Results

By type

          2022-08-12 05:18:16,834 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-08-12 05:18:17,672 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-08-12 05:18:18.366  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Aug 12, 2022 5:18:20 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Aug 12, 2022 5:18:20 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Aug 12, 2022 5:18:20 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Aug 12, 2022 5:18:20 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-08-12 05:18:20.835 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-08-12 05:18:21.114  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-08-12 05:18:21.279  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-08-12 05:18:21.974 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-08-12 05:18:21.977 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
2022-08-12 05:18:21.978 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-08-12 05:18:21.982 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-08-12 05:18:22.021 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2022-08-12 05:18:22.024 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/docs]}: redirectToUi(HttpServletRequest)
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
2022-08-12 05:18:22.146 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-08-12 05:18:22.721 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Aug 12, 2022 5:18:23 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-08-12 05:18:23.581  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 7.438 seconds (JVM running for 9.124)
Aug 12, 2022 5:18:50 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-08-12 05:19:06.242  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-08-12 05:19:06.250 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-08-12 05:19:06.287 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-08-12 05:19:06.291 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-08-12 05:19:06.308  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-08-12 05:19:06.310  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-08-12 05:19:06.311  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-08-12 05:19:06.312 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-08-12 05:19:06.313 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-12 05:19:06.317 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-08-12 05:19:06.323 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-08-12 05:19:06.326 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-08-12 05:19:06.363 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-08-12 05:19:06.368 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-12 05:19:06.369 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-12 05:19:06.372 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-12 05:19:06.872  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-08-12 05:19:06.874  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-08-12 05:19:06.874 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-08-12 05:19:06.876 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-12 05:19:06.885  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-08-12 05:19:06.886  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-08-12 05:19:06.887 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-12 05:19:06.887 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-12 05:19:06.887 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-12 05:19:06.899 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-12 05:19:06.899 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-12 05:19:06.900 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-12 05:19:06.905 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-12 05:19:06.905 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-12 05:19:06.906 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-12 05:19:06.907 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-08-12 05:19:06.933 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 183182957540865605175456255719735675814084943456
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Aug 12 05:16:18 UTC 2022
           Final Date: Wed Aug 11 05:16:17 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [23:c7:aa:87:12:52:f1:7d:5e:a2:f2:16:37:7a:4c:6a:cf:97:10:57]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7f2220de8bf095df88a10c1602b82aac1fbb8996
                       5e24a89b50bf06874df0fee9d7f159333ada56a8
                       166b971830cd1ad181f83f5134b512c9cc3ef44d
                       bcc8883749f771dfa18a721426e99fd2dd875bd5
                       6f0e1a34adcde25e914e7ddd9f1acca79774ef21
                       3748b30134d7ec0546f440e68a107256682e1483
                       078792d17449266327129f62a8a8208acaf4c1f1
                       718ac5537cb62009de95db21f0942f20a2d9077f
                       3eda43dfa52f1601006052a18f76a3111149c02c
                       5ef2507cab768b82b8152a5ccb9935f320642c46
                       1bde6de0220e4d4e4c1e40c1a298d4aff7867e2d
                       7b003f7daa46f09e55390a66dcac2c3bf9528a0e
                       f77aca1bd2ecf095fa2b9fcb0977b5983b45094e
                       1376647a49efdd59b0452bf6c6ac8c62382bf937
                       10e2bf0168175652cc0c7f7960386c9c1fbe9971
                       749b41ead8b7d649d0451c08ddc2d43205400490
                       19be1d0ec87a9782606ffe09bdb1fadee230e941
                       39e4ae7278ba80cda6afeb4a4168267a96674c1c
                       e6031bff4855eefdd6b970807832941cb47ebe85
                       11d3f31e
