Results

By type

          2022-09-30 05:17:10,245 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-09-30 05:17:11,082 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-09-30 05:17:11.797  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Sep 30, 2022 5:17:13 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Sep 30, 2022 5:17:13 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Sep 30, 2022 5:17:13 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Sep 30, 2022 5:17:13 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-09-30 05:17:14.230 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-09-30 05:17:14.513  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-09-30 05:17:14.681  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-09-30 05:17:15.349 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-09-30 05:17:15.351 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
2022-09-30 05:17:15.352 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-09-30 05:17:15.356 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-09-30 05:17:15.391 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2022-09-30 05:17:15.394 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/docs]}: redirectToUi(HttpServletRequest)
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
2022-09-30 05:17:15.508 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-09-30 05:17:16.206 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Sep 30, 2022 5:17:16 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-09-30 05:17:17.074  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 7.595 seconds (JVM running for 9.371)
Sep 30, 2022 5:17:42 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-09-30 05:18:03.681  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-09-30 05:18:03.688 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-09-30 05:18:03.726 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-09-30 05:18:03.729 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-09-30 05:18:03.745  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-09-30 05:18:03.747  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-09-30 05:18:03.747  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-09-30 05:18:03.749 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-09-30 05:18:03.749 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-09-30 05:18:03.752 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-09-30 05:18:03.760 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-09-30 05:18:03.763 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-09-30 05:18:03.811 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-09-30 05:18:03.815 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-09-30 05:18:03.816 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-09-30 05:18:03.819 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-09-30 05:18:04.587  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-09-30 05:18:04.589  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-09-30 05:18:04.590 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-09-30 05:18:04.591 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-09-30 05:18:04.600  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-09-30 05:18:04.601  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-09-30 05:18:04.601 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-09-30 05:18:04.602 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-09-30 05:18:04.602 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-09-30 05:18:04.616 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-09-30 05:18:04.617 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-09-30 05:18:04.617 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-09-30 05:18:04.622 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-09-30 05:18:04.623 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-09-30 05:18:04.623 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-09-30 05:18:04.624 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-09-30 05:18:04.655 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 3430300525379874437536642235544789226140538504
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Sep 30 05:14:55 UTC 2022
           Final Date: Wed Sep 29 05:14:54 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f0:e2:76:2a:fc:71:da:ed:23:b6:24:4a:0a:0c:1b:59:35:c0:50:a6],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: b149df8e369adb090a0e83c63bf864b754d9eb5f
                       9c8edb414ceb36d485af81472393068c1fdd4bac
                       d778b4ffc74d927320fa10196fb5644f3b2a12a8
                       b2673c2bf74ed4dd6383c46947204490872f36ad
                       f381b02d245853d5e8c0e05c3ce57f0fc4764d5a
                       c2becfaccea808143ed80b48915a54a239551b75
                       e06f8c75d2232495e0cbfeed37927f48418411f6
                       3c3a2a5ff7ea519e4146c3b4a2f536d3dff9f4e7
                       2f3df346c4d4e56b4842f3f31f192f9b1cf35fd8
                       99fe890c7b4af71992f0fc5d747725e79b122969
                       c87df7951820b7114c814ba6542f601b7da814f8
                       286eaf300d3e130ebba65e4880d9b0498c26efd4
                       34f12398b2b6303affbc2e45661bc24643443031
                       c7a8ecf7cfdce0810ceff2acd9328750a841d01a
                       92df73f9e0ff75448a54d6583d103759ef6b12bd
                       6e4c356bfb6c88d3e3bd6946ce0b0a4a25ab935f
                       bb9cb5d858930cc227c0e5d6f2560040886bde5d
                       ccfccb17f6bd5091243b31a6ce1b09bc0f162bf0
                       b875fc779dacf5b76b36b3bec852e648d762f116
                       1bfc9eaa
