Results

By type

          2022-05-12 12:19:43,734 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-05-12 12:19:44,616 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-05-12 12:19:45.442  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
May 12, 2022 12:19:47 PM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
May 12, 2022 12:19:47 PM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
May 12, 2022 12:19:47 PM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
May 12, 2022 12:19:47 PM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-05-12 12:19:48.196 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-05-12 12:19:48.509  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-05-12 12:19:48.675  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-05-12 12:19:49.416 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-05-12 12:19:49.419 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
2022-05-12 12:19:49.420 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-05-12 12:19:49.424 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-05-12 12:19:49.471 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2022-05-12 12:19:49.475 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/docs]}: redirectToUi(HttpServletRequest)
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
2022-05-12 12:19:49.624 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-05-12 12:19:50.257 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
May 12, 2022 12:19:51 PM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-05-12 12:19:51.285  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 8.393 seconds (JVM running for 10.218)
May 12, 2022 12:20:15 PM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-05-12 12:20:38.108  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-12 12:20:38.120 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-12 12:20:38.167 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-05-12 12:20:38.172 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-12 12:20:38.192  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-05-12 12:20:38.195  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-12 12:20:38.196  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-12 12:20:38.197 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-12 12:20:38.198 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-12 12:20:38.202 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-12 12:20:38.210 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-12 12:20:38.214 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-12 12:20:38.260 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-12 12:20:38.266 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-12 12:20:38.267 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-12 12:20:38.271 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-12 12:20:38.952  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-12 12:20:38.956  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-12 12:20:38.956 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-12 12:20:38.959 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-12 12:20:38.970  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-12 12:20:38.971  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-12 12:20:38.972 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-12 12:20:38.972 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-12 12:20:38.973 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-12 12:20:38.986 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-12 12:20:38.986 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-12 12:20:38.987 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-12 12:20:38.994 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-12 12:20:38.995 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-12 12:20:38.995 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-12 12:20:38.997 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-12 12:20:39.031 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 301940799005800713167388758911697584694553796265
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu May 12 12:17:33 UTC 2022
           Final Date: Tue May 11 12:17:32 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [57:d0:0c:20:cc:6b:59:0e:94:84:b6:6d:f2:59:e2:3d:81:9d:22:f4]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 4e200007928ef500ba5414dfce31fda4175faeed
                       415bf5d8ecdb45919a02baa9e7419981b6cc9dcc
                       235f796ba978659425b1578876c3edce39f4b010
                       11d7aa6f7667e1c2e5acbf16a5dbef8fb3fa4451
                       7eb663431837e88a3f6fe3bd0b2359d255e3ecb8
                       f39061f8e162cd20f9054a5353d8dde9d26e3246
                       d3111489c8bd06a5c14fe7d49ab08b9def57ea6b
                       661f2a7cffb40e8615efb365bb578467d7199a27
                       1769e9ce105c7d53a61af8e7946669d1039f55bc
                       d0787f519d16e1dd899767719892e0123bd159b9
                       1602e85fa3f7b7a24517ba8e3a92a44111ec3779
                       d9d766fd47c8f2a9c1706348fbc4b966ede56a65
                       0c687b26d0affdb61db4d5bcd95770904e88f92e
                       d51dc5e3ce803680528f35393d65fb35f9abe44d
                       b4018f4cda59a2967671d357602866a354c26f28
                       809ba12b47225657049c39939ea2bfc0ffb75dcd
                       dbb372bc9c8cb8c15e33fc45c771d8eefe77b0ec
                       712c45c02294b693d8acfae86b3c357d787fcd9f
                       c21dd1d5e6e00df037301b93e159d0346d1f9ab2
                       283c1424
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [40:c9:98:67:af:36:71:fc:1a:3a:15:cb:05:aa:15:01:2c:26:8c:a5]