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [92:a5:30:13:3d:dd:ef:9b:be:e1:6d:43:ac:11:79:f3:ad:0e:e9:a9]
            modulus: d37679aae85dea0727c7cd8e10ff7f6e59658df8d8d08d707fdadd29ff544625a85ca438dc8bed1b4211d1b829140d1d0e347ac97f18b0b5306c44a09d39a755203e59a8f6833a39b3f54d1b07b30d5b042591b8cdbf445867bef8797b6e02252301a0318e44f5c5f3d714442e55bdc275316f6357c7ab212fd36f2b914ac4abaabe3698631733f1e4148fb7f88b989319865d0b6e69dcd998992b766d013851ed6496a7d74923bf9b24a56a68097370ecf68894a8d699d1f8511c539d51e6f48a4418065efe0ca93741c1406928b5367de560a8d5d16b91cbeb4174042a0b2458429db0d71f0b4d284d2195d7dcc2b873ec2b9c4802956e327e3a5099bec4c5
    public exponent: 10001

] 
2022-08-12 06:24:09.872  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-08-12 06:24:09.874 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-08-12 06:24:09.878 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-08-12 06:24:09.880 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-08-12 06:24:09.881  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-08-12 06:24:09.883  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-08-12 06:24:09.884  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-08-12 06:24:09.884 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-08-12 06:24:09.886 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-08-12 06:24:09.886 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-08-12 06:24:09.898 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-08-12 06:24:09.899 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-12 06:24:09.899 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-12 06:24:09.899 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-12 06:24:10.140  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-08-12 06:24:10.141  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-08-12 06:24:10.142 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-08-12 06:24:10.142 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-12 06:24:10.145  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-08-12 06:24:10.145  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-08-12 06:24:10.146 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-12 06:24:10.146 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-12 06:24:10.147 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-12 06:24:10.148 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-12 06:24:10.148 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-12 06:24:10.148 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-12 06:24:10.149 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-12 06:24:10.150 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-12 06:24:10.150 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-12 06:24:10.151 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-08-12 06:24:10.157 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 183182957540865605175456255719735675814084943456
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Aug 12 05:16:18 UTC 2022
           Final Date: Wed Aug 11 05:16:17 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [23:c7:aa:87:12:52:f1:7d:5e:a2:f2:16:37:7a:4c:6a:cf:97:10:57]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7f2220de8bf095df88a10c1602b82aac1fbb8996
                       5e24a89b50bf06874df0fee9d7f159333ada56a8
                       166b971830cd1ad181f83f5134b512c9cc3ef44d
                       bcc8883749f771dfa18a721426e99fd2dd875bd5
                       6f0e1a34adcde25e914e7ddd9f1acca79774ef21
                       3748b30134d7ec0546f440e68a107256682e1483
                       078792d17449266327129f62a8a8208acaf4c1f1
                       718ac5537cb62009de95db21f0942f20a2d9077f
                       3eda43dfa52f1601006052a18f76a3111149c02c
                       5ef2507cab768b82b8152a5ccb9935f320642c46
                       1bde6de0220e4d4e4c1e40c1a298d4aff7867e2d
                       7b003f7daa46f09e55390a66dcac2c3bf9528a0e
                       f77aca1bd2ecf095fa2b9fcb0977b5983b45094e
                       1376647a49efdd59b0452bf6c6ac8c62382bf937
                       10e2bf0168175652cc0c7f7960386c9c1fbe9971
                       749b41ead8b7d649d0451c08ddc2d43205400490
                       19be1d0ec87a9782606ffe09bdb1fadee230e941
                       39e4ae7278ba80cda6afeb4a4168267a96674c1c
                       e6031bff4855eefdd6b970807832941cb47ebe85
                       11d3f31e
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [09:34:c5:43:f0:d8:8f:83:0b:a3:24:d7:64:8e:47:7b:e3:2b:1b:b8]
            modulus: c4c911953c53857efe825f833923d59e3d9407e32f1903e74e82d1bd9a76806d0d604936b04a252f2ca395ce5ed9225b1bedc821baa0d34a687893848d7d97d8b8205446bbdb442f79ab5b1bad3116e7a00494537049e767c97d5a2340a8f48e4ba7f8082d618f71b3afe100f5aa40a60eedc035778152ebacad380908e97481f65c28777497e62a2e374abad5045982cafa1ecc0434e67fb4409a11c84b0b73f293c779f8ffa861ba851dc47f69fd93fec04194e1c7941f8cacf2839804f3f895d521fc00f44386bffac549f227335feb613edc9697bf8f87370b6ab84d159c365a79fe43dde89f2e1f6a0cfd92cc019135e6d864c571e1ca0b2a9c9705eee3
    public exponent: 10001

] 
