d4a2cf9c0b5
                       10e2242e1dfa8ba3053f7f234f7549f80fe3d8a2
                       593f15cfb1220e6167fee0c883f3c33dc3643aef
                       086f9664777d47ccd3a750d900aaaf3311dd1079
                       1315e37c58cd0c1d313a69261bca040cd262920a
                       0e35acac8c05e6877ecb17ce6ae1c22506e06985
                       1f3b554db9b0e99dd3d8f4c654ff82c26ffeee41
                       00649a6c4c9cd6d4c8992e8cfa1b5086b1f713ff
                       fbe8afb514ee3517cabe76fae82527b21b4b19bf
                       870536858fd0428159d6a6b627acb0946051573a
                       603379f9a61297a4495bfb7c6b155c45b805c282
                       80df7c7f0ab0d49214b90d4464e1941313758d59
                       9e66283f55bda793f47266f27359c191e850df2a
                       07bc6005a9380121ab24ccd64dc47da2927683df
                       ea7dcc9c2e2540f216e524bac50b3470ad8e95c8
                       617b96bf35f1dee030b21422f72a931706248dc0
                       16dd6a0b69a6bc23d993db571ffda64a38be4b93
                       fa2f0dc42665a5b6776006777ca3c73ec826c638
                       f7a595f591d6505d66e82c21cb7ba2f384d8568b
                       fa6e5f2d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [10:fa:00:ef:75:91:68:82:ad:a2:af:b5:d4:d7:21:e8:79:27:f5:f9],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-12-22 05:02:36.615  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-22 05:02:36.619 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-22 05:02:36.623 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-12-22 05:02:36.626 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-22 05:02:36.628  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-12-22 05:02:36.630  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-22 05:02:36.633  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-22 05:02:36.635 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-22 05:02:36.637 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-22 05:02:36.638 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-22 05:02:36.674 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-22 05:02:36.676 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-22 05:02:36.677 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-22 05:02:36.678 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-22 05:02:36.861  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-22 05:02:36.862  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-22 05:02:36.863 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-22 05:02:36.864 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-22 05:02:36.869  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-22 05:02:36.870  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-22 05:02:36.871 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-22 05:02:36.872 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-22 05:02:36.873 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-22 05:02:36.876 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-22 05:02:36.876 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-22 05:02:36.888 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-22 05:02:36.889 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-22 05:02:36.890 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-22 05:02:36.890 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-22 05:02:36.893 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-22 05:02:36.900 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 21243899847271194886328724035968118052931249094
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Dec 22 02:55:46 UTC 2022
           Final Date: Tue Dec 21 02:55:45 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [09:51:99:b3:01:8e:60:73:72:91:4e:69:0d:2b:9e:36:7a:42:64:88],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5b9c7af186cb2e111326bbad55993d4a2cf9c0b5
                       10e2242e1dfa8ba3053f7f234f7549f80fe3d8a2
                       593f15cfb1220e6167fee0c883f3c33dc3643aef
                       086f9664777d47ccd3a750d900aaaf3311dd1079
                       1315e37c58cd0c1d313a69261bca040cd262920a
                       0e35acac8c05e6877ecb17ce6ae1c22506e06985
                       1f3b554db9b0e99dd3d8f4c654ff82c26ffeee41
                       00649a6c4c9cd6d4c8992e8cfa1b5086b1f713ff
                       fbe8afb514ee3517cabe76fae82527b21b4b19bf
                       870536858fd0428159d6a6b627acb0946051573a
                       603379f9a61297a4495bfb7c6b155c45b805c282
                       80df7c7f0ab0d49214b90d4464e1941313758d59
                       9e66283f55bda793f47266f27359c191e850df2a
                       07bc6005a9380121ab24ccd64dc47da2927683df
                       ea7dcc9c2e2540f216e524bac50b3470ad8e95c8
                       617b96bf35f1dee030b21422f72a931706248dc0
                       16dd6a0b69a6bc23d993db571ffda64a38be4b93
                       fa2f0dc42665a5b6776006777ca3c73ec826c638
                       f7a595f591d6505d66e82c21cb7ba2f384d8568b
                       fa6e5f2d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [6f:93:87:e4:2f:b8:de:22:7a:01:5b:5c:0b:64:5d:f0:72:30:0a:b6],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-12-22 05:04:37.183  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-22 05:04:37.185 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-22 05:04:37.187 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-12-22 05:04:37.188 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-22 05:04:37.190  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-12-22 05:04:37.191  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-22 05:04:37.192  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-22 05:04:37.193 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-22 05:04:37.193 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-22 05:04:37.195 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-22 05:04:37.214 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-22 05:04:37.215 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-22 05:04:37.215 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-22 05:04:37.216 