            modulus: 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
    public exponent: 10001

] 
2022-05-12 13:23:13.016  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-12 13:23:13.022 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-12 13:23:13.026 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-05-12 13:23:13.028 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-12 13:23:13.029  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-05-12 13:23:13.030  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-12 13:23:13.031  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-12 13:23:13.031 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-12 13:23:13.032 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-12 13:23:13.033 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-12 13:23:13.049 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-12 13:23:13.051 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-12 13:23:13.052 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-12 13:23:13.052 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-12 13:23:13.310  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-12 13:23:13.312  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-12 13:23:13.313 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-12 13:23:13.313 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-12 13:23:13.318  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-12 13:23:13.319  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-12 13:23:13.320 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-12 13:23:13.320 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-12 13:23:13.321 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-12 13:23:13.322 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-12 13:23:13.323 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-12 13:23:13.324 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-12 13:23:13.325 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-12 13:23:13.325 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-12 13:23:13.326 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-12 13:23:13.327 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-12 13:23:13.333 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 301940799005800713167388758911697584694553796265
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu May 12 12:17:33 UTC 2022
           Final Date: Tue May 11 12:17:32 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [57:d0:0c:20:cc:6b:59:0e:94:84:b6:6d:f2:59:e2:3d:81:9d:22:f4]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 4e200007928ef500ba5414dfce31fda4175faeed
                       415bf5d8ecdb45919a02baa9e7419981b6cc9dcc
                       235f796ba978659425b1578876c3edce39f4b010
                       11d7aa6f7667e1c2e5acbf16a5dbef8fb3fa4451
                       7eb663431837e88a3f6fe3bd0b2359d255e3ecb8
                       f39061f8e162cd20f9054a5353d8dde9d26e3246
                       d3111489c8bd06a5c14fe7d49ab08b9def57ea6b
                       661f2a7cffb40e8615efb365bb578467d7199a27
                       1769e9ce105c7d53a61af8e7946669d1039f55bc
                       d0787f519d16e1dd899767719892e0123bd159b9
                       1602e85fa3f7b7a24517ba8e3a92a44111ec3779
                       d9d766fd47c8f2a9c1706348fbc4b966ede56a65
                       0c687b26d0affdb61db4d5bcd95770904e88f92e
                       d51dc5e3ce803680528f35393d65fb35f9abe44d
                       b4018f4cda59a2967671d357602866a354c26f28
                       809ba12b47225657049c39939ea2bfc0ffb75dcd
                       dbb372bc9c8cb8c15e33fc45c771d8eefe77b0ec
                       712c45c02294b693d8acfae86b3c357d787fcd9f
                       c21dd1d5e6e00df037301b93e159d0346d1f9ab2
                       283c1424
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [b3:9e:86:21:60:f4:8d:e4:e7:7c:d6:40:0c:61:53:3a:b8:1c:f3:c3]
            modulus: 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
    public exponent: 10001

] 
2022-05-12 13:24:11.553  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-12 13:24:11.554 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-12 13:24:11.556 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-12 13:24:11.557 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-12 13:24:11.558  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-12 13:24:11.560  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-12 13:24:11.561  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-12 13:24:11.562 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-12 13:24:11.562 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-12 13:24:11.564 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-12 13:24:11.587 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-12 13:24:11.588 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-12 13:24:11.588 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-12 13:24:11.589 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-12 13:24:11.767  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-12 13:24:11.768  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-12 13:24:11.768 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-12 13:24:11.768 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-12 13:24:11.772  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-12 13:24:11.772  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-12 13:24:11.773 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-12 13:24:11.773 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-12 13:24:11.773 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-12 13:24:11.775 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-12 13:24:11.775 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-12 13:24:11.776 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-12 13:24:11.777 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-12 13:24:11.777 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-12 13:24:11.778 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-12 13:24:11.779 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-12 13:24:11.784 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 301940799005800713167388758911697584694553796265