2022-08-12 06:25:59.002  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-08-12 06:25:59.004 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-08-12 06:25:59.007 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-08-12 06:25:59.008 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-08-12 06:25:59.009  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-08-12 06:25:59.010  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-08-12 06:25:59.011  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-08-12 06:25:59.011 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-08-12 06:25:59.011 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-08-12 06:25:59.012 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-08-12 06:25:59.020 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-08-12 06:25:59.022 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-12 06:25:59.022 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-12 06:25:59.022 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-12 06:25:59.193  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-08-12 06:25:59.194  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-08-12 06:25:59.195 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-08-12 06:25:59.195 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-12 06:25:59.198  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-08-12 06:25:59.198  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-08-12 06:25:59.199 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-12 06:25:59.199 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-12 06:25:59.199 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-12 06:25:59.200 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-12 06:25:59.201 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-12 06:25:59.201 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-12 06:25:59.202 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-12 06:25:59.202 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-12 06:25:59.203 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-12 06:25:59.204 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-08-12 06:25:59.208 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 183182957540865605175456255719735675814084943456
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Aug 12 05:16:18 UTC 2022
           Final Date: Wed Aug 11 05:16:17 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [23:c7:aa:87:12:52:f1:7d:5e:a2:f2:16:37:7a:4c:6a:cf:97:10:57]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7f2220de8bf095df88a10c1602b82aac1fbb8996
                       5e24a89b50bf06874df0fee9d7f159333ada56a8
                       166b971830cd1ad181f83f5134b512c9cc3ef44d
                       bcc8883749f771dfa18a721426e99fd2dd875bd5
                       6f0e1a34adcde25e914e7ddd9f1acca79774ef21
                       3748b30134d7ec0546f440e68a107256682e1483
                       078792d17449266327129f62a8a8208acaf4c1f1
                       718ac5537cb62009de95db21f0942f20a2d9077f
                       3eda43dfa52f1601006052a18f76a3111149c02c
                       5ef2507cab768b82b8152a5ccb9935f320642c46
                       1bde6de0220e4d4e4c1e40c1a298d4aff7867e2d
                       7b003f7daa46f09e55390a66dcac2c3bf9528a0e
                       f77aca1bd2ecf095fa2b9fcb0977b5983b45094e
                       1376647a49efdd59b0452bf6c6ac8c62382bf937
                       10e2bf0168175652cc0c7f7960386c9c1fbe9971
                       749b41ead8b7d649d0451c08ddc2d43205400490
                       19be1d0ec87a9782606ffe09bdb1fadee230e941
                       39e4ae7278ba80cda6afeb4a4168267a96674c1c
                       e6031bff4855eefdd6b970807832941cb47ebe85
                       11d3f31e
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [dd:eb:ea:14:d6:75:07:9e:22:a4:2a:db:7e:35:fb:50:06:c4:b9:3a]
            modulus: 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
    public exponent: 10001

] 
2022-08-12 06:27:10.619  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-08-12 06:27:10.621 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-08-12 06:27:10.628 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-08-12 06:27:10.629 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-08-12 06:27:10.630  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-08-12 06:27:10.631  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-08-12 06:27:10.631  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-08-12 06:27:10.631 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-08-12 06:27:10.632 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-08-12 06:27:10.632 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-08-12 06:27:10.637 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-08-12 06:27:10.638 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-12 06:27:10.639 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-12 06:27:10.639 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-12 06:27:10.777  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-08-12 06:27:10.778  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-08-12 06:27:10.778 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-08-12 06:27:10.779 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-12 06:27:10.784  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-08-12 06:27:10.785  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-08-12 06:27:10.786 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-12 06:27:10.786 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-12 06:27:10.786 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-12 06:27:10.787 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-12 06:27:10.788 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-12 06:27:10.788 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-12 06:27:10.789 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-12 06:27:10.790 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-12 06:27:10.790 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-12 06:27:10.792 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-08-12 06:27:10.797 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 183182957540865605175456255719735675814084943456
