Results

By type

          2022-12-30 03:16:39,899 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-12-30 03:16:41,280 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-12-30 03:16:42.020  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Dec 30, 2022 3:16:43 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Dec 30, 2022 3:16:43 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Dec 30, 2022 3:16:43 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Dec 30, 2022 3:16:43 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-12-30 03:16:44.489 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-12-30 03:16:44.785  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-12-30 03:16:44.985  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-12-30 03:16:45.687 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-12-30 03:16:45.689 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
2022-12-30 03:16:45.691 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-12-30 03:16:45.695 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-12-30 03:16:45.733 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2022-12-30 03:16:45.736 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/docs]}: redirectToUi(HttpServletRequest)
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
2022-12-30 03:16:45.862 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-12-30 03:16:46.420 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Dec 30, 2022 3:16:47 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-12-30 03:16:47.349  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 8.353 seconds (JVM running for 10.167)
Dec 30, 2022 3:17:16 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-12-30 03:17:52.611  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-30 03:17:52.634 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-30 03:17:52.677 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-12-30 03:17:52.681 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-30 03:17:52.702  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-12-30 03:17:52.705  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-30 03:17:52.706  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-30 03:17:52.707 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-30 03:17:52.708 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-30 03:17:52.712 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-30 03:17:52.722 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-30 03:17:52.726 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-30 03:17:52.783 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-30 03:17:52.795 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-30 03:17:52.796 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-30 03:17:52.804 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-30 03:17:53.796  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-30 03:17:53.798  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-30 03:17:53.799 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-30 03:17:53.800 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-30 03:17:53.825  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-30 03:17:53.827  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-30 03:17:53.828 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-30 03:17:53.828 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-30 03:17:53.829 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-30 03:17:53.844 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-30 03:17:53.844 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-30 03:17:53.845 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-30 03:17:53.851 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-30 03:17:53.851 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-30 03:17:53.851 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-30 03:17:53.853 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-30 03:17:53.900 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 505061792023527940250051494246617336117282465964
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Dec 30 03:13:24 UTC 2022
           Final Date: Wed Dec 29 03:13:23 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [de:89:69:5b:e3:fc:f1:ea:b1:d0:89:01:02:03:74:46:c8:b4:d3:00],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 04e50459685b43195c8065591015adb679390178
                       4368a7fe4dbc21503b3ec81cb0176e2164a21a86
                       f381eae14e39813e69ed8220b83a9237c2b7ebb4
                       4aaf1ad4f4d36fc555ecad01d61d72ca2416b687
                       d097e1b3edea35ef37cadbe6b6c1526251d74a13
                       0bc52da0d91022d99cf974eb7371e0b695123a07
                       d1c9ba709278bbde250476c654e60eb8b9770389
                       aaf2364653f317c6263cdfb695f1f495ccb18008
                       0f11fd3e00ca68b1254a97b14e200803982c6420
                       7c4777ed2d68afc0697b46909db2bcba1cbd04d3
                       329f66970e6cd47143d2717f99c5a3e5240109a6
                       db3ffa0a5926bf92c5790262d8ada355f9563d13
                       2e2abdc6ddbdd5f971329ad195447049c0d0954d
                       59f01fc70ade11d4afd9df98400af998719e95a1
                       7ee220296c005997bd25806564fab715e88685df
                       dcd7e133f2c013ba5ae2c371df3896a34e8b9ee2
                       2ce754f7e7fcb11bcc2a5d4094b2c905407c40b7
                       c356d55d19cb6848a1e7a90c5688a6a77a8c04b4