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu May 12 12:17:33 UTC 2022
           Final Date: Tue May 11 12:17:32 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [57:d0:0c:20:cc:6b:59:0e:94:84:b6:6d:f2:59:e2:3d:81:9d:22:f4]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 4e200007928ef500ba5414dfce31fda4175faeed
                       415bf5d8ecdb45919a02baa9e7419981b6cc9dcc
                       235f796ba978659425b1578876c3edce39f4b010
                       11d7aa6f7667e1c2e5acbf16a5dbef8fb3fa4451
                       7eb663431837e88a3f6fe3bd0b2359d255e3ecb8
                       f39061f8e162cd20f9054a5353d8dde9d26e3246
                       d3111489c8bd06a5c14fe7d49ab08b9def57ea6b
                       661f2a7cffb40e8615efb365bb578467d7199a27
                       1769e9ce105c7d53a61af8e7946669d1039f55bc
                       d0787f519d16e1dd899767719892e0123bd159b9
                       1602e85fa3f7b7a24517ba8e3a92a44111ec3779
                       d9d766fd47c8f2a9c1706348fbc4b966ede56a65
                       0c687b26d0affdb61db4d5bcd95770904e88f92e
                       d51dc5e3ce803680528f35393d65fb35f9abe44d
                       b4018f4cda59a2967671d357602866a354c26f28
                       809ba12b47225657049c39939ea2bfc0ffb75dcd
                       dbb372bc9c8cb8c15e33fc45c771d8eefe77b0ec
                       712c45c02294b693d8acfae86b3c357d787fcd9f
                       c21dd1d5e6e00df037301b93e159d0346d1f9ab2
                       283c1424
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [24:94:f5:eb:95:11:f6:73:6c:f8:9f:b0:1e:31:fa:9a:4c:f2:28:33]
            modulus: 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
    public exponent: 10001

] 
2022-05-12 13:25:58.989  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-12 13:25:58.991 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-12 13:25:58.992 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-05-12 13:25:58.993 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-12 13:25:58.994  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-05-12 13:25:58.995  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-12 13:25:58.995  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-12 13:25:58.996 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-12 13:25:58.996 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-12 13:25:58.997 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-12 13:25:59.002 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-12 13:25:59.003 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-12 13:25:59.003 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-12 13:25:59.004 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-12 13:25:59.217  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-12 13:25:59.219  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-12 13:25:59.220 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-12 13:25:59.221 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-12 13:25:59.224  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-12 13:25:59.225  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-12 13:25:59.225 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-12 13:25:59.226 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-12 13:25:59.226 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-12 13:25:59.227 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-12 13:25:59.228 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-12 13:25:59.228 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-12 13:25:59.229 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-12 13:25:59.230 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-12 13:25:59.230 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-12 13:25:59.231 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-12 13:25:59.236 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 301940799005800713167388758911697584694553796265
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu May 12 12:17:33 UTC 2022
           Final Date: Tue May 11 12:17:32 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [57:d0:0c:20:cc:6b:59:0e:94:84:b6:6d:f2:59:e2:3d:81:9d:22:f4]
            modulus: bd8389da6d055e744fca2410bc4c411615bbbabb48c3ec47438fdabc69acf1ddf0d59695d070f99eda8f8e3465225146c543a1ad784ea852d0761da8be87fc37acac26bd7e3ec9045191a2b5002446d3874a5f6dc90b8d7bb4315af37bcd011ec0befde6c05f38083538c240208aca6a2890e039239cb78512f58fb282b634f7b5feea3b8ad08188c08adfc481cd93dc5386efd4ef60426ba265c47d32f28faaa721227b694dd42d057e39fbdd5d146cff2e821e823b83569e1a849037a3e3820f89d265bfe3b2ce6650a9fe39a59b1c1cb8931bc02497949ebaf3a6c317f2014a2ee0381af5171079903447d7f4a284da5273ee200b1ee87938e0cfa0121fe86c2958eff3b06f3c076d094b6b4a3c148a402ce6da9f143ae7cf52de664bf68a1560502ce6b4a98204ed795bb65eb6206800da86d7723cda5a21faace8cf08ae6d88338e9e750ee400a9a701518ba95312d5b1917370d000fa16aac5dee3d539d133a38951ec56f9e9326a7f9ac013b96c1ec1cc4142a27bebd512869a4fec75
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 4e200007928ef500ba5414dfce31fda4175faeed