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Aug 12 05:16:18 UTC 2022
           Final Date: Wed Aug 11 05:16:17 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [23:c7:aa:87:12:52:f1:7d:5e:a2:f2:16:37:7a:4c:6a:cf:97:10:57]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7f2220de8bf095df88a10c1602b82aac1fbb8996
                       5e24a89b50bf06874df0fee9d7f159333ada56a8
                       166b971830cd1ad181f83f5134b512c9cc3ef44d
                       bcc8883749f771dfa18a721426e99fd2dd875bd5
                       6f0e1a34adcde25e914e7ddd9f1acca79774ef21
                       3748b30134d7ec0546f440e68a107256682e1483
                       078792d17449266327129f62a8a8208acaf4c1f1
                       718ac5537cb62009de95db21f0942f20a2d9077f
                       3eda43dfa52f1601006052a18f76a3111149c02c
                       5ef2507cab768b82b8152a5ccb9935f320642c46
                       1bde6de0220e4d4e4c1e40c1a298d4aff7867e2d
                       7b003f7daa46f09e55390a66dcac2c3bf9528a0e
                       f77aca1bd2ecf095fa2b9fcb0977b5983b45094e
                       1376647a49efdd59b0452bf6c6ac8c62382bf937
                       10e2bf0168175652cc0c7f7960386c9c1fbe9971
                       749b41ead8b7d649d0451c08ddc2d43205400490
                       19be1d0ec87a9782606ffe09bdb1fadee230e941
                       39e4ae7278ba80cda6afeb4a4168267a96674c1c
                       e6031bff4855eefdd6b970807832941cb47ebe85
                       11d3f31e
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [cc:29:60:67:35:d7:b2:7d:7a:7a:44:18:b7:4c:2e:22:0c:f7:fa:e6]
            modulus: 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
    public exponent: 10001

] 
2022-08-12 06:29:23.914  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-08-12 06:29:23.915 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-08-12 06:29:23.917 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-08-12 06:29:23.917 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-08-12 06:29:23.918  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-08-12 06:29:23.919  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-08-12 06:29:23.920  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-08-12 06:29:23.921 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-08-12 06:29:23.921 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-08-12 06:29:23.922 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-08-12 06:29:23.926 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-08-12 06:29:23.927 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-12 06:29:23.927 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-12 06:29:23.928 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-12 06:29:24.103  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-08-12 06:29:24.104  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-08-12 06:29:24.105 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-08-12 06:29:24.105 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-12 06:29:24.107  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-08-12 06:29:24.108  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-08-12 06:29:24.109 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-12 06:29:24.109 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-12 06:29:24.109 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-12 06:29:24.110 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-12 06:29:24.111 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-12 06:29:24.111 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-12 06:29:24.112 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-12 06:29:24.113 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-12 06:29:24.113 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-12 06:29:24.114 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-08-12 06:29:24.118 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 183182957540865605175456255719735675814084943456
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Aug 12 05:16:18 UTC 2022
           Final Date: Wed Aug 11 05:16:17 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [23:c7:aa:87:12:52:f1:7d:5e:a2:f2:16:37:7a:4c:6a:cf:97:10:57]
            modulus: b3ed5a7667f1ae7a00ed71ac5705734fedaeb90db38b1126fd29cb35666e6fcf06a0863488f1d0aaf012b15bdb7371776654f99155148395a1bf7e2a963b4ffef38db23e226f03b7314325747749046c7716a38795ef5a4f7c15070a07f0b9a84135e740158a1a2926bd9773e8b4d3f7f7eeafbdc977d92edf5f676e3b88982f46f848355a7b8d95ef71ae8a145644b8da0e56dfa19b600119cbb0bd59fb1d3e244cf7333d52bab1ec4736f94cc2d62a4cf4c4329a04559b9bb166ee00b568c39c9618038083e1a84d99232cf519f404c53271356d745e3ae5d5ea74e43b9339de2a9c45f0144a08687feab6afdda81fa4e5f7ab827ca2db41cf341a6e12cdfc6bb6636ebcbee1da327d141d56ce4c71fa2728779a864ad5672b6c0451f3ff45ad6e0b4b7607ca84570fb69c2ffa7299797a34b67d009c1165fd96becc2617111e7e2a437ce0848984742df30f3811d9d0967b4d2aafd44b818799d0c9c4c29d3eb6e4700db2a859fb0e7c17dc23bdfe50b02364474166f2a1007049ff7ca75f
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7f2220de8bf095df88a10c1602b82aac1fbb8996
                       5e24a89b50bf06874df0fee9d7f159333ada56a8
                       166b971830cd1ad181f83f5134b512c9cc3ef44d
                       bcc8883749f771dfa18a721426e99fd2dd875bd5
                       6f0e1a34adcde25e914e7ddd9f1acca79774ef21
                       3748b30134d7ec0546f440e68a107256682e1483
                       078792d17449266327129f62a8a8208acaf4c1f1
                       718ac5537cb62009de95db21f0942f20a2d9077f
                       3eda43dfa52f1601006052a18f76a3111149c02c