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [76:04:72:28:d3:fa:29:83:34:56:a6:25:be:95:72:80:f0:e1:28:a8],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-09-30 06:35:00.431  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-09-30 06:35:00.439 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-09-30 06:35:00.444 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-09-30 06:35:00.445 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-09-30 06:35:00.446  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-09-30 06:35:00.447  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-09-30 06:35:00.447  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-09-30 06:35:00.448 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-09-30 06:35:00.449 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-09-30 06:35:00.450 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-09-30 06:35:00.455 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-09-30 06:35:00.456 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-09-30 06:35:00.457 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-09-30 06:35:00.457 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-09-30 06:35:00.902  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-09-30 06:35:00.903  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-09-30 06:35:00.904 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-09-30 06:35:00.904 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-09-30 06:35:00.908  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-09-30 06:35:00.909  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-09-30 06:35:00.910 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-09-30 06:35:00.910 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-09-30 06:35:00.911 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-09-30 06:35:00.912 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-09-30 06:35:00.913 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-09-30 06:35:00.914 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-09-30 06:35:00.915 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-09-30 06:35:00.915 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-09-30 06:35:00.916 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-09-30 06:35:00.917 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-09-30 06:35:00.924 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 3430300525379874437536642235544789226140538504
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Sep 30 05:14:55 UTC 2022
           Final Date: Wed Sep 29 05:14:54 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f0:e2:76:2a:fc:71:da:ed:23:b6:24:4a:0a:0c:1b:59:35:c0:50:a6],[56:66:d1:a4]
        modulus: cbec9cf6e998c7d61d6c1f3a9f411e5859f86d39a70766f3fd668d1d33658fd9583f4fc6be33fa0ead1c292e8e71b349223e8024bfd4e91c2965229776b087153052e22839524f8d5af7407946bfaafc928d80ade761961a0bd0913d8cc8368335c11459c7505e4280807033441814f4157f6acedd770020a27b63b6558d56241cfe76dc99f72eb56110349033997f182f25efe4ce1ebc9396adc7325b2c2d1b38c9ad5efd87fcdad158850a4fb8940612b45f76ba12ff32bd3fb9011f86a133a48098f8ec191b2b584490070e3afd7b6e82f49e2ae9ad3c0c418dd306a0ba784f9875c87ac56612f53ce8b9db9630d4889842c75d04da2066337715e998c49185f90feed124bf983954328f3f0a0019bf5fa5f1e73711711b1213b536599d213b21e7796fb6233353201237b0b2c1254c3f8fc28308bfa65c498fddb84e1b9925ab6e025ce567a9b383ebd0dd8a4724fa32133bc1e5b1095a1958ca9656fc688b2dfe969cd38dfb2c35af5a26b597dafffac49993f017b75fe31d83d1c2ff15
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: b149df8e369adb090a0e83c63bf864b754d9eb5f
                       9c8edb414ceb36d485af81472393068c1fdd4bac
                       d778b4ffc74d927320fa10196fb5644f3b2a12a8
                       b2673c2bf74ed4dd6383c46947204490872f36ad
                       f381b02d245853d5e8c0e05c3ce57f0fc4764d5a
                       c2becfaccea808143ed80b48915a54a239551b75
                       e06f8c75d2232495e0cbfeed37927f48418411f6
                       3c3a2a5ff7ea519e4146c3b4a2f536d3dff9f4e7
                       2f3df346c4d4e56b4842f3f31f192f9b1cf35fd8
                       99fe890c7b4af71992f0fc5d747725e79b122969
                       c87df7951820b7114c814ba6542f601b7da814f8
                       286eaf300d3e130ebba65e4880d9b0498c26efd4
                       34f12398b2b6303affbc2e45661bc24643443031
                       c7a8ecf7cfdce0810ceff2acd9328750a841d01a
                       92df73f9e0ff75448a54d6583d103759ef6b12bd
                       6e4c356bfb6c88d3e3bd6946ce0b0a4a25ab935f
                       bb9cb5d858930cc227c0e5d6f2560040886bde5d
                       ccfccb17f6bd5091243b31a6ce1b09bc0f162bf0
                       b875fc779dacf5b76b36b3bec852e648d762f116
                       1bfc9eaa
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [99:7d:18:db:d0:4d:0c:79:44:cb:64:f1:96:f0:a3:f2:bf:c4:5c:4e],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-09-30 06:36:48.410  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-09-30 06:36:48.413 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-09-30 06:36:48.418 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-09-30 06:36:48.419 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-09-30 06:36:48.420  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-09-30 06:36:48.421  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-09-30 06:36:48.422  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-09-30 06:36:48.423 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-09-30 06:36:48.423 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-09-30 06:36:48.425 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-09-30 