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-22 05:04:37.353  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-22 05:04:37.353  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-22 05:04:37.354 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-22 05:04:37.354 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-22 05:04:37.369  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-22 05:04:37.370  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-22 05:04:37.370 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-22 05:04:37.371 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-22 05:04:37.375 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-22 05:04:37.387 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-22 05:04:37.388 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-22 05:04:37.389 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-22 05:04:37.390 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-22 05:04:37.390 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-22 05:04:37.391 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-22 05:04:37.393 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-22 05:04:37.402 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 21243899847271194886328724035968118052931249094
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Dec 22 02:55:46 UTC 2022
           Final Date: Tue Dec 21 02:55:45 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [09:51:99:b3:01:8e:60:73:72:91:4e:69:0d:2b:9e:36:7a:42:64:88],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5b9c7af186cb2e111326bbad55993d4a2cf9c0b5
                       10e2242e1dfa8ba3053f7f234f7549f80fe3d8a2
                       593f15cfb1220e6167fee0c883f3c33dc3643aef
                       086f9664777d47ccd3a750d900aaaf3311dd1079
                       1315e37c58cd0c1d313a69261bca040cd262920a
                       0e35acac8c05e6877ecb17ce6ae1c22506e06985
                       1f3b554db9b0e99dd3d8f4c654ff82c26ffeee41
                       00649a6c4c9cd6d4c8992e8cfa1b5086b1f713ff
                       fbe8afb514ee3517cabe76fae82527b21b4b19bf
                       870536858fd0428159d6a6b627acb0946051573a
                       603379f9a61297a4495bfb7c6b155c45b805c282
                       80df7c7f0ab0d49214b90d4464e1941313758d59
                       9e66283f55bda793f47266f27359c191e850df2a
                       07bc6005a9380121ab24ccd64dc47da2927683df
                       ea7dcc9c2e2540f216e524bac50b3470ad8e95c8
                       617b96bf35f1dee030b21422f72a931706248dc0
                       16dd6a0b69a6bc23d993db571ffda64a38be4b93
                       fa2f0dc42665a5b6776006777ca3c73ec826c638
                       f7a595f591d6505d66e82c21cb7ba2f384d8568b
                       fa6e5f2d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [2d:04:43:82:db:d2:6a:b0:3b:47:6b:b6:17:1a:4b:54:f9:d0:4f:05],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-12-22 05:08:00.116  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-22 05:08:00.120 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-22 05:08:00.126 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-12-22 05:08:00.129 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-22 05:08:00.130  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-12-22 05:08:00.134  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-22 05:08:00.136  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-22 05:08:00.138 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-22 05:08:00.141 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-22 05:08:00.147 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-22 05:08:00.165 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-22 05:08:00.166 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-22 05:08:00.166 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-22 05:08:00.167 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-22 05:08:00.297  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-22 05:08:00.299  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-22 05:08:00.300 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-22 05:08:00.301 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-22 05:08:00.303  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-22 05:08:00.304  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-22 05:08:00.305 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-22 05:08:00.306 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-22 05:08:00.306 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-22 05:08:00.307 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-22 05:08:00.308 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-22 05:08:00.309 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-22 05:08:00.312 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-22 05:08:00.313 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-22 05:08:00.314 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-22 05:08:00.317 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-22 05:08:00.339 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 21243899847271194886328724035968118052931249094
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Dec 22 02:55:46 UTC 2022
           Final Date: Tue Dec 21 02:55:45 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [09:51:99:b3:01:8e:60:73:72:91:4e:69:0d:2b:9e:36:7a:42:64:88],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5b9c7af186cb2e111326bbad55993d4a2cf9c0b5
                       10e2242e1dfa8ba3053f7f234f7549f80fe3d8a2
                       593f15cfb1220e6167fee0c883f3c33dc3643aef
                       086f9664777d47ccd3a750d900aaaf3311dd1079
                       1315e37c58cd0c1d313a69261bca040cd262920a
                       0e35acac8c05e6877ecb17ce6ae1c22506e06985
                       1f3b554db9b0e99dd3d8f4c654ff82c26ffeee41
                       00649a6c4c9cd6d4c8992e8cfa1b5086b1f713ff
                       fbe8afb514ee3517cabe76fae82527b21b4b19bf
                       870536858fd0428159d6a6b627acb0946051573a
                       603379f9a61297a4495bfb7c6b155c45b805c282
                       80df7c7f0ab0d49214b90d4464e1941313758d59