                       7f0a1799c742d18bd5f11a8fd8d6823d58a8016b
                       19818f1d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [4d:3c:c7:e4:98:8e:98:82:ce:61:9e:0a:96:80:6f:70:72:d8:f8:a1],[56:66:d1:a4]
        modulus: ba66083cf202e0b28c3c1b4fc6d62bbcfaf2bd73054929a09ce9e1dd5142ddd79a8fc5d3fd0e74237b3fb109202fe46d3c79c3fb38da82566f8653d44f757e90e086b91f595169a7b7afd3d2e60efb05140df2cdbae6c4507790e94e175b34a5af294cf1dc0920ab7ce10a178103214fba7b16957bd893de7fab6dafabe91277ce05e667cb3a35fcd234bd94782f0907702aa7992f021b59f18e20dcb38673c06ee2f1e5df0d2f6e4d6cd5978ee4c8e63c23c74548c1400c7a1f6a4ce9cdef4ae34a9039d0a76f40a70ca4cb15fbd2c07b6f43d035eafb1e6f18595bd40dca5aa51d99e58e55ba65239d4a15eb6c6b79661a04f8d974367b128e5a8402c48df1
public exponent: 10001

] 
2022-12-30 05:06:23.132  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-30 05:06:23.136 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-30 05:06:23.139 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-12-30 05:06:23.141 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-30 05:06:23.142  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-12-30 05:06:23.143  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-30 05:06:23.144  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-30 05:06:23.145 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-30 05:06:23.145 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-30 05:06:23.146 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-30 05:06:23.154 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-30 05:06:23.156 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-30 05:06:23.156 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-30 05:06:23.157 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-30 05:06:23.992  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-30 05:06:23.994  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-30 05:06:23.995 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-30 05:06:23.995 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-30 05:06:23.999  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-30 05:06:24.000  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-30 05:06:24.000 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-30 05:06:24.001 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-30 05:06:24.007 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-30 05:06:24.008 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-30 05:06:24.008 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-30 05:06:24.009 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-30 05:06:24.009 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-30 05:06:24.010 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-30 05:06:24.010 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-30 05:06:24.011 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-30 05:06:24.015 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 505061792023527940250051494246617336117282465964
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Dec 30 03:13:24 UTC 2022
           Final Date: Wed Dec 29 03:13:23 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [de:89:69:5b:e3:fc:f1:ea:b1:d0:89:01:02:03:74:46:c8:b4:d3:00],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 04e50459685b43195c8065591015adb679390178
                       4368a7fe4dbc21503b3ec81cb0176e2164a21a86
                       f381eae14e39813e69ed8220b83a9237c2b7ebb4
                       4aaf1ad4f4d36fc555ecad01d61d72ca2416b687
                       d097e1b3edea35ef37cadbe6b6c1526251d74a13
                       0bc52da0d91022d99cf974eb7371e0b695123a07
                       d1c9ba709278bbde250476c654e60eb8b9770389
                       aaf2364653f317c6263cdfb695f1f495ccb18008
                       0f11fd3e00ca68b1254a97b14e200803982c6420
                       7c4777ed2d68afc0697b46909db2bcba1cbd04d3
                       329f66970e6cd47143d2717f99c5a3e5240109a6
                       db3ffa0a5926bf92c5790262d8ada355f9563d13
                       2e2abdc6ddbdd5f971329ad195447049c0d0954d
                       59f01fc70ade11d4afd9df98400af998719e95a1
                       7ee220296c005997bd25806564fab715e88685df
                       dcd7e133f2c013ba5ae2c371df3896a34e8b9ee2
                       2ce754f7e7fcb11bcc2a5d4094b2c905407c40b7
                       c356d55d19cb6848a1e7a90c5688a6a77a8c04b4
                       7f0a1799c742d18bd5f11a8fd8d6823d58a8016b
                       19818f1d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [46:a5:7f:82:bf:f8:d9:6c:5a:ba:4b:f1:69:49:24:97:c4:2f:34:8f],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-12-30 05:08:11.977  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-30 05:08:11.980 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-30 05:08:11.982 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-12-30 05:08:11.983 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-30 05:08:11.984  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-12-30 05:08:11.985  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-30 05:08:11.985  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-30 05:08:11.985 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-30 05:08:11.986 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-30 05:08:11.987 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-30 05:08:11.993 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-30 05:08:11.993 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-30 