06:36:48.434 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-09-30 06:36:48.435 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-09-30 06:36:48.435 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-09-30 06:36:48.436 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-09-30 06:36:48.607  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-09-30 06:36:48.608  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-09-30 06:36:48.608 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-09-30 06:36:48.609 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-09-30 06:36:48.611  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-09-30 06:36:48.612  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-09-30 06:36:48.612 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-09-30 06:36:48.613 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-09-30 06:36:48.613 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-09-30 06:36:48.614 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-09-30 06:36:48.615 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-09-30 06:36:48.615 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-09-30 06:36:48.617 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-09-30 06:36:48.617 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-09-30 06:36:48.617 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-09-30 06:36:48.619 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-09-30 06:36:48.623 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 3430300525379874437536642235544789226140538504
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Sep 30 05:14:55 UTC 2022
           Final Date: Wed Sep 29 05:14:54 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f0:e2:76:2a:fc:71:da:ed:23:b6:24:4a:0a:0c:1b:59:35:c0:50:a6],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: b149df8e369adb090a0e83c63bf864b754d9eb5f
                       9c8edb414ceb36d485af81472393068c1fdd4bac
                       d778b4ffc74d927320fa10196fb5644f3b2a12a8
                       b2673c2bf74ed4dd6383c46947204490872f36ad
                       f381b02d245853d5e8c0e05c3ce57f0fc4764d5a
                       c2becfaccea808143ed80b48915a54a239551b75
                       e06f8c75d2232495e0cbfeed37927f48418411f6
                       3c3a2a5ff7ea519e4146c3b4a2f536d3dff9f4e7
                       2f3df346c4d4e56b4842f3f31f192f9b1cf35fd8
                       99fe890c7b4af71992f0fc5d747725e79b122969
                       c87df7951820b7114c814ba6542f601b7da814f8
                       286eaf300d3e130ebba65e4880d9b0498c26efd4
                       34f12398b2b6303affbc2e45661bc24643443031
                       c7a8ecf7cfdce0810ceff2acd9328750a841d01a
                       92df73f9e0ff75448a54d6583d103759ef6b12bd
                       6e4c356bfb6c88d3e3bd6946ce0b0a4a25ab935f
                       bb9cb5d858930cc227c0e5d6f2560040886bde5d
                       ccfccb17f6bd5091243b31a6ce1b09bc0f162bf0
                       b875fc779dacf5b76b36b3bec852e648d762f116
                       1bfc9eaa
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [42:74:fe:b7:30:40:aa:58:54:33:f7:1e:28:9a:20:65:82:cc:4d:38],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-09-30 06:37:54.525  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-09-30 06:37:54.526 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-09-30 06:37:54.528 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-09-30 06:37:54.528 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-09-30 06:37:54.529  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-09-30 06:37:54.530  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-09-30 06:37:54.530  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-09-30 06:37:54.531 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-09-30 06:37:54.531 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-09-30 06:37:54.532 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-09-30 06:37:54.535 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-09-30 06:37:54.536 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-09-30 06:37:54.536 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-09-30 06:37:54.537 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-09-30 06:37:54.687  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-09-30 06:37:54.688  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-09-30 06:37:54.689 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-09-30 06:37:54.689 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-09-30 06:37:54.691  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-09-30 06:37:54.692  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-09-30 06:37:54.693 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-09-30 06:37:54.693 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-09-30 06:37:54.694 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-09-30 06:37:54.695 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-09-30 06:37:54.695 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-09-30 06:37:54.696 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-09-30 06:37:54.696 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-09-30 06:37:54.697 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-09-30 06:37:54.698 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-09-30 06:37:54.699 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-09-30 06:37:54.706 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 3430300525379874437536642235544789226140538504
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Sep 30 05:14:55 UTC 2022