                       9e66283f55bda793f47266f27359c191e850df2a
                       07bc6005a9380121ab24ccd64dc47da2927683df
                       ea7dcc9c2e2540f216e524bac50b3470ad8e95c8
                       617b96bf35f1dee030b21422f72a931706248dc0
                       16dd6a0b69a6bc23d993db571ffda64a38be4b93
                       fa2f0dc42665a5b6776006777ca3c73ec826c638
                       f7a595f591d6505d66e82c21cb7ba2f384d8568b
                       fa6e5f2d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [bc:8e:ff:ac:79:a8:94:3d:8f:c8:cf:eb:c0:ec:4c:7b:58:53:5a:bf],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-12-22 05:15:30.234  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-22 05:15:30.235 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-22 05:15:30.238 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-12-22 05:15:30.239 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-22 05:15:30.240  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-12-22 05:15:30.241  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-22 05:15:30.242  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-22 05:15:30.243 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-22 05:15:30.243 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-22 05:15:30.244 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-22 05:15:30.259 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-22 05:15:30.260 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-22 05:15:30.260 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-22 05:15:30.260 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-22 05:15:30.431  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-22 05:15:30.432  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-22 05:15:30.432 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-22 05:15:30.434 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-22 05:15:30.436  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-22 05:15:30.438  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-22 05:15:30.439 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-22 05:15:30.440 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-22 05:15:30.441 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-22 05:15:30.442 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-22 05:15:30.442 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-22 05:15:30.443 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-22 05:15:30.443 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-22 05:15:30.444 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-22 05:15:30.444 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-22 05:15:30.445 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-22 05:15:30.453 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 21243899847271194886328724035968118052931249094
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Dec 22 02:55:46 UTC 2022
           Final Date: Tue Dec 21 02:55:45 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [09:51:99:b3:01:8e:60:73:72:91:4e:69:0d:2b:9e:36:7a:42:64:88],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5b9c7af186cb2e111326bbad55993d4a2cf9c0b5
                       10e2242e1dfa8ba3053f7f234f7549f80fe3d8a2
                       593f15cfb1220e6167fee0c883f3c33dc3643aef
                       086f9664777d47ccd3a750d900aaaf3311dd1079
                       1315e37c58cd0c1d313a69261bca040cd262920a
                       0e35acac8c05e6877ecb17ce6ae1c22506e06985
                       1f3b554db9b0e99dd3d8f4c654ff82c26ffeee41
                       00649a6c4c9cd6d4c8992e8cfa1b5086b1f713ff
                       fbe8afb514ee3517cabe76fae82527b21b4b19bf
                       870536858fd0428159d6a6b627acb0946051573a
                       603379f9a61297a4495bfb7c6b155c45b805c282
                       80df7c7f0ab0d49214b90d4464e1941313758d59
                       9e66283f55bda793f47266f27359c191e850df2a
                       07bc6005a9380121ab24ccd64dc47da2927683df
                       ea7dcc9c2e2540f216e524bac50b3470ad8e95c8
                       617b96bf35f1dee030b21422f72a931706248dc0
                       16dd6a0b69a6bc23d993db571ffda64a38be4b93
                       fa2f0dc42665a5b6776006777ca3c73ec826c638
                       f7a595f591d6505d66e82c21cb7ba2f384d8568b
                       fa6e5f2d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [22:77:b1:d8:d3:74:68:86:47:a2:3e:c0:30:d1:ba:6d:ff:3f:73:a9],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-12-22 05:21:32.968  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-22 05:21:32.971 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-22 05:21:32.974 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-12-22 05:21:32.976 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-22 05:21:32.976  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-12-22 05:21:32.977  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-22 05:21:32.978  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-22 05:21:32.979 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-22 05:21:32.979 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-22 05:21:32.980 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-22 05:21:32.995 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-22 05:21:32.999 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-22 05:21:33.000 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-22 05:21:33.001 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-22 05:21:33.138  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-22 05:21:33.139  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-22 05:21:33.140 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-22 05:21:33.140 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-22 05:21:33.142  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-22 05:21:33.143  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-22 05:21:33.144 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-22 05:21:33.145 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-22 05:21:33.145 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-22 05:21:33.146 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-22 05:21:33.147 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-22 05:21:33.147 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-22 05:21:33.149 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-22 05:21:33.149 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-22 05:21:33.150 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-22 05:21:33.151 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-22 05:21:33.155 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 21243899847271194886328724035968118052931249094