                       415bf5d8ecdb45919a02baa9e7419981b6cc9dcc
                       235f796ba978659425b1578876c3edce39f4b010
                       11d7aa6f7667e1c2e5acbf16a5dbef8fb3fa4451
                       7eb663431837e88a3f6fe3bd0b2359d255e3ecb8
                       f39061f8e162cd20f9054a5353d8dde9d26e3246
                       d3111489c8bd06a5c14fe7d49ab08b9def57ea6b
                       661f2a7cffb40e8615efb365bb578467d7199a27
                       1769e9ce105c7d53a61af8e7946669d1039f55bc
                       d0787f519d16e1dd899767719892e0123bd159b9
                       1602e85fa3f7b7a24517ba8e3a92a44111ec3779
                       d9d766fd47c8f2a9c1706348fbc4b966ede56a65
                       0c687b26d0affdb61db4d5bcd95770904e88f92e
                       d51dc5e3ce803680528f35393d65fb35f9abe44d
                       b4018f4cda59a2967671d357602866a354c26f28
                       809ba12b47225657049c39939ea2bfc0ffb75dcd
                       dbb372bc9c8cb8c15e33fc45c771d8eefe77b0ec
                       712c45c02294b693d8acfae86b3c357d787fcd9f
                       c21dd1d5e6e00df037301b93e159d0346d1f9ab2
                       283c1424
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [63:5a:83:28:00:d7:9c:a2:02:85:af:5b:5f:a2:78:43:d2:e4:8a:6e]
            modulus: b84fbe0a3c2ab8cca0fef63e74941e40a719fffef0b2a9615e40a69cb0b8d546c407a129144a5ec7eb55f54be01c69c9ddda82f04b2a50784870e37ce612c5e234deb24e1a6e5fa3ab864084cf3ff8bc30fc97a4eb96bbc5aaaaaa625635828f8c69f2ee958963c6d081089a5dbdbd7196ede4c7cfdfa958d4eae4681f8b1ffc5e4068c37967509973ffbba50ca5ec8c44eb62881212bd340e5841f5af48a1c0ee0117a3c4186dd4d5e16b66514f54ec4f18472732e84984b10d98cbce77696933d5fc128647a3298308f2cb1a1336c9cb7f42ad0e7c0bd99be3514058360c875148632c79f52decffcc5af704e542d516532bbeb49810fffb1130566e829a17
    public exponent: 10001

] 
2022-05-12 13:27:06.642  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-12 13:27:06.643 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-12 13:27:06.645 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-05-12 13:27:06.646 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-12 13:27:06.646  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-05-12 13:27:06.647  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-12 13:27:06.647  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-12 13:27:06.648 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-12 13:27:06.648 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-12 13:27:06.649 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-12 13:27:06.653 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-12 13:27:06.654 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-12 13:27:06.654 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-12 13:27:06.655 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-12 13:27:06.812  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-12 13:27:06.813  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-12 13:27:06.813 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-12 13:27:06.813 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-12 13:27:06.815  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-12 13:27:06.816  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-12 13:27:06.816 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-12 13:27:06.816 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-12 13:27:06.817 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-12 13:27:06.817 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-12 13:27:06.818 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-12 13:27:06.818 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-12 13:27:06.819 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-12 13:27:06.819 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-12 13:27:06.820 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-12 13:27:06.821 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-12 13:27:06.825 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 301940799005800713167388758911697584694553796265
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu May 12 12:17:33 UTC 2022
           Final Date: Tue May 11 12:17:32 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [57:d0:0c:20:cc:6b:59:0e:94:84:b6:6d:f2:59:e2:3d:81:9d:22:f4]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 4e200007928ef500ba5414dfce31fda4175faeed
                       415bf5d8ecdb45919a02baa9e7419981b6cc9dcc
                       235f796ba978659425b1578876c3edce39f4b010
                       11d7aa6f7667e1c2e5acbf16a5dbef8fb3fa4451
                       7eb663431837e88a3f6fe3bd0b2359d255e3ecb8
                       f39061f8e162cd20f9054a5353d8dde9d26e3246
                       d3111489c8bd06a5c14fe7d49ab08b9def57ea6b
                       661f2a7cffb40e8615efb365bb578467d7199a27
                       1769e9ce105c7d53a61af8e7946669d1039f55bc
                       d0787f519d16e1dd899767719892e0123bd159b9
                       1602e85fa3f7b7a24517ba8e3a92a44111ec3779
                       d9d766fd47c8f2a9c1706348fbc4b966ede56a65
                       0c687b26d0affdb61db4d5bcd95770904e88f92e
                       d51dc5e3ce803680528f35393d65fb35f9abe44d
                       b4018f4cda59a2967671d357602866a354c26f28
                       809ba12b47225657049c39939ea2bfc0ffb75dcd
                       dbb372bc9c8cb8c15e33fc45c771d8eefe77b0ec
                       712c45c02294b693d8acfae86b3c357d787fcd9f
                       c21dd1d5e6e00df037301b93e159d0346d1f9ab2
                       283c1424
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [35:29:78:6f:13:78:53:67:d8:df:a7:32:00:7d:c5:b8:f3:6f:26:1d]