           Final Date: Wed Sep 29 05:14:54 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f0:e2:76:2a:fc:71:da:ed:23:b6:24:4a:0a:0c:1b:59:35:c0:50:a6],[56:66:d1:a4]
        modulus: cbec9cf6e998c7d61d6c1f3a9f411e5859f86d39a70766f3fd668d1d33658fd9583f4fc6be33fa0ead1c292e8e71b349223e8024bfd4e91c2965229776b087153052e22839524f8d5af7407946bfaafc928d80ade761961a0bd0913d8cc8368335c11459c7505e4280807033441814f4157f6acedd770020a27b63b6558d56241cfe76dc99f72eb56110349033997f182f25efe4ce1ebc9396adc7325b2c2d1b38c9ad5efd87fcdad158850a4fb8940612b45f76ba12ff32bd3fb9011f86a133a48098f8ec191b2b584490070e3afd7b6e82f49e2ae9ad3c0c418dd306a0ba784f9875c87ac56612f53ce8b9db9630d4889842c75d04da2066337715e998c49185f90feed124bf983954328f3f0a0019bf5fa5f1e73711711b1213b536599d213b21e7796fb6233353201237b0b2c1254c3f8fc28308bfa65c498fddb84e1b9925ab6e025ce567a9b383ebd0dd8a4724fa32133bc1e5b1095a1958ca9656fc688b2dfe969cd38dfb2c35af5a26b597dafffac49993f017b75fe31d83d1c2ff15
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: b149df8e369adb090a0e83c63bf864b754d9eb5f
                       9c8edb414ceb36d485af81472393068c1fdd4bac
                       d778b4ffc74d927320fa10196fb5644f3b2a12a8
                       b2673c2bf74ed4dd6383c46947204490872f36ad
                       f381b02d245853d5e8c0e05c3ce57f0fc4764d5a
                       c2becfaccea808143ed80b48915a54a239551b75
                       e06f8c75d2232495e0cbfeed37927f48418411f6
                       3c3a2a5ff7ea519e4146c3b4a2f536d3dff9f4e7
                       2f3df346c4d4e56b4842f3f31f192f9b1cf35fd8
                       99fe890c7b4af71992f0fc5d747725e79b122969
                       c87df7951820b7114c814ba6542f601b7da814f8
                       286eaf300d3e130ebba65e4880d9b0498c26efd4
                       34f12398b2b6303affbc2e45661bc24643443031
                       c7a8ecf7cfdce0810ceff2acd9328750a841d01a
                       92df73f9e0ff75448a54d6583d103759ef6b12bd
                       6e4c356bfb6c88d3e3bd6946ce0b0a4a25ab935f
                       bb9cb5d858930cc227c0e5d6f2560040886bde5d
                       ccfccb17f6bd5091243b31a6ce1b09bc0f162bf0
                       b875fc779dacf5b76b36b3bec852e648d762f116
                       1bfc9eaa
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [93:0c:9e:d2:bb:e2:d6:0a:12:be:bf:4d:b1:66:05:a3:bf:ab:a7:c1],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-09-30 06:40:02.572  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-09-30 06:40:02.573 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-09-30 06:40:02.574 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-09-30 06:40:02.575 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-09-30 06:40:02.575  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-09-30 06:40:02.576  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-09-30 06:40:02.576  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-09-30 06:40:02.577 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-09-30 06:40:02.577 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-09-30 06:40:02.577 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-09-30 06:40:02.581 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-09-30 06:40:02.582 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-09-30 06:40:02.583 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-09-30 06:40:02.584 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-09-30 06:40:02.871  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-09-30 06:40:02.872  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-09-30 06:40:02.872 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-09-30 06:40:02.872 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-09-30 06:40:02.873  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-09-30 06:40:02.874  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-09-30 06:40:02.874 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-09-30 06:40:02.874 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-09-30 06:40:02.875 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-09-30 06:40:02.875 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-09-30 06:40:02.876 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-09-30 06:40:02.876 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-09-30 06:40:02.877 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-09-30 06:40:02.877 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-09-30 06:40:02.877 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-09-30 06:40:02.878 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-09-30 06:40:02.881 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 3430300525379874437536642235544789226140538504
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Sep 30 05:14:55 UTC 2022
           Final Date: Wed Sep 29 05:14:54 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f0:e2:76:2a:fc:71:da:ed:23:b6:24:4a:0a:0c:1b:59:35:c0:50:a6],[56:66:d1:a4]
        modulus: cbec9cf6e998c7d61d6c1f3a9f411e5859f86d39a70766f3fd668d1d33658fd9583f4fc6be33fa0ead1c292e8e71b349223e8024bfd4e91c2965229776b087153052e22839524f8d5af7407946bfaafc928d80ade761961a0bd0913d8cc8368335c11459c7505e4280807033441814f4157f6acedd770020a27b63b6558d56241cfe76dc99f72eb56110349033997f182f25efe4ce1ebc9396adc7325b2c2d1b38c9ad5efd87fcdad158850a4fb8940612b45f76ba12ff32bd3fb9011f86a133a48098f8ec191b2b584490070e3afd7b6e82f49e2ae9ad3c0c418dd306a0ba784f9875c87ac56612f53ce8b9db9630d4889842c75d04da2066337715e998c49185f90feed124bf983954328f3f0a0019bf5fa5f1e73711711b1213b536599d213b21e7796fb6233353201237b0b2c1254c3f8fc28308bfa65c498fddb84e1b9925ab6e025ce567a9b383ebd0dd8a4724fa32133bc1e5b1095a1958ca9656fc688b2dfe969cd38dfb2c35af5a26b597dafffac49993f017b75fe31d83d1c2ff15