                       5ef2507cab768b82b8152a5ccb9935f320642c46
                       1bde6de0220e4d4e4c1e40c1a298d4aff7867e2d
                       7b003f7daa46f09e55390a66dcac2c3bf9528a0e
                       f77aca1bd2ecf095fa2b9fcb0977b5983b45094e
                       1376647a49efdd59b0452bf6c6ac8c62382bf937
                       10e2bf0168175652cc0c7f7960386c9c1fbe9971
                       749b41ead8b7d649d0451c08ddc2d43205400490
                       19be1d0ec87a9782606ffe09bdb1fadee230e941
                       39e4ae7278ba80cda6afeb4a4168267a96674c1c
                       e6031bff4855eefdd6b970807832941cb47ebe85
                       11d3f31e
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [c1:5b:cf:9f:d6:4c:d9:74:9f:75:38:c1:06:e1:b7:b1:35:4b:27:5d]
            modulus: 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
    public exponent: 10001

] 
2022-08-12 06:38:20.803  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-08-12 06:38:20.805 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-08-12 06:38:20.808 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-08-12 06:38:20.809 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-08-12 06:38:20.809  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-08-12 06:38:20.810  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-08-12 06:38:20.810  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-08-12 06:38:20.811 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-08-12 06:38:20.811 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-08-12 06:38:20.812 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-08-12 06:38:20.817 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-08-12 06:38:20.818 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-12 06:38:20.818 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-12 06:38:20.818 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-12 06:38:20.960  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-08-12 06:38:20.961  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-08-12 06:38:20.961 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-08-12 06:38:20.962 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-12 06:38:20.963  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-08-12 06:38:20.963  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-08-12 06:38:20.964 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-12 06:38:20.964 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-12 06:38:20.964 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-12 06:38:20.965 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-12 06:38:20.965 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-12 06:38:20.966 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-12 06:38:20.966 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-12 06:38:20.967 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-12 06:38:20.967 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-12 06:38:20.968 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-08-12 06:38:20.973 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 183182957540865605175456255719735675814084943456
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Aug 12 05:16:18 UTC 2022
           Final Date: Wed Aug 11 05:16:17 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [23:c7:aa:87:12:52:f1:7d:5e:a2:f2:16:37:7a:4c:6a:cf:97:10:57]
            modulus: b3ed5a7667f1ae7a00ed71ac5705734fedaeb90db38b1126fd29cb35666e6fcf06a0863488f1d0aaf012b15bdb7371776654f99155148395a1bf7e2a963b4ffef38db23e226f03b7314325747749046c7716a38795ef5a4f7c15070a07f0b9a84135e740158a1a2926bd9773e8b4d3f7f7eeafbdc977d92edf5f676e3b88982f46f848355a7b8d95ef71ae8a145644b8da0e56dfa19b600119cbb0bd59fb1d3e244cf7333d52bab1ec4736f94cc2d62a4cf4c4329a04559b9bb166ee00b568c39c9618038083e1a84d99232cf519f404c53271356d745e3ae5d5ea74e43b9339de2a9c45f0144a08687feab6afdda81fa4e5f7ab827ca2db41cf341a6e12cdfc6bb6636ebcbee1da327d141d56ce4c71fa2728779a864ad5672b6c0451f3ff45ad6e0b4b7607ca84570fb69c2ffa7299797a34b67d009c1165fd96becc2617111e7e2a437ce0848984742df30f3811d9d0967b4d2aafd44b818799d0c9c4c29d3eb6e4700db2a859fb0e7c17dc23bdfe50b02364474166f2a1007049ff7ca75f
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7f2220de8bf095df88a10c1602b82aac1fbb8996
                       5e24a89b50bf06874df0fee9d7f159333ada56a8
                       166b971830cd1ad181f83f5134b512c9cc3ef44d
                       bcc8883749f771dfa18a721426e99fd2dd875bd5
                       6f0e1a34adcde25e914e7ddd9f1acca79774ef21
                       3748b30134d7ec0546f440e68a107256682e1483
                       078792d17449266327129f62a8a8208acaf4c1f1
                       718ac5537cb62009de95db21f0942f20a2d9077f
                       3eda43dfa52f1601006052a18f76a3111149c02c
                       5ef2507cab768b82b8152a5ccb9935f320642c46
                       1bde6de0220e4d4e4c1e40c1a298d4aff7867e2d
                       7b003f7daa46f09e55390a66dcac2c3bf9528a0e
                       f77aca1bd2ecf095fa2b9fcb0977b5983b45094e
                       1376647a49efdd59b0452bf6c6ac8c62382bf937
                       10e2bf0168175652cc0c7f7960386c9c1fbe9971
                       749b41ead8b7d649d0451c08ddc2d43205400490
                       19be1d0ec87a9782606ffe09bdb1fadee230e941
                       39e4ae7278ba80cda6afeb4a4168267a96674c1c
                       e6031bff4855eefdd6b970807832941cb47ebe85
                       11d3f31e
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [12:06:cb:9f:b1:64:37:b5:f9:e6:eb:da:ef:ca:55:b3:98:af:c6:ce]
            modulus: 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