05:08:11.994 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-30 05:08:11.994 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-30 05:08:12.341  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-30 05:08:12.342  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-30 05:08:12.342 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-30 05:08:12.343 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-30 05:08:12.346  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-30 05:08:12.347  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-30 05:08:12.348 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-30 05:08:12.348 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-30 05:08:12.349 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-30 05:08:12.350 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-30 05:08:12.350 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-30 05:08:12.351 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-30 05:08:12.352 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-30 05:08:12.352 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-30 05:08:12.353 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-30 05:08:12.354 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-30 05:08:12.359 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 505061792023527940250051494246617336117282465964
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Dec 30 03:13:24 UTC 2022
           Final Date: Wed Dec 29 03:13:23 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [de:89:69:5b:e3:fc:f1:ea:b1:d0:89:01:02:03:74:46:c8:b4:d3:00],[56:66:d1:a4]
        modulus: 88826266ddbbb972c4ed0d1331463745498243e2827a084cc0a40bac1985cc8d16324f0dc8c0dffc0fcb58441775f5cf9ac714dab909b851a74b031319e7f7b6e19032e7676fe8c06e8f0b56428fb6661edca48e5a12cba240da0ca47660d950f2294c4ee9498cca9988d73dcea3f89c7f008eaebe32dcecbb9132d54db228ed3ba5f42c98de80662265221ccdb7411c3110b59e6cadd346ea04a18f7d478ca3c43f25c8b304e91281ac4af57a627efadc4ad44c8cdfef4b10139ab15fe06bffb09f3b7f245359d9427575becfeaa0add6794cc0924af47cde85904f748e4774591af68794b8f56aabd23c105f46d7b23ec669943439324ee1c3e14f0d2b6383c2b4082bd75cf5b4f66c38171a6b84d2083cb6864380ebb0b55ab1be33c8fd21b448ebc5d75ba96ca1ba761c7c0270fdc1261c251cee2ca32140723459243e270883124ee9555151c6db47937cfb81f018dc822595f265633e27009c12a976266b91d21ad0afcdce0ab52c440349d925c6deb4396908fe3eefc3371176da76a1
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 04e50459685b43195c8065591015adb679390178
                       4368a7fe4dbc21503b3ec81cb0176e2164a21a86
                       f381eae14e39813e69ed8220b83a9237c2b7ebb4
                       4aaf1ad4f4d36fc555ecad01d61d72ca2416b687
                       d097e1b3edea35ef37cadbe6b6c1526251d74a13
                       0bc52da0d91022d99cf974eb7371e0b695123a07
                       d1c9ba709278bbde250476c654e60eb8b9770389
                       aaf2364653f317c6263cdfb695f1f495ccb18008
                       0f11fd3e00ca68b1254a97b14e200803982c6420
                       7c4777ed2d68afc0697b46909db2bcba1cbd04d3
                       329f66970e6cd47143d2717f99c5a3e5240109a6
                       db3ffa0a5926bf92c5790262d8ada355f9563d13
                       2e2abdc6ddbdd5f971329ad195447049c0d0954d
                       59f01fc70ade11d4afd9df98400af998719e95a1
                       7ee220296c005997bd25806564fab715e88685df
                       dcd7e133f2c013ba5ae2c371df3896a34e8b9ee2
                       2ce754f7e7fcb11bcc2a5d4094b2c905407c40b7
                       c356d55d19cb6848a1e7a90c5688a6a77a8c04b4
                       7f0a1799c742d18bd5f11a8fd8d6823d58a8016b
                       19818f1d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [c5:76:38:80:46:1e:90:23:b1:a7:e6:a0:00:70:14:5b:0e:96:10:b1],[56:66:d1:a4]
        modulus: bf961970c5442f460d60d18893842814659fb9b33352db4d4a070fa4287ccc1fb7819158383e4e9e03ccdbbe380bd8d62a473a71122a31f6a8cceeff02cb95d4c06287ac0f4f529d9252335062b3414ad215402496f83820c7816cc4f72821e5a45c417ae9a711826fd2aad2d4db782a3141a47abea5bcd46094d3a1ac986d34d7be88bdda0cb5cf60362845e5d12ca255aabd589fc2fe3aaa308e947c377b645da8cbd2d1e129841b86d42e010ba056acf985c632ce4628d9d1fba9fded14006c7f87b39a182294f5c817b81001fb0782e2099b55bad896d10514b2e91a66edf22a01113ea71fa8614d89a79acd2c115cd971897fd6ab965ea2f437c79db0af
public exponent: 10001

] 
2022-12-30 05:10:04.011  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-30 05:10:04.013 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-30 05:10:04.016 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-12-30 05:10:04.016 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-30 05:10:04.017  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-12-30 05:10:04.017  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-30 05:10:04.018  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-30 05:10:04.018 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-30 05:10:04.019 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-30 05:10:04.019 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-30 05:10:04.023 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-30 05:10:04.024 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-30 05:10:04.024 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-30 05:10:04.024 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-30 05:10:04.201  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-30 05:10:04.203  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-30 