            modulus: 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
    public exponent: 10001

] 
2022-05-12 13:27:44.392  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-12 13:27:44.393 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-12 13:27:44.395 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-05-12 13:27:44.395 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-12 13:27:44.396  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-05-12 13:27:44.397  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-12 13:27:44.397  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-12 13:27:44.397 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-12 13:27:44.398 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-12 13:27:44.398 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-12 13:27:44.407 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-12 13:27:44.408 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-12 13:27:44.408 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-12 13:27:44.409 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-12 13:27:44.564  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-12 13:27:44.565  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-12 13:27:44.565 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-12 13:27:44.565 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-12 13:27:44.568  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-12 13:27:44.568  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-12 13:27:44.569 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-12 13:27:44.569 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-12 13:27:44.569 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-12 13:27:44.571 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-12 13:27:44.572 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-12 13:27:44.572 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-12 13:27:44.574 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-12 13:27:44.575 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-12 13:27:44.575 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-12 13:27:44.576 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-12 13:27:44.580 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 301940799005800713167388758911697584694553796265
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu May 12 12:17:33 UTC 2022
           Final Date: Tue May 11 12:17:32 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [57:d0:0c:20:cc:6b:59:0e:94:84:b6:6d:f2:59:e2:3d:81:9d:22:f4]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 4e200007928ef500ba5414dfce31fda4175faeed
                       415bf5d8ecdb45919a02baa9e7419981b6cc9dcc
                       235f796ba978659425b1578876c3edce39f4b010
                       11d7aa6f7667e1c2e5acbf16a5dbef8fb3fa4451
                       7eb663431837e88a3f6fe3bd0b2359d255e3ecb8
                       f39061f8e162cd20f9054a5353d8dde9d26e3246
                       d3111489c8bd06a5c14fe7d49ab08b9def57ea6b
                       661f2a7cffb40e8615efb365bb578467d7199a27
                       1769e9ce105c7d53a61af8e7946669d1039f55bc
                       d0787f519d16e1dd899767719892e0123bd159b9
                       1602e85fa3f7b7a24517ba8e3a92a44111ec3779
                       d9d766fd47c8f2a9c1706348fbc4b966ede56a65
                       0c687b26d0affdb61db4d5bcd95770904e88f92e
                       d51dc5e3ce803680528f35393d65fb35f9abe44d
                       b4018f4cda59a2967671d357602866a354c26f28
                       809ba12b47225657049c39939ea2bfc0ffb75dcd
                       dbb372bc9c8cb8c15e33fc45c771d8eefe77b0ec
                       712c45c02294b693d8acfae86b3c357d787fcd9f
                       c21dd1d5e6e00df037301b93e159d0346d1f9ab2
                       283c1424
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [bc:68:0e:3a:ec:3b:ce:96:23:35:46:47:28:bb:4c:39:b9:fe:bb:9a]
            modulus: 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
    public exponent: 10001

] 
2022-05-12 13:27:57.151  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-12 13:27:57.153 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-12 13:27:57.154 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-05-12 13:27:57.156 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-12 13:27:57.157  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-05-12 13:27:57.157  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-12 13:27:57.158  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-12 13:27:57.158 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-12 13:27:57.159 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-12 13:27:57.159 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-12 13:27:57.165 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-12 13:27:57.165 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-12 13:27:57.166 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-12 13:27:57.166 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-12 13:27:57.319  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-12 13:27:57.320  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-12 13:27:57.321 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-12 13:27:57.321 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-12 13:27:57.323  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-12 13:27:57.323  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-12 13:27:57.324 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-12 13:27:57.324 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-12 13:27:57.325 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-12 13:27:57.326 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-12 13:27:57.326 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-12 13:27:57.327 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-12 13:27:57.328 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-12 13:27:57.328 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-12 13:27:57.329 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-12 13:27:57.330 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-12 13:27:57.334 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 301940799005800713167388758911697584694553796265