    public exponent: 10001

] 
2022-08-12 06:43:06.391  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-08-12 06:43:06.393 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-08-12 06:43:06.395 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-08-12 06:43:06.395 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-08-12 06:43:06.396  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-08-12 06:43:06.396  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-08-12 06:43:06.397  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-08-12 06:43:06.397 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-08-12 06:43:06.398 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-08-12 06:43:06.398 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-08-12 06:43:06.403 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-08-12 06:43:06.404 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-12 06:43:06.404 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-12 06:43:06.404 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-12 06:43:06.553  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-08-12 06:43:06.554  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-08-12 06:43:06.554 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-08-12 06:43:06.554 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-12 06:43:06.556  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-08-12 06:43:06.556  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-08-12 06:43:06.557 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-12 06:43:06.557 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-12 06:43:06.558 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-12 06:43:06.558 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-12 06:43:06.559 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-12 06:43:06.559 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-12 06:43:06.560 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-12 06:43:06.560 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-12 06:43:06.561 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-12 06:43:06.562 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-08-12 06:43:06.565 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 183182957540865605175456255719735675814084943456
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Aug 12 05:16:18 UTC 2022
           Final Date: Wed Aug 11 05:16:17 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [23:c7:aa:87:12:52:f1:7d:5e:a2:f2:16:37:7a:4c:6a:cf:97:10:57]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7f2220de8bf095df88a10c1602b82aac1fbb8996
                       5e24a89b50bf06874df0fee9d7f159333ada56a8
                       166b971830cd1ad181f83f5134b512c9cc3ef44d
                       bcc8883749f771dfa18a721426e99fd2dd875bd5
                       6f0e1a34adcde25e914e7ddd9f1acca79774ef21
                       3748b30134d7ec0546f440e68a107256682e1483
                       078792d17449266327129f62a8a8208acaf4c1f1
                       718ac5537cb62009de95db21f0942f20a2d9077f
                       3eda43dfa52f1601006052a18f76a3111149c02c
                       5ef2507cab768b82b8152a5ccb9935f320642c46
                       1bde6de0220e4d4e4c1e40c1a298d4aff7867e2d
                       7b003f7daa46f09e55390a66dcac2c3bf9528a0e
                       f77aca1bd2ecf095fa2b9fcb0977b5983b45094e
                       1376647a49efdd59b0452bf6c6ac8c62382bf937
                       10e2bf0168175652cc0c7f7960386c9c1fbe9971
                       749b41ead8b7d649d0451c08ddc2d43205400490
                       19be1d0ec87a9782606ffe09bdb1fadee230e941
                       39e4ae7278ba80cda6afeb4a4168267a96674c1c
                       e6031bff4855eefdd6b970807832941cb47ebe85
                       11d3f31e
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [81:d1:93:a7:00:10:2f:49:bc:1a:ab:39:85:f4:70:fb:c7:65:73:0d]
            modulus: d639363ce4a412947c4608047e7794bf88fbc9d6156dbd3a6c01004b57934960e9a48c366bf9245fd47381d1779da69f39bc22c5bad466f3a19d45fc24aba46a76aa94569f04e2f1502ab3f43b40b471972eab975d0922d9a1bd3ee825d224ba3c7e7d8f911ee5574738b1af75e810e82d3dd8a66479190f2fab16cdf21bba1b3d391ee06fe9c5aedc2cf2c61eb9d2d2f3716e5b17bd3203dd3c479d92efceea9e23999c47528333a35f19e0cd12ce8ed63efda815ffe5e09d0875f039fca4734f16d7246b83363d17a050668c49fabf413958e4f49f56de684a2fb55d8491ba2dad4a625abce6c0ba42e931bb40841321b894341ae83bf10991af91c2f6d7df
    public exponent: 10001

] 
2022-08-12 06:43:25.556  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-08-12 06:43:25.556 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-08-12 06:43:25.558 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-08-12 06:43:25.558 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-08-12 06:43:25.559  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-08-12 06:43:25.559  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-08-12 06:43:25.559  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-08-12 06:43:25.560 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-08-12 06:43:25.560 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-08-12 06:43:25.560 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-08-12 06:43:25.565 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-08-12 06:43:25.565 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-12 06:43:25.565 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-12 06:43:25.566 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-12 06:43:25.680  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-08-12 06:43:25.681  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-08-12 