05:10:04.203 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-30 05:10:04.203 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-30 05:10:04.205  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-30 05:10:04.206  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-30 05:10:04.207 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-30 05:10:04.207 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-30 05:10:04.208 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-30 05:10:04.208 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-30 05:10:04.209 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-30 05:10:04.209 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-30 05:10:04.210 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-30 05:10:04.211 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-30 05:10:04.211 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-30 05:10:04.212 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-30 05:10:04.218 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 505061792023527940250051494246617336117282465964
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Dec 30 03:13:24 UTC 2022
           Final Date: Wed Dec 29 03:13:23 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [de:89:69:5b:e3:fc:f1:ea:b1:d0:89:01:02:03:74:46:c8:b4:d3:00],[56:66:d1:a4]
        modulus: 88826266ddbbb972c4ed0d1331463745498243e2827a084cc0a40bac1985cc8d16324f0dc8c0dffc0fcb58441775f5cf9ac714dab909b851a74b031319e7f7b6e19032e7676fe8c06e8f0b56428fb6661edca48e5a12cba240da0ca47660d950f2294c4ee9498cca9988d73dcea3f89c7f008eaebe32dcecbb9132d54db228ed3ba5f42c98de80662265221ccdb7411c3110b59e6cadd346ea04a18f7d478ca3c43f25c8b304e91281ac4af57a627efadc4ad44c8cdfef4b10139ab15fe06bffb09f3b7f245359d9427575becfeaa0add6794cc0924af47cde85904f748e4774591af68794b8f56aabd23c105f46d7b23ec669943439324ee1c3e14f0d2b6383c2b4082bd75cf5b4f66c38171a6b84d2083cb6864380ebb0b55ab1be33c8fd21b448ebc5d75ba96ca1ba761c7c0270fdc1261c251cee2ca32140723459243e270883124ee9555151c6db47937cfb81f018dc822595f265633e27009c12a976266b91d21ad0afcdce0ab52c440349d925c6deb4396908fe3eefc3371176da76a1
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 04e50459685b43195c8065591015adb679390178
                       4368a7fe4dbc21503b3ec81cb0176e2164a21a86
                       f381eae14e39813e69ed8220b83a9237c2b7ebb4
                       4aaf1ad4f4d36fc555ecad01d61d72ca2416b687
                       d097e1b3edea35ef37cadbe6b6c1526251d74a13
                       0bc52da0d91022d99cf974eb7371e0b695123a07
                       d1c9ba709278bbde250476c654e60eb8b9770389
                       aaf2364653f317c6263cdfb695f1f495ccb18008
                       0f11fd3e00ca68b1254a97b14e200803982c6420
                       7c4777ed2d68afc0697b46909db2bcba1cbd04d3
                       329f66970e6cd47143d2717f99c5a3e5240109a6
                       db3ffa0a5926bf92c5790262d8ada355f9563d13
                       2e2abdc6ddbdd5f971329ad195447049c0d0954d
                       59f01fc70ade11d4afd9df98400af998719e95a1
                       7ee220296c005997bd25806564fab715e88685df
                       dcd7e133f2c013ba5ae2c371df3896a34e8b9ee2
                       2ce754f7e7fcb11bcc2a5d4094b2c905407c40b7
                       c356d55d19cb6848a1e7a90c5688a6a77a8c04b4
                       7f0a1799c742d18bd5f11a8fd8d6823d58a8016b
                       19818f1d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [44:0d:80:74:7b:a0:6f:3f:02:5f:76:9d:cb:60:fd:eb:44:26:b4:2f],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-12-30 05:13:09.363  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-30 05:13:09.364 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-30 05:13:09.366 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-12-30 05:13:09.367 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-30 05:13:09.368  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-12-30 05:13:09.368  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-30 05:13:09.369  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-30 05:13:09.370 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-30 05:13:09.371 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-30 05:13:09.371 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-30 05:13:09.375 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-30 05:13:09.376 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-30 05:13:09.376 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-30 05:13:09.377 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-30 05:13:09.623  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-30 05:13:09.624  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-30 05:13:09.625 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-30 05:13:09.625 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-30 05:13:09.626  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-30 05:13:09.627  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-30 05:13:09.627 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-30 05:13:09.628 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-30 05:13:09.628 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-30 05:13:09.629 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-30 05:13:09.629 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-30 05:13:09.630 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-30 05:13:09.631 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-30 05:13:09.631 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-30 05:13:09.631 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-30 05:13:09.632 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-30 05:13:09.635 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 505061792023527940250051494246617336117282465964