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: b149df8e369adb090a0e83c63bf864b754d9eb5f
                       9c8edb414ceb36d485af81472393068c1fdd4bac
                       d778b4ffc74d927320fa10196fb5644f3b2a12a8
                       b2673c2bf74ed4dd6383c46947204490872f36ad
                       f381b02d245853d5e8c0e05c3ce57f0fc4764d5a
                       c2becfaccea808143ed80b48915a54a239551b75
                       e06f8c75d2232495e0cbfeed37927f48418411f6
                       3c3a2a5ff7ea519e4146c3b4a2f536d3dff9f4e7
                       2f3df346c4d4e56b4842f3f31f192f9b1cf35fd8
                       99fe890c7b4af71992f0fc5d747725e79b122969
                       c87df7951820b7114c814ba6542f601b7da814f8
                       286eaf300d3e130ebba65e4880d9b0498c26efd4
                       34f12398b2b6303affbc2e45661bc24643443031
                       c7a8ecf7cfdce0810ceff2acd9328750a841d01a
                       92df73f9e0ff75448a54d6583d103759ef6b12bd
                       6e4c356bfb6c88d3e3bd6946ce0b0a4a25ab935f
                       bb9cb5d858930cc227c0e5d6f2560040886bde5d
                       ccfccb17f6bd5091243b31a6ce1b09bc0f162bf0
                       b875fc779dacf5b76b36b3bec852e648d762f116
                       1bfc9eaa
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [96:8f:88:a3:e5:7d:9e:d1:44:70:6d:88:72:48:d3:04:8f:a2:86:a3],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-09-30 06:54:21.655  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-09-30 06:54:21.658 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-09-30 06:54:21.661 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-09-30 06:54:21.662 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-09-30 06:54:21.662  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-09-30 06:54:21.663  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-09-30 06:54:21.663  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-09-30 06:54:21.664 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-09-30 06:54:21.664 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-09-30 06:54:21.665 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-09-30 06:54:21.671 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-09-30 06:54:21.672 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-09-30 06:54:21.672 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-09-30 06:54:21.672 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-09-30 06:54:21.916  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-09-30 06:54:21.917  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-09-30 06:54:21.917 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-09-30 06:54:21.917 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-09-30 06:54:21.919  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-09-30 06:54:21.919  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-09-30 06:54:21.920 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-09-30 06:54:21.920 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-09-30 06:54:21.920 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-09-30 06:54:21.921 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-09-30 06:54:21.922 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-09-30 06:54:21.922 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-09-30 06:54:21.923 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-09-30 06:54:21.924 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-09-30 06:54:21.924 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-09-30 06:54:21.925 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-09-30 06:54:21.931 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 3430300525379874437536642235544789226140538504
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Sep 30 05:14:55 UTC 2022
           Final Date: Wed Sep 29 05:14:54 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f0:e2:76:2a:fc:71:da:ed:23:b6:24:4a:0a:0c:1b:59:35:c0:50:a6],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: b149df8e369adb090a0e83c63bf864b754d9eb5f
                       9c8edb414ceb36d485af81472393068c1fdd4bac
                       d778b4ffc74d927320fa10196fb5644f3b2a12a8
                       b2673c2bf74ed4dd6383c46947204490872f36ad
                       f381b02d245853d5e8c0e05c3ce57f0fc4764d5a
                       c2becfaccea808143ed80b48915a54a239551b75
                       e06f8c75d2232495e0cbfeed37927f48418411f6
                       3c3a2a5ff7ea519e4146c3b4a2f536d3dff9f4e7
                       2f3df346c4d4e56b4842f3f31f192f9b1cf35fd8
                       99fe890c7b4af71992f0fc5d747725e79b122969
                       c87df7951820b7114c814ba6542f601b7da814f8
                       286eaf300d3e130ebba65e4880d9b0498c26efd4
                       34f12398b2b6303affbc2e45661bc24643443031
                       c7a8ecf7cfdce0810ceff2acd9328750a841d01a
                       92df73f9e0ff75448a54d6583d103759ef6b12bd
                       6e4c356bfb6c88d3e3bd6946ce0b0a4a25ab935f
                       bb9cb5d858930cc227c0e5d6f2560040886bde5d
                       ccfccb17f6bd5091243b31a6ce1b09bc0f162bf0
                       b875fc779dacf5b76b36b3bec852e648d762f116
                       1bfc9eaa