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Dec 22 02:55:46 UTC 2022
           Final Date: Tue Dec 21 02:55:45 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [09:51:99:b3:01:8e:60:73:72:91:4e:69:0d:2b:9e:36:7a:42:64:88],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5b9c7af186cb2e111326bbad55993d4a2cf9c0b5
                       10e2242e1dfa8ba3053f7f234f7549f80fe3d8a2
                       593f15cfb1220e6167fee0c883f3c33dc3643aef
                       086f9664777d47ccd3a750d900aaaf3311dd1079
                       1315e37c58cd0c1d313a69261bca040cd262920a
                       0e35acac8c05e6877ecb17ce6ae1c22506e06985
                       1f3b554db9b0e99dd3d8f4c654ff82c26ffeee41
                       00649a6c4c9cd6d4c8992e8cfa1b5086b1f713ff
                       fbe8afb514ee3517cabe76fae82527b21b4b19bf
                       870536858fd0428159d6a6b627acb0946051573a
                       603379f9a61297a4495bfb7c6b155c45b805c282
                       80df7c7f0ab0d49214b90d4464e1941313758d59
                       9e66283f55bda793f47266f27359c191e850df2a
                       07bc6005a9380121ab24ccd64dc47da2927683df
                       ea7dcc9c2e2540f216e524bac50b3470ad8e95c8
                       617b96bf35f1dee030b21422f72a931706248dc0
                       16dd6a0b69a6bc23d993db571ffda64a38be4b93
                       fa2f0dc42665a5b6776006777ca3c73ec826c638
                       f7a595f591d6505d66e82c21cb7ba2f384d8568b
                       fa6e5f2d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [30:16:d1:8e:06:a3:d6:d0:4d:af:3e:c5:08:21:b5:18:2d:9d:57:f7],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-12-22 05:29:09.420  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-22 05:29:09.422 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-22 05:29:09.424 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-12-22 05:29:09.425 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-22 05:29:09.425  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-12-22 05:29:09.427  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-22 05:29:09.427  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-22 05:29:09.428 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-22 05:29:09.429 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-22 05:29:09.429 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-22 05:29:09.449 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-22 05:29:09.462 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-22 05:29:09.463 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-22 05:29:09.464 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-22 05:29:09.610  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-22 05:29:09.611  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-22 05:29:09.611 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-22 05:29:09.612 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-22 05:29:09.613  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-22 05:29:09.614  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-22 05:29:09.614 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-22 05:29:09.615 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-22 05:29:09.615 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-22 05:29:09.618 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-22 05:29:09.619 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-22 05:29:09.621 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-22 05:29:09.622 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-22 05:29:09.624 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-22 05:29:09.625 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-22 05:29:09.626 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-22 05:29:09.631 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 21243899847271194886328724035968118052931249094
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Dec 22 02:55:46 UTC 2022
           Final Date: Tue Dec 21 02:55:45 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [09:51:99:b3:01:8e:60:73:72:91:4e:69:0d:2b:9e:36:7a:42:64:88],[56:66:d1:a4]
        modulus: dbc44b574a4a185dceec880d90221da150b35b287b766f897e9fb18b25a7cd660f963da0ee56b2b7f44f727867d5966ccde40419ae3a0a0f828e81efb9b02450fdd38f35260025e26043e1679a82cbed5534c92b2b09cbd7c45362e09a5286065316af19a3e5d2ec03836fca44b4a2991b71cbd17e1ef47b4fdbaf6fce24d967bc2eb977bbeb4adb7bd7862150652f6cc82353b49aaaca305ff9ae31ca053f36c4972f924c347dee9e56edf2a2a99e12e47dbc539836e762fcef212f82bfd60ce1b2b7a7df6102cc2a22e41304bb68369fa807696caac356d5aa0b1621fcff3d373feb48dceaf1d6c1f0362c234125657d627225c9a485766f120d40ed5f1c107378d9ddcb490653b4c9e4a8385e4324515f82089365a42c9341fe373a5a15dc36d676328eb3f62ce619b50754512eaa3c90d33bc48870b0b23469fa42c5b375148f1ca3559dbc0a970d6b0f404da018063c3be11ac82dd75d10c58e9a024b2fdc803b9d52559b22abf38fb25f124a4f12de030edc852a600a27dc99f7c9a473
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5b9c7af186cb2e111326bbad55993d4a2cf9c0b5
                       10e2242e1dfa8ba3053f7f234f7549f80fe3d8a2
                       593f15cfb1220e6167fee0c883f3c33dc3643aef
                       086f9664777d47ccd3a750d900aaaf3311dd1079
                       1315e37c58cd0c1d313a69261bca040cd262920a
                       0e35acac8c05e6877ecb17ce6ae1c22506e06985
                       1f3b554db9b0e99dd3d8f4c654ff82c26ffeee41
                       00649a6c4c9cd6d4c8992e8cfa1b5086b1f713ff
                       fbe8afb514ee3517cabe76fae82527b21b4b19bf
                       870536858fd0428159d6a6b627acb0946051573a
                       603379f9a61297a4495bfb7c6b155c45b805c282