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu May 12 12:17:33 UTC 2022
           Final Date: Tue May 11 12:17:32 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [57:d0:0c:20:cc:6b:59:0e:94:84:b6:6d:f2:59:e2:3d:81:9d:22:f4]
            modulus: bd8389da6d055e744fca2410bc4c411615bbbabb48c3ec47438fdabc69acf1ddf0d59695d070f99eda8f8e3465225146c543a1ad784ea852d0761da8be87fc37acac26bd7e3ec9045191a2b5002446d3874a5f6dc90b8d7bb4315af37bcd011ec0befde6c05f38083538c240208aca6a2890e039239cb78512f58fb282b634f7b5feea3b8ad08188c08adfc481cd93dc5386efd4ef60426ba265c47d32f28faaa721227b694dd42d057e39fbdd5d146cff2e821e823b83569e1a849037a3e3820f89d265bfe3b2ce6650a9fe39a59b1c1cb8931bc02497949ebaf3a6c317f2014a2ee0381af5171079903447d7f4a284da5273ee200b1ee87938e0cfa0121fe86c2958eff3b06f3c076d094b6b4a3c148a402ce6da9f143ae7cf52de664bf68a1560502ce6b4a98204ed795bb65eb6206800da86d7723cda5a21faace8cf08ae6d88338e9e750ee400a9a701518ba95312d5b1917370d000fa16aac5dee3d539d133a38951ec56f9e9326a7f9ac013b96c1ec1cc4142a27bebd512869a4fec75
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 4e200007928ef500ba5414dfce31fda4175faeed
                       415bf5d8ecdb45919a02baa9e7419981b6cc9dcc
                       235f796ba978659425b1578876c3edce39f4b010
                       11d7aa6f7667e1c2e5acbf16a5dbef8fb3fa4451
                       7eb663431837e88a3f6fe3bd0b2359d255e3ecb8
                       f39061f8e162cd20f9054a5353d8dde9d26e3246
                       d3111489c8bd06a5c14fe7d49ab08b9def57ea6b
                       661f2a7cffb40e8615efb365bb578467d7199a27
                       1769e9ce105c7d53a61af8e7946669d1039f55bc
                       d0787f519d16e1dd899767719892e0123bd159b9
                       1602e85fa3f7b7a24517ba8e3a92a44111ec3779
                       d9d766fd47c8f2a9c1706348fbc4b966ede56a65
                       0c687b26d0affdb61db4d5bcd95770904e88f92e
                       d51dc5e3ce803680528f35393d65fb35f9abe44d
                       b4018f4cda59a2967671d357602866a354c26f28
                       809ba12b47225657049c39939ea2bfc0ffb75dcd
                       dbb372bc9c8cb8c15e33fc45c771d8eefe77b0ec
                       712c45c02294b693d8acfae86b3c357d787fcd9f
                       c21dd1d5e6e00df037301b93e159d0346d1f9ab2
                       283c1424
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [83:11:41:bf:d8:a1:ec:14:9e:98:fb:dd:49:29:a4:34:92:e0:0f:ab]
            modulus: 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
    public exponent: 10001

] 
2022-05-12 13:29:02.462  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-12 13:29:02.468 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-12 13:29:02.470 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-12 13:29:02.470 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-12 13:29:02.471  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-12 13:29:02.472  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-12 13:29:02.472  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-12 13:29:02.473 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-12 13:29:02.473 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-12 13:29:02.474 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-12 13:29:02.479 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-12 13:29:02.479 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-12 13:29:02.480 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-12 13:29:02.480 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-12 13:29:02.685  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-12 13:29:02.686  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-12 13:29:02.686 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-12 13:29:02.687 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-12 13:29:02.688  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-12 13:29:02.689  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-12 13:29:02.689 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-12 13:29:02.690 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-12 13:29:02.690 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-12 13:29:02.691 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-12 13:29:02.692 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-12 13:29:02.692 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-12 13:29:02.693 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-12 13:29:02.693 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-12 13:29:02.694 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-12 13:29:02.695 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-12 13:29:02.700 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 301940799005800713167388758911697584694553796265
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu May 12 12:17:33 UTC 2022
           Final Date: Tue May 11 12:17:32 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [57:d0:0c:20:cc:6b:59:0e:94:84:b6:6d:f2:59:e2:3d:81:9d:22:f4]