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [88:64:cd:f8:a1:60:cf:1a:d6:0d:dd:de:81:41:83:2d:73:2d:6c:1a],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-09-30 06:59:36.604  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-09-30 06:59:36.612 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-09-30 06:59:36.619 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-09-30 06:59:36.620 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-09-30 06:59:36.620  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-09-30 06:59:36.629  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-09-30 06:59:36.630  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-09-30 06:59:36.630 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-09-30 06:59:36.631 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-09-30 06:59:36.631 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-09-30 06:59:36.639 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-09-30 06:59:36.640 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-09-30 06:59:36.649 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-09-30 06:59:36.649 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-09-30 06:59:36.794  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-09-30 06:59:36.795  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-09-30 06:59:36.795 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-09-30 06:59:36.796 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-09-30 06:59:36.797  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-09-30 06:59:36.798  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-09-30 06:59:36.798 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-09-30 06:59:36.799 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-09-30 06:59:36.799 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-09-30 06:59:36.800 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-09-30 06:59:36.800 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-09-30 06:59:36.801 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-09-30 06:59:36.802 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-09-30 06:59:36.802 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-09-30 06:59:36.802 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-09-30 06:59:36.803 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-09-30 06:59:36.807 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 3430300525379874437536642235544789226140538504
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Sep 30 05:14:55 UTC 2022
           Final Date: Wed Sep 29 05:14:54 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f0:e2:76:2a:fc:71:da:ed:23:b6:24:4a:0a:0c:1b:59:35:c0:50:a6],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: b149df8e369adb090a0e83c63bf864b754d9eb5f
                       9c8edb414ceb36d485af81472393068c1fdd4bac
                       d778b4ffc74d927320fa10196fb5644f3b2a12a8
                       b2673c2bf74ed4dd6383c46947204490872f36ad
                       f381b02d245853d5e8c0e05c3ce57f0fc4764d5a
                       c2becfaccea808143ed80b48915a54a239551b75
                       e06f8c75d2232495e0cbfeed37927f48418411f6
                       3c3a2a5ff7ea519e4146c3b4a2f536d3dff9f4e7
                       2f3df346c4d4e56b4842f3f31f192f9b1cf35fd8
                       99fe890c7b4af71992f0fc5d747725e79b122969
                       c87df7951820b7114c814ba6542f601b7da814f8
                       286eaf300d3e130ebba65e4880d9b0498c26efd4
                       34f12398b2b6303affbc2e45661bc24643443031
                       c7a8ecf7cfdce0810ceff2acd9328750a841d01a
                       92df73f9e0ff75448a54d6583d103759ef6b12bd
                       6e4c356bfb6c88d3e3bd6946ce0b0a4a25ab935f
                       bb9cb5d858930cc227c0e5d6f2560040886bde5d
                       ccfccb17f6bd5091243b31a6ce1b09bc0f162bf0
                       b875fc779dacf5b76b36b3bec852e648d762f116
                       1bfc9eaa
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [0f:41:1d:48:50:db:c2:e3:27:99:9c:43:79:a2:77:ea:23:d8:da:c1],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-09-30 06:59:53.597  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-09-30 06:59:53.598 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-09-30 06:59:53.599 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-09-30 06:59:53.600 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-09-30 06:59:53.600  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-09-30 06:59:53.601  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-09-30 06:59:53.601  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-09-30 06:59:53.602 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-09-30 06:59:53.602 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-09-30 06:59:53.603 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-09-30 06:59:53.606 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-09-30 06:59:53.607 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-09-30 06:59:53.607 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-09-30 06:59:53.608 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-09-30 06:59:53.771  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-09-30 06:59:53.772  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-09-30 06:59:53.772 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-09-30 06:59:53.772 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-09-30 06:59:53.773  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-09-30 06:59:53.774  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-09-30 06:59:53.774 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-09-30 06:59:53.775 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-09-30 06:59:53.775 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-09-30 06:59:53.776 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-09-30 06:59:53.776 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-09-30 06:59:53.777 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-09-30 06:59:53.777 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-09-30 06:59:53.778 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-09-30 06:59:53.778 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-09-30 06:59:53.780 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-09-30 06:59:53.783 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 3430300525379874437536642235544789226140538504