                       80df7c7f0ab0d49214b90d4464e1941313758d59
                       9e66283f55bda793f47266f27359c191e850df2a
                       07bc6005a9380121ab24ccd64dc47da2927683df
                       ea7dcc9c2e2540f216e524bac50b3470ad8e95c8
                       617b96bf35f1dee030b21422f72a931706248dc0
                       16dd6a0b69a6bc23d993db571ffda64a38be4b93
                       fa2f0dc42665a5b6776006777ca3c73ec826c638
                       f7a595f591d6505d66e82c21cb7ba2f384d8568b
                       fa6e5f2d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [3f:ef:68:9f:1e:50:41:79:e5:56:8c:49:ac:e4:93:aa:f0:a8:38:0c],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-12-22 05:35:11.058  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-22 05:35:11.062 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-22 05:35:11.066 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-12-22 05:35:11.068 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-22 05:35:11.069  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-12-22 05:35:11.070  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-22 05:35:11.071  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-22 05:35:11.072 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-22 05:35:11.073 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-22 05:35:11.084 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-22 05:35:11.092 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-22 05:35:11.094 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-22 05:35:11.094 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-22 05:35:11.096 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-22 05:35:11.256  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-22 05:35:11.257  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-22 05:35:11.257 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-22 05:35:11.258 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-22 05:35:11.260  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-22 05:35:11.260  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-22 05:35:11.262 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-22 05:35:11.263 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-22 05:35:11.264 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-22 05:35:11.267 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-22 05:35:11.269 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-22 05:35:11.270 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-22 05:35:11.273 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-22 05:35:11.274 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-22 05:35:11.274 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-22 05:35:11.279 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-22 05:35:11.291 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 21243899847271194886328724035968118052931249094
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Dec 22 02:55:46 UTC 2022
           Final Date: Tue Dec 21 02:55:45 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [09:51:99:b3:01:8e:60:73:72:91:4e:69:0d:2b:9e:36:7a:42:64:88],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5b9c7af186cb2e111326bbad55993d4a2cf9c0b5
                       10e2242e1dfa8ba3053f7f234f7549f80fe3d8a2
                       593f15cfb1220e6167fee0c883f3c33dc3643aef
                       086f9664777d47ccd3a750d900aaaf3311dd1079
                       1315e37c58cd0c1d313a69261bca040cd262920a
                       0e35acac8c05e6877ecb17ce6ae1c22506e06985
                       1f3b554db9b0e99dd3d8f4c654ff82c26ffeee41
                       00649a6c4c9cd6d4c8992e8cfa1b5086b1f713ff
                       fbe8afb514ee3517cabe76fae82527b21b4b19bf
                       870536858fd0428159d6a6b627acb0946051573a
                       603379f9a61297a4495bfb7c6b155c45b805c282
                       80df7c7f0ab0d49214b90d4464e1941313758d59
                       9e66283f55bda793f47266f27359c191e850df2a
                       07bc6005a9380121ab24ccd64dc47da2927683df
                       ea7dcc9c2e2540f216e524bac50b3470ad8e95c8
                       617b96bf35f1dee030b21422f72a931706248dc0
                       16dd6a0b69a6bc23d993db571ffda64a38be4b93
                       fa2f0dc42665a5b6776006777ca3c73ec826c638
                       f7a595f591d6505d66e82c21cb7ba2f384d8568b
                       fa6e5f2d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [d7:1b:bd:ad:a6:6d:69:b4:aa:b4:4a:bb:3c:c2:93:2d:1b:48:e2:c1],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-12-22 05:41:58.252  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-22 05:41:58.256 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-22 05:41:58.259 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-12-22 05:41:58.261 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-22 05:41:58.262  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-12-22 05:41:58.266  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-22 05:41:58.267  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-22 05:41:58.276 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-22 05:41:58.276 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-22 05:41:58.277 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-22 05:41:58.282 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-22 05:41:58.288 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-22 05:41:58.289 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-22 05:41:58.290 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-22 05:41:58.466  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-22 05:41:58.467  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-22 05:41:58.467 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-22 05:41:58.468 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-22 05:41:58.469  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-22 05:41:58.470  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-22 05:41:58.471 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-22 05:41:58.471 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-22 05:41:58.471 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-22 05:41:58.472 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-22 05:41:58.473 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-22 05:41:58.473 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-22 05:41:58.474 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-22 05:41:58.474 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-22 05:41:58.475 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-22 05:41:58.475 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-22 05:41:58.479 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 21243899847271194886328724035968118052931249094