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Dec 30 03:13:24 UTC 2022
           Final Date: Wed Dec 29 03:13:23 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [de:89:69:5b:e3:fc:f1:ea:b1:d0:89:01:02:03:74:46:c8:b4:d3:00],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 04e50459685b43195c8065591015adb679390178
                       4368a7fe4dbc21503b3ec81cb0176e2164a21a86
                       f381eae14e39813e69ed8220b83a9237c2b7ebb4
                       4aaf1ad4f4d36fc555ecad01d61d72ca2416b687
                       d097e1b3edea35ef37cadbe6b6c1526251d74a13
                       0bc52da0d91022d99cf974eb7371e0b695123a07
                       d1c9ba709278bbde250476c654e60eb8b9770389
                       aaf2364653f317c6263cdfb695f1f495ccb18008
                       0f11fd3e00ca68b1254a97b14e200803982c6420
                       7c4777ed2d68afc0697b46909db2bcba1cbd04d3
                       329f66970e6cd47143d2717f99c5a3e5240109a6
                       db3ffa0a5926bf92c5790262d8ada355f9563d13
                       2e2abdc6ddbdd5f971329ad195447049c0d0954d
                       59f01fc70ade11d4afd9df98400af998719e95a1
                       7ee220296c005997bd25806564fab715e88685df
                       dcd7e133f2c013ba5ae2c371df3896a34e8b9ee2
                       2ce754f7e7fcb11bcc2a5d4094b2c905407c40b7
                       c356d55d19cb6848a1e7a90c5688a6a77a8c04b4
                       7f0a1799c742d18bd5f11a8fd8d6823d58a8016b
                       19818f1d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [54:2a:b7:a4:01:24:c8:37:06:ff:0d:31:0c:fb:a4:36:1c:00:31:4b],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-12-30 05:20:11.552  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-30 05:20:11.555 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-30 05:20:11.557 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-12-30 05:20:11.558 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-30 05:20:11.559  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-12-30 05:20:11.559  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-30 05:20:11.560  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-30 05:20:11.560 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-30 05:20:11.561 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-30 05:20:11.561 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-30 05:20:11.566 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-30 05:20:11.567 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-30 05:20:11.568 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-30 05:20:11.568 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-30 05:20:11.797  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-30 05:20:11.798  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-30 05:20:11.798 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-30 05:20:11.798 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-30 05:20:11.800  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-30 05:20:11.800  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-30 05:20:11.801 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-30 05:20:11.801 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-30 05:20:11.801 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-30 05:20:11.802 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-30 05:20:11.802 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-30 05:20:11.803 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-30 05:20:11.803 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-30 05:20:11.804 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-30 05:20:11.804 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-30 05:20:11.805 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-30 05:20:11.808 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 505061792023527940250051494246617336117282465964
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Dec 30 03:13:24 UTC 2022
           Final Date: Wed Dec 29 03:13:23 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [de:89:69:5b:e3:fc:f1:ea:b1:d0:89:01:02:03:74:46:c8:b4:d3:00],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 04e50459685b43195c8065591015adb679390178
                       4368a7fe4dbc21503b3ec81cb0176e2164a21a86
                       f381eae14e39813e69ed8220b83a9237c2b7ebb4
                       4aaf1ad4f4d36fc555ecad01d61d72ca2416b687
                       d097e1b3edea35ef37cadbe6b6c1526251d74a13
                       0bc52da0d91022d99cf974eb7371e0b695123a07
                       d1c9ba709278bbde250476c654e60eb8b9770389
                       aaf2364653f317c6263cdfb695f1f495ccb18008
                       0f11fd3e00ca68b1254a97b14e200803982c6420
                       7c4777ed2d68afc0697b46909db2bcba1cbd04d3
                       329f66970e6cd47143d2717f99c5a3e5240109a6
                       db3ffa0a5926bf92c5790262d8ada355f9563d13
                       2e2abdc6ddbdd5f971329ad195447049c0d0954d
                       59f01fc70ade11d4afd9df98400af998719e95a1
                       7ee220296c005997bd25806564fab715e88685df
                       dcd7e133f2c013ba5ae2c371df3896a34e8b9ee2
                       2ce754f7e7fcb11bcc2a5d4094b2c905407c40b7