            modulus: bd8389da6d055e744fca2410bc4c411615bbbabb48c3ec47438fdabc69acf1ddf0d59695d070f99eda8f8e3465225146c543a1ad784ea852d0761da8be87fc37acac26bd7e3ec9045191a2b5002446d3874a5f6dc90b8d7bb4315af37bcd011ec0befde6c05f38083538c240208aca6a2890e039239cb78512f58fb282b634f7b5feea3b8ad08188c08adfc481cd93dc5386efd4ef60426ba265c47d32f28faaa721227b694dd42d057e39fbdd5d146cff2e821e823b83569e1a849037a3e3820f89d265bfe3b2ce6650a9fe39a59b1c1cb8931bc02497949ebaf3a6c317f2014a2ee0381af5171079903447d7f4a284da5273ee200b1ee87938e0cfa0121fe86c2958eff3b06f3c076d094b6b4a3c148a402ce6da9f143ae7cf52de664bf68a1560502ce6b4a98204ed795bb65eb6206800da86d7723cda5a21faace8cf08ae6d88338e9e750ee400a9a701518ba95312d5b1917370d000fa16aac5dee3d539d133a38951ec56f9e9326a7f9ac013b96c1ec1cc4142a27bebd512869a4fec75
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 4e200007928ef500ba5414dfce31fda4175faeed
                       415bf5d8ecdb45919a02baa9e7419981b6cc9dcc
                       235f796ba978659425b1578876c3edce39f4b010
                       11d7aa6f7667e1c2e5acbf16a5dbef8fb3fa4451
                       7eb663431837e88a3f6fe3bd0b2359d255e3ecb8
                       f39061f8e162cd20f9054a5353d8dde9d26e3246
                       d3111489c8bd06a5c14fe7d49ab08b9def57ea6b
                       661f2a7cffb40e8615efb365bb578467d7199a27
                       1769e9ce105c7d53a61af8e7946669d1039f55bc
                       d0787f519d16e1dd899767719892e0123bd159b9
                       1602e85fa3f7b7a24517ba8e3a92a44111ec3779
                       d9d766fd47c8f2a9c1706348fbc4b966ede56a65
                       0c687b26d0affdb61db4d5bcd95770904e88f92e
                       d51dc5e3ce803680528f35393d65fb35f9abe44d
                       b4018f4cda59a2967671d357602866a354c26f28
                       809ba12b47225657049c39939ea2bfc0ffb75dcd
                       dbb372bc9c8cb8c15e33fc45c771d8eefe77b0ec
                       712c45c02294b693d8acfae86b3c357d787fcd9f
                       c21dd1d5e6e00df037301b93e159d0346d1f9ab2
                       283c1424
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [f1:e4:a9:bd:c2:5f:29:90:83:22:a9:4a:69:29:68:8c:02:64:07:d6]
            modulus: afaa75d7376f268577c8e1bc629de060dec6753cc42ba23ec4d2daa428bb0ab940cb590ebf076fb823e69631fa5d6981bf71cad8803a3cdeaadb448d786007fdfcce09fb485c211c6b918d41faf8360ff9571fd69e066f5ba9c1e2ef001d701b2b7882770c129668ab0013b397d190e4febb134d993d2e20c4014b0025c2702684b5ec7e30fc5c888db6ee7233b52e36ea36d086ffc9fa3eecd2cafd7338dadcabb306d732641150e3ed63a87af51d5d66e26b4e3268d5b10f19f321ebd38ca47722d0d0d8077ffa7ca52ca935b3e87ba52bd0c4b49edfb252def8ab2591a070db82aa5e4ffa7bca2fee508fc2c152a66bfcbbb3054dd40ee894f9ce33bd5151
    public exponent: 10001

] 
2022-05-12 13:44:21.335  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-12 13:44:21.338 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-12 13:44:21.341 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-05-12 13:44:21.343 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-12 13:44:21.343  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-05-12 13:44:21.344  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-12 13:44:21.344  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-12 13:44:21.345 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-12 13:44:21.345 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-12 13:44:21.346 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-12 13:44:21.351 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-12 13:44:21.352 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-12 13:44:21.353 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-12 13:44:21.353 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-12 13:44:21.585  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-12 13:44:21.586  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-12 13:44:21.586 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-12 13:44:21.586 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-12 13:44:21.588  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-12 13:44:21.589  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-12 13:44:21.590 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-12 13:44:21.590 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-12 13:44:21.590 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-12 13:44:21.591 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-12 13:44:21.592 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-12 13:44:21.592 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-12 13:44:21.593 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-12 13:44:21.593 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-12 13:44:21.593 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-12 13:44:21.595 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-12 13:44:21.600 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 301940799005800713167388758911697584694553796265
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu May 12 12:17:33 UTC 2022
           Final Date: Tue May 11 12:17:32 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [57:d0:0c:20:cc:6b:59:0e:94:84:b6:6d:f2:59:e2:3d:81:9d:22:f4]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 4e200007928ef500ba5414dfce31fda4175faeed
                       415bf5d8ecdb45919a02baa9e7419981b6cc9dcc
                       235f796ba978659425b1578876c3edce39f4b010
                       11d7aa6f7667e1c2e5acbf16a5dbef8fb3fa4451
                       7eb663431837e88a3f6fe3bd0b2359d255e3ecb8
                       f39061f8e162cd20f9054a5353d8dde9d26e3246
                       d3111489c8bd06a5c14fe7d49ab08b9def57ea6b
                       661f2a7cffb40e8615efb365bb578467d7199a27