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Dec 22 02:55:46 UTC 2022
           Final Date: Tue Dec 21 02:55:45 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [09:51:99:b3:01:8e:60:73:72:91:4e:69:0d:2b:9e:36:7a:42:64:88],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5b9c7af186cb2e111326bbad55993d4a2cf9c0b5
                       10e2242e1dfa8ba3053f7f234f7549f80fe3d8a2
                       593f15cfb1220e6167fee0c883f3c33dc3643aef
                       086f9664777d47ccd3a750d900aaaf3311dd1079
                       1315e37c58cd0c1d313a69261bca040cd262920a
                       0e35acac8c05e6877ecb17ce6ae1c22506e06985
                       1f3b554db9b0e99dd3d8f4c654ff82c26ffeee41
                       00649a6c4c9cd6d4c8992e8cfa1b5086b1f713ff
                       fbe8afb514ee3517cabe76fae82527b21b4b19bf
                       870536858fd0428159d6a6b627acb0946051573a
                       603379f9a61297a4495bfb7c6b155c45b805c282
                       80df7c7f0ab0d49214b90d4464e1941313758d59
                       9e66283f55bda793f47266f27359c191e850df2a
                       07bc6005a9380121ab24ccd64dc47da2927683df
                       ea7dcc9c2e2540f216e524bac50b3470ad8e95c8
                       617b96bf35f1dee030b21422f72a931706248dc0
                       16dd6a0b69a6bc23d993db571ffda64a38be4b93
                       fa2f0dc42665a5b6776006777ca3c73ec826c638
                       f7a595f591d6505d66e82c21cb7ba2f384d8568b
                       fa6e5f2d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [73:f0:bd:36:39:dd:bb:0a:ac:a3:81:b1:02:75:44:0f:ac:79:c5:ba],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-12-22 05:49:58.033  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-22 05:49:58.037 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-22 05:49:58.047 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-12-22 05:49:58.049 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-22 05:49:58.052  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-12-22 05:49:58.055  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-22 05:49:58.058  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-22 05:49:58.062 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-22 05:49:58.064 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-22 05:49:58.065 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-22 05:49:58.071 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-22 05:49:58.072 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-22 05:49:58.073 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-22 05:49:58.073 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-22 05:49:58.247  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-22 05:49:58.248  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-22 05:49:58.248 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-22 05:49:58.248 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-22 05:49:58.250  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-22 05:49:58.250  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-22 05:49:58.251 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-22 05:49:58.251 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-22 05:49:58.251 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-22 05:49:58.252 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-22 05:49:58.253 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-22 05:49:58.253 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-22 05:49:58.253 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-22 05:49:58.254 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-22 05:49:58.254 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-22 05:49:58.255 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-22 05:49:58.258 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 21243899847271194886328724035968118052931249094
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Dec 22 02:55:46 UTC 2022
           Final Date: Tue Dec 21 02:55:45 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [09:51:99:b3:01:8e:60:73:72:91:4e:69:0d:2b:9e:36:7a:42:64:88],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5b9c7af186cb2e111326bbad55993d4a2cf9c0b5
                       10e2242e1dfa8ba3053f7f234f7549f80fe3d8a2
                       593f15cfb1220e6167fee0c883f3c33dc3643aef
                       086f9664777d47ccd3a750d900aaaf3311dd1079
                       1315e37c58cd0c1d313a69261bca040cd262920a
                       0e35acac8c05e6877ecb17ce6ae1c22506e06985
                       1f3b554db9b0e99dd3d8f4c654ff82c26ffeee41
                       00649a6c4c9cd6d4c8992e8cfa1b5086b1f713ff
                       fbe8afb514ee3517cabe76fae82527b21b4b19bf
                       870536858fd0428159d6a6b627acb0946051573a
                       603379f9a61297a4495bfb7c6b155c45b805c282
                       80df7c7f0ab0d49214b90d4464e1941313758d59
                       9e66283f55bda793f47266f27359c191e850df2a
                       07bc6005a9380121ab24ccd64dc47da2927683df
                       ea7dcc9c2e2540f216e524bac50b3470ad8e95c8
                       617b96bf35f1dee030b21422f72a931706248dc0
                       16dd6a0b69a6bc23d993db571ffda64a38be4b93
                       fa2f0dc42665a5b6776006777ca3c73ec826c638
                       f7a595f591d6505d66e82c21cb7ba2f384d8568b