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Sep 30 05:14:55 UTC 2022
           Final Date: Wed Sep 29 05:14:54 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f0:e2:76:2a:fc:71:da:ed:23:b6:24:4a:0a:0c:1b:59:35:c0:50:a6],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: b149df8e369adb090a0e83c63bf864b754d9eb5f
                       9c8edb414ceb36d485af81472393068c1fdd4bac
                       d778b4ffc74d927320fa10196fb5644f3b2a12a8
                       b2673c2bf74ed4dd6383c46947204490872f36ad
                       f381b02d245853d5e8c0e05c3ce57f0fc4764d5a
                       c2becfaccea808143ed80b48915a54a239551b75
                       e06f8c75d2232495e0cbfeed37927f48418411f6
                       3c3a2a5ff7ea519e4146c3b4a2f536d3dff9f4e7
                       2f3df346c4d4e56b4842f3f31f192f9b1cf35fd8
                       99fe890c7b4af71992f0fc5d747725e79b122969
                       c87df7951820b7114c814ba6542f601b7da814f8
                       286eaf300d3e130ebba65e4880d9b0498c26efd4
                       34f12398b2b6303affbc2e45661bc24643443031
                       c7a8ecf7cfdce0810ceff2acd9328750a841d01a
                       92df73f9e0ff75448a54d6583d103759ef6b12bd
                       6e4c356bfb6c88d3e3bd6946ce0b0a4a25ab935f
                       bb9cb5d858930cc227c0e5d6f2560040886bde5d
                       ccfccb17f6bd5091243b31a6ce1b09bc0f162bf0
                       b875fc779dacf5b76b36b3bec852e648d762f116
                       1bfc9eaa
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [df:8d:e6:a4:9f:c9:de:69:5d:0f:d3:8c:a7:61:b3:d5:2e:b3:2c:8e],[56:66:d1:a4]
        modulus: ac3f2f785476fcd38fe456fb5ed12ef538b014c5e59f99536e2aa11d1ada73fb11a0914c5317285e33996f2045593f7d659db54f9ba5d4b486c56ac74b448aa18c9a1fd2e3a16dea719cb632a1af434fa0c5d2a13e808670c6c121a51d7a38379855b11fd763af1e86ccf543e1caf67dfae890b19b9da549d004e7803ff1804757ef4ab776167885f8ee845b2d3da0a1f0aaed6fbbf30b7a5c822950e0fd689de8184bb4a053bf0d42b9096e50159bdc863271c2066ea74b4fc14206bd81a6d310086368b1779521c3a951cc2d9abe6683fbd15213da12ba6640dd1593c0254cde453eaa5c6bb5078f984c8b0c4f3249f55d85eb4efdd5f7519d48fb7834381f
public exponent: 10001

] 
2022-09-30 07:19:36.819  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-09-30 07:19:36.822 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-09-30 07:19:36.825 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-09-30 07:19:36.826 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-09-30 07:19:36.826  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-09-30 07:19:36.827  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-09-30 07:19:36.828  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-09-30 07:19:36.828 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-09-30 07:19:36.829 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-09-30 07:19:36.829 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-09-30 07:19:36.834 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-09-30 07:19:36.835 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-09-30 07:19:36.835 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-09-30 07:19:36.836 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-09-30 07:19:36.986  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-09-30 07:19:36.987  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-09-30 07:19:36.988 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-09-30 07:19:36.988 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-09-30 07:19:36.990  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-09-30 07:19:36.990  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-09-30 07:19:36.991 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-09-30 07:19:36.991 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-09-30 07:19:36.991 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-09-30 07:19:36.992 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-09-30 07:19:36.993 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-09-30 07:19:36.993 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-09-30 07:19:36.994 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-09-30 07:19:36.994 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-09-30 07:19:36.995 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-09-30 07:19:36.996 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-09-30 07:19:36.999 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 3430300525379874437536642235544789226140538504
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Sep 30 05:14:55 UTC 2022
           Final Date: Wed Sep 29 05:14:54 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f0:e2:76:2a:fc:71:da:ed:23:b6:24:4a:0a:0c:1b:59:35:c0:50:a6],[56:66:d1:a4]
        modulus: cbec9cf6e998c7d61d6c1f3a9f411e5859f86d39a70766f3fd668d1d33658fd9583f4fc6be33fa0ead1c292e8e71b349223e8024bfd4e91c2965229776b087153052e22839524f8d5af7407946bfaafc928d80ade761961a0bd0913d8cc8368335c11459c7505e4280807033441814f4157f6acedd770020a27b63b6558d56241cfe76dc99f72eb56110349033997f182f25efe4ce1ebc9396adc7325b2c2d1b38c9ad5efd87fcdad158850a4fb8940612b45f76ba12ff32bd3fb9011f86a133a48098f8ec191b2b584490070e3afd7b6e82f49e2ae9ad3c0c418dd306a0ba784f9875c87ac56612f53ce8b9db9630d4889842c75d04da2066337715e998c49185f90feed124bf983954328f3f0a0019bf5fa5f1e73711711b1213b536599d213b21e7796fb6233353201237b0b2c1254c3f8fc28308bfa65c498fddb84e1b9925ab6e025ce567a9b383ebd0dd8a4724fa32133bc1e5b1095a1958ca9656fc688b2dfe969cd38dfb2c35af5a26b597dafffac49993f017b75fe31d83d1c2ff15