                       c356d55d19cb6848a1e7a90c5688a6a77a8c04b4
                       7f0a1799c742d18bd5f11a8fd8d6823d58a8016b
                       19818f1d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [01:3c:0c:82:f0:0a:92:b8:12:6c:6e:b8:84:db:00:0e:4b:53:7c:77],[56:66:d1:a4]
        modulus: c8e59fe191b385adcbf071975c610bf15b5a1f1f23b0b7188b73a69a7d01fc093e3d95dfde9be42458aff20617c0d509319006532f93af3dc04677fdf32cbe1fd1f2f30029dcadb016ec59172e47353081e8f5860f4779c5a20ccc9341c980777c246eea84bb40ba637b8fdcc7fd56509d69beb26b8ad8a1f6d2796b75beb73e7cb33ace0a9903ca3b1624ed163394de0221801985c97225a057ac6c4c9848f39d93873645e4c273e5660bb7045dfef2a26da20ee0ebeb966a765067a29bcf08d5475c706a083f44fc18d40286740fcc57ec2cd5ce853c608dd609922169e26a03f3616ee3195fe042b28a8ec1c924168cb09ec241bc2020b85265c046a78c4d
public exponent: 10001

] 
2022-12-30 05:26:14.655  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-30 05:26:14.657 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-30 05:26:14.660 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-12-30 05:26:14.661 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-30 05:26:14.661  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-12-30 05:26:14.662  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-30 05:26:14.662  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-30 05:26:14.663 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-30 05:26:14.663 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-30 05:26:14.663 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-30 05:26:14.667 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-30 05:26:14.668 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-30 05:26:14.668 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-30 05:26:14.669 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-30 05:26:14.906  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-30 05:26:14.907  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-30 05:26:14.907 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-30 05:26:14.908 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-30 05:26:14.909  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-30 05:26:14.909  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-30 05:26:14.910 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-30 05:26:14.910 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-30 05:26:14.910 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-30 05:26:14.911 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-30 05:26:14.911 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-30 05:26:14.912 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-30 05:26:14.917 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-30 05:26:14.917 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-30 05:26:14.918 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-30 05:26:14.918 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-30 05:26:14.925 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 505061792023527940250051494246617336117282465964
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Dec 30 03:13:24 UTC 2022
           Final Date: Wed Dec 29 03:13:23 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [de:89:69:5b:e3:fc:f1:ea:b1:d0:89:01:02:03:74:46:c8:b4:d3:00],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 04e50459685b43195c8065591015adb679390178
                       4368a7fe4dbc21503b3ec81cb0176e2164a21a86
                       f381eae14e39813e69ed8220b83a9237c2b7ebb4
                       4aaf1ad4f4d36fc555ecad01d61d72ca2416b687
                       d097e1b3edea35ef37cadbe6b6c1526251d74a13
                       0bc52da0d91022d99cf974eb7371e0b695123a07
                       d1c9ba709278bbde250476c654e60eb8b9770389
                       aaf2364653f317c6263cdfb695f1f495ccb18008
                       0f11fd3e00ca68b1254a97b14e200803982c6420
                       7c4777ed2d68afc0697b46909db2bcba1cbd04d3
                       329f66970e6cd47143d2717f99c5a3e5240109a6
                       db3ffa0a5926bf92c5790262d8ada355f9563d13
                       2e2abdc6ddbdd5f971329ad195447049c0d0954d
                       59f01fc70ade11d4afd9df98400af998719e95a1
                       7ee220296c005997bd25806564fab715e88685df
                       dcd7e133f2c013ba5ae2c371df3896a34e8b9ee2
                       2ce754f7e7fcb11bcc2a5d4094b2c905407c40b7
                       c356d55d19cb6848a1e7a90c5688a6a77a8c04b4
                       7f0a1799c742d18bd5f11a8fd8d6823d58a8016b
                       19818f1d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [0c:5d:34:ce:f7:68:87:ea:7c:a8:9e:e7:1d:b6:d8:be:33:ce:a4:a6],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-12-30 05:26:35.363  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-30 05:26:35.365 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-30 05:26:35.366 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-12-30 05:26:35.366 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-30 05:26:35.367  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-12-30 05:26:35.367  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-30 05:26:35.368  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-30 05:26:35.368 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-30 05:26:35.369 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-30 05:26:35.369 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-30 05:26:35.372 