                       fa6e5f2d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [e3:89:23:b0:c8:b6:06:98:c7:16:9f:89:61:ad:8f:88:11:c0:56:b0],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-12-22 05:50:15.147  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-22 05:50:15.148 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-22 05:50:15.149 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-12-22 05:50:15.150 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-22 05:50:15.150  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-12-22 05:50:15.153  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-22 05:50:15.153  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-22 05:50:15.153 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-22 05:50:15.154 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-22 05:50:15.154 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-22 05:50:15.159 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-22 05:50:15.159 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-22 05:50:15.160 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-22 05:50:15.160 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-22 05:50:15.271  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-22 05:50:15.272  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-22 05:50:15.272 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-22 05:50:15.273 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-22 05:50:15.275  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-22 05:50:15.277  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-22 05:50:15.280 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-22 05:50:15.281 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-22 05:50:15.283 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-22 05:50:15.292 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-22 05:50:15.293 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-22 05:50:15.294 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-22 05:50:15.295 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-22 05:50:15.296 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-22 05:50:15.296 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-22 05:50:15.297 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-22 05:50:15.302 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 21243899847271194886328724035968118052931249094
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Dec 22 02:55:46 UTC 2022
           Final Date: Tue Dec 21 02:55:45 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [09:51:99:b3:01:8e:60:73:72:91:4e:69:0d:2b:9e:36:7a:42:64:88],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5b9c7af186cb2e111326bbad55993d4a2cf9c0b5
                       10e2242e1dfa8ba3053f7f234f7549f80fe3d8a2
                       593f15cfb1220e6167fee0c883f3c33dc3643aef
                       086f9664777d47ccd3a750d900aaaf3311dd1079
                       1315e37c58cd0c1d313a69261bca040cd262920a
                       0e35acac8c05e6877ecb17ce6ae1c22506e06985
                       1f3b554db9b0e99dd3d8f4c654ff82c26ffeee41
                       00649a6c4c9cd6d4c8992e8cfa1b5086b1f713ff
                       fbe8afb514ee3517cabe76fae82527b21b4b19bf
                       870536858fd0428159d6a6b627acb0946051573a
                       603379f9a61297a4495bfb7c6b155c45b805c282
                       80df7c7f0ab0d49214b90d4464e1941313758d59
                       9e66283f55bda793f47266f27359c191e850df2a
                       07bc6005a9380121ab24ccd64dc47da2927683df
                       ea7dcc9c2e2540f216e524bac50b3470ad8e95c8
                       617b96bf35f1dee030b21422f72a931706248dc0
                       16dd6a0b69a6bc23d993db571ffda64a38be4b93
                       fa2f0dc42665a5b6776006777ca3c73ec826c638
                       f7a595f591d6505d66e82c21cb7ba2f384d8568b
                       fa6e5f2d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [5f:f6:0f:04:24:7f:23:a0:65:37:fa:f6:2a:f9:bd:f8:0f:d0:0e:8f],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-12-22 06:15:52.675  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-22 06:15:52.679 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-22 06:15:52.682 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-12-22 06:15:52.683 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-22 06:15:52.684  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-12-22 06:15:52.685  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-22 06:15:52.685  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-22 06:15:52.686 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-22 06:15:52.686 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-22 06:15:52.687 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-22 06:15:52.704 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-22 06:15:52.705 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-22 06:15:52.705 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-22 06:15:52.706 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-22 06:15:52.845  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-22 06:15:52.846  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-22 06:15:52.847 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-22 06:15:52.847 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-22 06:15:52.849  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-22 06:15:52.850  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-22 06:15:52.851 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-22 06:15:52.851 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-22 06:15:52.851 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-22 06:15:52.853 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-22 06:15:52.853 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-22 06:15:52.853 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-22 06:15:52.854 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-22 06:15:52.855 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-22 06:15:52.856 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-22 06:15:52.857 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-22 06:15:52.861 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 21243899847271194886328724035968118052931249094
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Dec 22 02:55:46 UTC 2022