06:43:25.681 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-08-12 06:43:25.681 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-12 06:43:25.683  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-08-12 06:43:25.683  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-08-12 06:43:25.684 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-12 06:43:25.684 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-12 06:43:25.684 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-12 06:43:25.685 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-12 06:43:25.685 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-12 06:43:25.686 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-12 06:43:25.686 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-12 06:43:25.687 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-12 06:43:25.687 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-12 06:43:25.688 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-08-12 06:43:25.691 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 183182957540865605175456255719735675814084943456
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Aug 12 05:16:18 UTC 2022
           Final Date: Wed Aug 11 05:16:17 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [23:c7:aa:87:12:52:f1:7d:5e:a2:f2:16:37:7a:4c:6a:cf:97:10:57]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7f2220de8bf095df88a10c1602b82aac1fbb8996
                       5e24a89b50bf06874df0fee9d7f159333ada56a8
                       166b971830cd1ad181f83f5134b512c9cc3ef44d
                       bcc8883749f771dfa18a721426e99fd2dd875bd5
                       6f0e1a34adcde25e914e7ddd9f1acca79774ef21
                       3748b30134d7ec0546f440e68a107256682e1483
                       078792d17449266327129f62a8a8208acaf4c1f1
                       718ac5537cb62009de95db21f0942f20a2d9077f
                       3eda43dfa52f1601006052a18f76a3111149c02c
                       5ef2507cab768b82b8152a5ccb9935f320642c46
                       1bde6de0220e4d4e4c1e40c1a298d4aff7867e2d
                       7b003f7daa46f09e55390a66dcac2c3bf9528a0e
                       f77aca1bd2ecf095fa2b9fcb0977b5983b45094e
                       1376647a49efdd59b0452bf6c6ac8c62382bf937
                       10e2bf0168175652cc0c7f7960386c9c1fbe9971
                       749b41ead8b7d649d0451c08ddc2d43205400490
                       19be1d0ec87a9782606ffe09bdb1fadee230e941
                       39e4ae7278ba80cda6afeb4a4168267a96674c1c
                       e6031bff4855eefdd6b970807832941cb47ebe85
                       11d3f31e
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [32:2e:26:37:27:a8:3f:50:c5:06:21:5b:f7:30:78:76:64:68:28:36]
            modulus: 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
    public exponent: 10001

] 
2022-08-12 06:59:50.216  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-08-12 06:59:50.219 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-08-12 06:59:50.222 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-08-12 06:59:50.223 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-08-12 06:59:50.223  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-08-12 06:59:50.224  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-08-12 06:59:50.224  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-08-12 06:59:50.225 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-08-12 06:59:50.225 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-08-12 06:59:50.226 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-08-12 06:59:50.231 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-08-12 06:59:50.232 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-12 06:59:50.232 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-12 06:59:50.233 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-12 06:59:50.473  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-08-12 06:59:50.474  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-08-12 06:59:50.474 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-08-12 06:59:50.475 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-12 06:59:50.476  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-08-12 06:59:50.476  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-08-12 06:59:50.477 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-12 06:59:50.477 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-12 06:59:50.477 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-12 06:59:50.478 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-12 06:59:50.478 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-12 06:59:50.478 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-12 06:59:50.479 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-12 06:59:50.479 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-12 06:59:50.479 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-12 06:59:50.480 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-08-12 06:59:50.484 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 183182957540865605175456255719735675814084943456
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Aug 12 05:16:18 UTC 2022
           Final Date: Wed Aug 11 05:16:17 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [23:c7:aa:87:12:52:f1:7d:5e:a2:f2:16:37:7a:4c:6a:cf:97:10:57]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7f2220de8bf095df88a10c1602b82aac1fbb8996
                       5e24a89b50bf06874df0fee9d7f159333ada56a8
                       166b971830cd1ad181f83f5134b512c9cc3ef44d
                       bcc8883749f771dfa18a721426e99fd2dd875bd5