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-30 05:26:35.373 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-30 05:26:35.373 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-30 05:26:35.374 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-30 05:26:35.598  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-30 05:26:35.598  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-30 05:26:35.599 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-30 05:26:35.599 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-30 05:26:35.600  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-30 05:26:35.601  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-30 05:26:35.601 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-30 05:26:35.602 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-30 05:26:35.602 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-30 05:26:35.603 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-30 05:26:35.603 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-30 05:26:35.604 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-30 05:26:35.604 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-30 05:26:35.605 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-30 05:26:35.605 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-30 05:26:35.606 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-30 05:26:35.610 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 505061792023527940250051494246617336117282465964
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Dec 30 03:13:24 UTC 2022
           Final Date: Wed Dec 29 03:13:23 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [de:89:69:5b:e3:fc:f1:ea:b1:d0:89:01:02:03:74:46:c8:b4:d3:00],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 04e50459685b43195c8065591015adb679390178
                       4368a7fe4dbc21503b3ec81cb0176e2164a21a86
                       f381eae14e39813e69ed8220b83a9237c2b7ebb4
                       4aaf1ad4f4d36fc555ecad01d61d72ca2416b687
                       d097e1b3edea35ef37cadbe6b6c1526251d74a13
                       0bc52da0d91022d99cf974eb7371e0b695123a07
                       d1c9ba709278bbde250476c654e60eb8b9770389
                       aaf2364653f317c6263cdfb695f1f495ccb18008
                       0f11fd3e00ca68b1254a97b14e200803982c6420
                       7c4777ed2d68afc0697b46909db2bcba1cbd04d3
                       329f66970e6cd47143d2717f99c5a3e5240109a6
                       db3ffa0a5926bf92c5790262d8ada355f9563d13
                       2e2abdc6ddbdd5f971329ad195447049c0d0954d
                       59f01fc70ade11d4afd9df98400af998719e95a1
                       7ee220296c005997bd25806564fab715e88685df
                       dcd7e133f2c013ba5ae2c371df3896a34e8b9ee2
                       2ce754f7e7fcb11bcc2a5d4094b2c905407c40b7
                       c356d55d19cb6848a1e7a90c5688a6a77a8c04b4
                       7f0a1799c742d18bd5f11a8fd8d6823d58a8016b
                       19818f1d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [17:84:37:cd:16:9d:ec:15:24:c5:18:e2:1d:86:05:15:77:e3:e0:45],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-12-30 05:52:23.090  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-30 05:52:23.092 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-30 05:52:23.094 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-12-30 05:52:23.095 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-30 05:52:23.096  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-12-30 05:52:23.096  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-30 05:52:23.096  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-30 05:52:23.097 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-30 05:52:23.097 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-30 05:52:23.097 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-30 05:52:23.101 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-30 05:52:23.102 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-30 05:52:23.102 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-30 05:52:23.102 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-30 05:52:23.382  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-30 05:52:23.383  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-30 05:52:23.384 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-30 05:52:23.384 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-30 05:52:23.386  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-30 05:52:23.386  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-30 05:52:23.391 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-30 05:52:23.392 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-30 05:52:23.392 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-30 05:52:23.393 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-30 05:52:23.394 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-30 05:52:23.394 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-30 05:52:23.394 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-30 05:52:23.395 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-30 05:52:23.395 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-30 05:52:23.395 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-30 05:52:23.399 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 505061792023527940250051494246617336117282465964
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Dec 30 03:13:24 UTC 2022