           Final Date: Tue Dec 21 02:55:45 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [09:51:99:b3:01:8e:60:73:72:91:4e:69:0d:2b:9e:36:7a:42:64:88],[56:66:d1:a4]
        modulus: dbc44b574a4a185dceec880d90221da150b35b287b766f897e9fb18b25a7cd660f963da0ee56b2b7f44f727867d5966ccde40419ae3a0a0f828e81efb9b02450fdd38f35260025e26043e1679a82cbed5534c92b2b09cbd7c45362e09a5286065316af19a3e5d2ec03836fca44b4a2991b71cbd17e1ef47b4fdbaf6fce24d967bc2eb977bbeb4adb7bd7862150652f6cc82353b49aaaca305ff9ae31ca053f36c4972f924c347dee9e56edf2a2a99e12e47dbc539836e762fcef212f82bfd60ce1b2b7a7df6102cc2a22e41304bb68369fa807696caac356d5aa0b1621fcff3d373feb48dceaf1d6c1f0362c234125657d627225c9a485766f120d40ed5f1c107378d9ddcb490653b4c9e4a8385e4324515f82089365a42c9341fe373a5a15dc36d676328eb3f62ce619b50754512eaa3c90d33bc48870b0b23469fa42c5b375148f1ca3559dbc0a970d6b0f404da018063c3be11ac82dd75d10c58e9a024b2fdc803b9d52559b22abf38fb25f124a4f12de030edc852a600a27dc99f7c9a473
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5b9c7af186cb2e111326bbad55993d4a2cf9c0b5
                       10e2242e1dfa8ba3053f7f234f7549f80fe3d8a2
                       593f15cfb1220e6167fee0c883f3c33dc3643aef
                       086f9664777d47ccd3a750d900aaaf3311dd1079
                       1315e37c58cd0c1d313a69261bca040cd262920a
                       0e35acac8c05e6877ecb17ce6ae1c22506e06985
                       1f3b554db9b0e99dd3d8f4c654ff82c26ffeee41
                       00649a6c4c9cd6d4c8992e8cfa1b5086b1f713ff
                       fbe8afb514ee3517cabe76fae82527b21b4b19bf
                       870536858fd0428159d6a6b627acb0946051573a
                       603379f9a61297a4495bfb7c6b155c45b805c282
                       80df7c7f0ab0d49214b90d4464e1941313758d59
                       9e66283f55bda793f47266f27359c191e850df2a
                       07bc6005a9380121ab24ccd64dc47da2927683df
                       ea7dcc9c2e2540f216e524bac50b3470ad8e95c8
                       617b96bf35f1dee030b21422f72a931706248dc0
                       16dd6a0b69a6bc23d993db571ffda64a38be4b93
                       fa2f0dc42665a5b6776006777ca3c73ec826c638
                       f7a595f591d6505d66e82c21cb7ba2f384d8568b
                       fa6e5f2d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [07:d4:5f:07:15:d6:7c:55:78:23:97:0c:30:cd:ee:cd:20:65:21:86],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-12-22 06:15:58.194  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-22 06:15:58.198 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-22 06:15:58.201 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-12-22 06:15:58.202 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-22 06:15:58.202  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-12-22 06:15:58.204  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-22 06:15:58.205  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-22 06:15:58.206 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-22 06:15:58.207 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-22 06:15:58.208 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-22 06:15:58.217 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-22 06:15:58.219 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-22 06:15:58.220 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-22 06:15:58.221 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-22 06:15:58.348  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-22 06:15:58.349  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-22 06:15:58.351 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-22 06:15:58.351 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-22 06:15:58.353  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-22 06:15:58.354  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-22 06:15:58.354 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-22 06:15:58.354 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-22 06:15:58.355 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-22 06:15:58.355 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-22 06:15:58.356 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-22 06:15:58.356 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-22 06:15:58.357 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-22 06:15:58.357 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-22 06:15:58.357 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-22 06:15:58.359 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-22 06:15:58.363 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 21243899847271194886328724035968118052931249094
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Dec 22 02:55:46 UTC 2022
           Final Date: Tue Dec 21 02:55:45 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [09:51:99:b3:01:8e:60:73:72:91:4e:69:0d:2b:9e:36:7a:42:64:88],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5b9c7af186cb2e111326bbad55993d4a2cf9c0b5
                       10e2242e1dfa8ba3053f7f234f7549f80fe3d8a2
                       593f15cfb1220e6167fee0c883f3c33dc3643aef
                       086f9664777d47ccd3a750d900aaaf3311dd1079
                       1315e37c58cd0c1d313a69261bca040cd262920a
                       0e35acac8c05e6877ecb17ce6ae1c22506e06985
                       1f3b554db9b0e99dd3d8f4c654ff82c26ffeee41
                       00649a6c4c9cd6d4c8992e8cfa1b5086b1f713ff
                       fbe8afb514ee3517cabe76fae82527b21b4b19bf
                       870536858fd0428159d6a6b627acb0946051573a
                       603379f9a61297a4495bfb7c6b155c45b805c282
                       80df7c7f0ab0d49214b90d4464e1941313758d59
                       9e66283f55bda793f47266f27359c191e850df2a
                       07bc6005a9380121ab24ccd64dc47da2927683df
                       ea7dcc9c2e2540f216e524bac50b3470ad8e95c8
                       617b96bf35f1dee030b21422f72a931706248dc0
                       16dd6a0b69a6bc23d993db571ffda64a38be4b93
                       fa2f0dc42665a5b6776006777ca3c73ec826c638
                       f7a595f591d6505d66e82c21cb7ba2f384d8568b
                       fa6e5f2d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [a2:ee:ac:0a:bb:9a:f4:59:cf:f1:58:63:b1:e4:de:3b:b9:2a:d4:8c],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

]