                       1769e9ce105c7d53a61af8e7946669d1039f55bc
                       d0787f519d16e1dd899767719892e0123bd159b9
                       1602e85fa3f7b7a24517ba8e3a92a44111ec3779
                       d9d766fd47c8f2a9c1706348fbc4b966ede56a65
                       0c687b26d0affdb61db4d5bcd95770904e88f92e
                       d51dc5e3ce803680528f35393d65fb35f9abe44d
                       b4018f4cda59a2967671d357602866a354c26f28
                       809ba12b47225657049c39939ea2bfc0ffb75dcd
                       dbb372bc9c8cb8c15e33fc45c771d8eefe77b0ec
                       712c45c02294b693d8acfae86b3c357d787fcd9f
                       c21dd1d5e6e00df037301b93e159d0346d1f9ab2
                       283c1424
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [23:57:df:35:1e:46:fe:a0:67:ae:bd:f4:76:83:4a:c8:3c:ba:df:31]
            modulus: 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
    public exponent: 10001

] 
2022-05-12 13:44:25.865  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-12 13:44:25.867 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-12 13:44:25.868 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-05-12 13:44:25.869 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-12 13:44:25.869  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-05-12 13:44:25.870  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-12 13:44:25.871  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-12 13:44:25.871 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-12 13:44:25.872 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-12 13:44:25.872 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-12 13:44:25.877 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-12 13:44:25.877 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-12 13:44:25.878 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-12 13:44:25.878 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-12 13:44:25.985  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-12 13:44:25.986  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-12 13:44:25.987 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-12 13:44:25.987 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-12 13:44:25.989  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-12 13:44:25.989  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-12 13:44:25.990 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-12 13:44:25.990 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-12 13:44:25.990 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-12 13:44:25.991 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-12 13:44:25.992 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-12 13:44:25.992 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-12 13:44:25.993 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-12 13:44:25.993 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-12 13:44:25.993 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-12 13:44:25.994 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-12 13:44:26.000 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 301940799005800713167388758911697584694553796265
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu May 12 12:17:33 UTC 2022
           Final Date: Tue May 11 12:17:32 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [57:d0:0c:20:cc:6b:59:0e:94:84:b6:6d:f2:59:e2:3d:81:9d:22:f4]
            modulus: bd8389da6d055e744fca2410bc4c411615bbbabb48c3ec47438fdabc69acf1ddf0d59695d070f99eda8f8e3465225146c543a1ad784ea852d0761da8be87fc37acac26bd7e3ec9045191a2b5002446d3874a5f6dc90b8d7bb4315af37bcd011ec0befde6c05f38083538c240208aca6a2890e039239cb78512f58fb282b634f7b5feea3b8ad08188c08adfc481cd93dc5386efd4ef60426ba265c47d32f28faaa721227b694dd42d057e39fbdd5d146cff2e821e823b83569e1a849037a3e3820f89d265bfe3b2ce6650a9fe39a59b1c1cb8931bc02497949ebaf3a6c317f2014a2ee0381af5171079903447d7f4a284da5273ee200b1ee87938e0cfa0121fe86c2958eff3b06f3c076d094b6b4a3c148a402ce6da9f143ae7cf52de664bf68a1560502ce6b4a98204ed795bb65eb6206800da86d7723cda5a21faace8cf08ae6d88338e9e750ee400a9a701518ba95312d5b1917370d000fa16aac5dee3d539d133a38951ec56f9e9326a7f9ac013b96c1ec1cc4142a27bebd512869a4fec75
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 4e200007928ef500ba5414dfce31fda4175faeed
                       415bf5d8ecdb45919a02baa9e7419981b6cc9dcc
                       235f796ba978659425b1578876c3edce39f4b010
                       11d7aa6f7667e1c2e5acbf16a5dbef8fb3fa4451
                       7eb663431837e88a3f6fe3bd0b2359d255e3ecb8
                       f39061f8e162cd20f9054a5353d8dde9d26e3246
                       d3111489c8bd06a5c14fe7d49ab08b9def57ea6b
                       661f2a7cffb40e8615efb365bb578467d7199a27
                       1769e9ce105c7d53a61af8e7946669d1039f55bc
                       d0787f519d16e1dd899767719892e0123bd159b9
                       1602e85fa3f7b7a24517ba8e3a92a44111ec3779
                       d9d766fd47c8f2a9c1706348fbc4b966ede56a65
                       0c687b26d0affdb61db4d5bcd95770904e88f92e
                       d51dc5e3ce803680528f35393d65fb35f9abe44d
                       b4018f4cda59a2967671d357602866a354c26f28
                       809ba12b47225657049c39939ea2bfc0ffb75dcd
                       dbb372bc9c8cb8c15e33fc45c771d8eefe77b0ec
                       712c45c02294b693d8acfae86b3c357d787fcd9f
                       c21dd1d5e6e00df037301b93e159d0346d1f9ab2
                       283c1424
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ba:11:a7:c6:36:9e:1a:88:90:21:93:bd:79:bb:14:47:a3:6d:d7:23]
            modulus: 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
    public exponent: 10001

]