           Final Date: Wed Dec 29 03:13:23 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [de:89:69:5b:e3:fc:f1:ea:b1:d0:89:01:02:03:74:46:c8:b4:d3:00],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 04e50459685b43195c8065591015adb679390178
                       4368a7fe4dbc21503b3ec81cb0176e2164a21a86
                       f381eae14e39813e69ed8220b83a9237c2b7ebb4
                       4aaf1ad4f4d36fc555ecad01d61d72ca2416b687
                       d097e1b3edea35ef37cadbe6b6c1526251d74a13
                       0bc52da0d91022d99cf974eb7371e0b695123a07
                       d1c9ba709278bbde250476c654e60eb8b9770389
                       aaf2364653f317c6263cdfb695f1f495ccb18008
                       0f11fd3e00ca68b1254a97b14e200803982c6420
                       7c4777ed2d68afc0697b46909db2bcba1cbd04d3
                       329f66970e6cd47143d2717f99c5a3e5240109a6
                       db3ffa0a5926bf92c5790262d8ada355f9563d13
                       2e2abdc6ddbdd5f971329ad195447049c0d0954d
                       59f01fc70ade11d4afd9df98400af998719e95a1
                       7ee220296c005997bd25806564fab715e88685df
                       dcd7e133f2c013ba5ae2c371df3896a34e8b9ee2
                       2ce754f7e7fcb11bcc2a5d4094b2c905407c40b7
                       c356d55d19cb6848a1e7a90c5688a6a77a8c04b4
                       7f0a1799c742d18bd5f11a8fd8d6823d58a8016b
                       19818f1d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [d4:48:b3:2b:d4:73:ed:c6:a9:14:b6:a0:80:81:6d:e2:17:88:3a:a0],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-12-30 05:52:30.075  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-12-30 05:52:30.076 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-12-30 05:52:30.077 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-12-30 05:52:30.077 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-12-30 05:52:30.078  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-12-30 05:52:30.078  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-12-30 05:52:30.079  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-12-30 05:52:30.079 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-12-30 05:52:30.079 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-12-30 05:52:30.080 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-12-30 05:52:30.084 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-12-30 05:52:30.084 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-30 05:52:30.084 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-12-30 05:52:30.084 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-30 05:52:30.225  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-12-30 05:52:30.227  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-12-30 05:52:30.227 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-12-30 05:52:30.228 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-12-30 05:52:30.229  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-12-30 05:52:30.230  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-12-30 05:52:30.230 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-30 05:52:30.230 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-30 05:52:30.230 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-30 05:52:30.231 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-30 05:52:30.231 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-30 05:52:30.232 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-30 05:52:30.232 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-12-30 05:52:30.232 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-12-30 05:52:30.233 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-12-30 05:52:30.233 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-12-30 05:52:30.236 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 505061792023527940250051494246617336117282465964
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Dec 30 03:13:24 UTC 2022
           Final Date: Wed Dec 29 03:13:23 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [de:89:69:5b:e3:fc:f1:ea:b1:d0:89:01:02:03:74:46:c8:b4:d3:00],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 04e50459685b43195c8065591015adb679390178
                       4368a7fe4dbc21503b3ec81cb0176e2164a21a86
                       f381eae14e39813e69ed8220b83a9237c2b7ebb4
                       4aaf1ad4f4d36fc555ecad01d61d72ca2416b687
                       d097e1b3edea35ef37cadbe6b6c1526251d74a13
                       0bc52da0d91022d99cf974eb7371e0b695123a07
                       d1c9ba709278bbde250476c654e60eb8b9770389
                       aaf2364653f317c6263cdfb695f1f495ccb18008
                       0f11fd3e00ca68b1254a97b14e200803982c6420
                       7c4777ed2d68afc0697b46909db2bcba1cbd04d3
                       329f66970e6cd47143d2717f99c5a3e5240109a6
                       db3ffa0a5926bf92c5790262d8ada355f9563d13
                       2e2abdc6ddbdd5f971329ad195447049c0d0954d
                       59f01fc70ade11d4afd9df98400af998719e95a1
                       7ee220296c005997bd25806564fab715e88685df
                       dcd7e133f2c013ba5ae2c371df3896a34e8b9ee2
                       2ce754f7e7fcb11bcc2a5d4094b2c905407c40b7
                       c356d55d19cb6848a1e7a90c5688a6a77a8c04b4
                       7f0a1799c742d18bd5f11a8fd8d6823d58a8016b
                       19818f1d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [83:a4:1b:14:d3:ba:a4:26:ad:ff:34:fb:0d:be:99:a6:d6:d9:e2:5b],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

]