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: b149df8e369adb090a0e83c63bf864b754d9eb5f
                       9c8edb414ceb36d485af81472393068c1fdd4bac
                       d778b4ffc74d927320fa10196fb5644f3b2a12a8
                       b2673c2bf74ed4dd6383c46947204490872f36ad
                       f381b02d245853d5e8c0e05c3ce57f0fc4764d5a
                       c2becfaccea808143ed80b48915a54a239551b75
                       e06f8c75d2232495e0cbfeed37927f48418411f6
                       3c3a2a5ff7ea519e4146c3b4a2f536d3dff9f4e7
                       2f3df346c4d4e56b4842f3f31f192f9b1cf35fd8
                       99fe890c7b4af71992f0fc5d747725e79b122969
                       c87df7951820b7114c814ba6542f601b7da814f8
                       286eaf300d3e130ebba65e4880d9b0498c26efd4
                       34f12398b2b6303affbc2e45661bc24643443031
                       c7a8ecf7cfdce0810ceff2acd9328750a841d01a
                       92df73f9e0ff75448a54d6583d103759ef6b12bd
                       6e4c356bfb6c88d3e3bd6946ce0b0a4a25ab935f
                       bb9cb5d858930cc227c0e5d6f2560040886bde5d
                       ccfccb17f6bd5091243b31a6ce1b09bc0f162bf0
                       b875fc779dacf5b76b36b3bec852e648d762f116
                       1bfc9eaa
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [5c:11:dc:67:16:86:1a:e4:d8:6d:b8:51:9d:cf:51:f1:c0:3a:f8:f4],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-09-30 07:19:44.384  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-09-30 07:19:44.385 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-09-30 07:19:44.386 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-09-30 07:19:44.386 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-09-30 07:19:44.387  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-09-30 07:19:44.387  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-09-30 07:19:44.388  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-09-30 07:19:44.388 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-09-30 07:19:44.388 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-09-30 07:19:44.389 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-09-30 07:19:44.392 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-09-30 07:19:44.392 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-09-30 07:19:44.393 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-09-30 07:19:44.393 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-09-30 07:19:44.543  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-09-30 07:19:44.544  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-09-30 07:19:44.544 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-09-30 07:19:44.544 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-09-30 07:19:44.545  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-09-30 07:19:44.546  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-09-30 07:19:44.546 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-09-30 07:19:44.546 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-09-30 07:19:44.546 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-09-30 07:19:44.547 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-09-30 07:19:44.548 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-09-30 07:19:44.548 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-09-30 07:19:44.549 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-09-30 07:19:44.549 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-09-30 07:19:44.549 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-09-30 07:19:44.550 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-09-30 07:19:44.552 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 3430300525379874437536642235544789226140538504
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Sep 30 05:14:55 UTC 2022
           Final Date: Wed Sep 29 05:14:54 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f0:e2:76:2a:fc:71:da:ed:23:b6:24:4a:0a:0c:1b:59:35:c0:50:a6],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: b149df8e369adb090a0e83c63bf864b754d9eb5f
                       9c8edb414ceb36d485af81472393068c1fdd4bac
                       d778b4ffc74d927320fa10196fb5644f3b2a12a8
                       b2673c2bf74ed4dd6383c46947204490872f36ad
                       f381b02d245853d5e8c0e05c3ce57f0fc4764d5a
                       c2becfaccea808143ed80b48915a54a239551b75
                       e06f8c75d2232495e0cbfeed37927f48418411f6
                       3c3a2a5ff7ea519e4146c3b4a2f536d3dff9f4e7
                       2f3df346c4d4e56b4842f3f31f192f9b1cf35fd8
                       99fe890c7b4af71992f0fc5d747725e79b122969
                       c87df7951820b7114c814ba6542f601b7da814f8
                       286eaf300d3e130ebba65e4880d9b0498c26efd4
                       34f12398b2b6303affbc2e45661bc24643443031
                       c7a8ecf7cfdce0810ceff2acd9328750a841d01a
                       92df73f9e0ff75448a54d6583d103759ef6b12bd
                       6e4c356bfb6c88d3e3bd6946ce0b0a4a25ab935f
                       bb9cb5d858930cc227c0e5d6f2560040886bde5d
                       ccfccb17f6bd5091243b31a6ce1b09bc0f162bf0
                       b875fc779dacf5b76b36b3bec852e648d762f116
                       1bfc9eaa
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [eb:0f:b5:2a:f9:d9:da:0c:0e:0b:52:e6:0a:da:8d:4b:5b:17:50:da],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

]