                       6f0e1a34adcde25e914e7ddd9f1acca79774ef21
                       3748b30134d7ec0546f440e68a107256682e1483
                       078792d17449266327129f62a8a8208acaf4c1f1
                       718ac5537cb62009de95db21f0942f20a2d9077f
                       3eda43dfa52f1601006052a18f76a3111149c02c
                       5ef2507cab768b82b8152a5ccb9935f320642c46
                       1bde6de0220e4d4e4c1e40c1a298d4aff7867e2d
                       7b003f7daa46f09e55390a66dcac2c3bf9528a0e
                       f77aca1bd2ecf095fa2b9fcb0977b5983b45094e
                       1376647a49efdd59b0452bf6c6ac8c62382bf937
                       10e2bf0168175652cc0c7f7960386c9c1fbe9971
                       749b41ead8b7d649d0451c08ddc2d43205400490
                       19be1d0ec87a9782606ffe09bdb1fadee230e941
                       39e4ae7278ba80cda6afeb4a4168267a96674c1c
                       e6031bff4855eefdd6b970807832941cb47ebe85
                       11d3f31e
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [aa:5b:ef:1b:f4:4b:77:eb:cd:8b:4f:8a:73:7f:90:66:93:4b:bf:ed]
            modulus: c1ae7541caf731f8e54e5a10762766844a17cad044ecc20733f682a72d048278fdefe4a4873ad558790558ed6490426ffd6878e2c20dcf1d1e4526bd2767a3a88886812df9b1a9e9231e21865eaa41e18667aa9d28a7a541183ce95d9bc1b477eef495ffdd0cb54931f28e8fa71dfe8024606b1d9b3a7a9403933c4a3d2811ada18c691b6cb40a7fdc81e03ec3de0817b5546d14050ed800ebf3e152bb2c98c2afd5716db4765e483bdc29ea73831a3e2a1136fc64d7a25d0b80d8431b00174fd2d6b6477006092b9b04a0ea45b2623380b63e6ade3576852a77f6b169a68f66edf5e9b8802da21c0c7829776122af7998b24b34c4202397d80794681ac9e9b7
    public exponent: 10001

] 
2022-08-12 06:59:55.911  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-08-12 06:59:55.912 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-08-12 06:59:55.913 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-08-12 06:59:55.914 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-08-12 06:59:55.914  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-08-12 06:59:55.915  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-08-12 06:59:55.915  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-08-12 06:59:55.915 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-08-12 06:59:55.916 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-08-12 06:59:55.916 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-08-12 06:59:55.920 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-08-12 06:59:55.921 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-12 06:59:55.921 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-08-12 06:59:55.921 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-12 06:59:56.023  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-08-12 06:59:56.024  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-08-12 06:59:56.024 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-08-12 06:59:56.024 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-08-12 06:59:56.026  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-08-12 06:59:56.026  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-08-12 06:59:56.026 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-12 06:59:56.027 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-12 06:59:56.027 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-12 06:59:56.028 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-12 06:59:56.028 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-12 06:59:56.028 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-12 06:59:56.029 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-08-12 06:59:56.029 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-08-12 06:59:56.030 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-08-12 06:59:56.030 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-08-12 06:59:56.033 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 183182957540865605175456255719735675814084943456
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Aug 12 05:16:18 UTC 2022
           Final Date: Wed Aug 11 05:16:17 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [23:c7:aa:87:12:52:f1:7d:5e:a2:f2:16:37:7a:4c:6a:cf:97:10:57]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7f2220de8bf095df88a10c1602b82aac1fbb8996
                       5e24a89b50bf06874df0fee9d7f159333ada56a8
                       166b971830cd1ad181f83f5134b512c9cc3ef44d
                       bcc8883749f771dfa18a721426e99fd2dd875bd5
                       6f0e1a34adcde25e914e7ddd9f1acca79774ef21
                       3748b30134d7ec0546f440e68a107256682e1483
                       078792d17449266327129f62a8a8208acaf4c1f1
                       718ac5537cb62009de95db21f0942f20a2d9077f
                       3eda43dfa52f1601006052a18f76a3111149c02c
                       5ef2507cab768b82b8152a5ccb9935f320642c46
                       1bde6de0220e4d4e4c1e40c1a298d4aff7867e2d
                       7b003f7daa46f09e55390a66dcac2c3bf9528a0e
                       f77aca1bd2ecf095fa2b9fcb0977b5983b45094e
                       1376647a49efdd59b0452bf6c6ac8c62382bf937
                       10e2bf0168175652cc0c7f7960386c9c1fbe9971
                       749b41ead8b7d649d0451c08ddc2d43205400490
                       19be1d0ec87a9782606ffe09bdb1fadee230e941
                       39e4ae7278ba80cda6afeb4a4168267a96674c1c
                       e6031bff4855eefdd6b970807832941cb47ebe85
                       11d3f31e
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [5d:92:1d:b1:01:a6:22:a2:65:ab:f3:b9:6e:88:6b:89:9b:e0:11:0b]
            modulus: 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
    public exponent: 10001

]