Results

By type

          2022-10-10 04:52:07,060 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-10-10 04:52:07,786 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-10-10 04:52:08.341  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Oct 10, 2022 4:52:09 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Oct 10, 2022 4:52:09 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Oct 10, 2022 4:52:09 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Oct 10, 2022 4:52:09 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-10-10 04:52:10.206 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-10-10 04:52:10.378  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-10-10 04:52:10.486  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-10-10 04:52:11.005 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-10-10 04:52:11.007 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
2022-10-10 04:52:11.008 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-10-10 04:52:11.010 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-10-10 04:52:11.038 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2022-10-10 04:52:11.041 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
	{GET [/docs]}: redirectToUi(HttpServletRequest)
2022-10-10 04:52:11.119 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-10-10 04:52:11.667 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Oct 10, 2022 4:52:12 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-10-10 04:52:12.456  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 6.055 seconds (JVM running for 7.196)
Oct 10, 2022 4:52:39 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-10-10 04:52:52.637  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-10-10 04:52:52.643 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-10-10 04:52:52.668 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-10-10 04:52:52.670 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-10-10 04:52:52.682  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-10-10 04:52:52.684  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-10-10 04:52:52.685  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-10-10 04:52:52.686 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-10-10 04:52:52.686 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-10 04:52:52.688 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-10-10 04:52:52.694 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-10-10 04:52:52.697 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-10-10 04:52:52.730 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-10-10 04:52:52.735 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-10 04:52:52.736 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-10 04:52:52.738 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-10 04:52:53.130  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-10-10 04:52:53.132  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-10-10 04:52:53.132 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-10-10 04:52:53.133 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-10 04:52:53.139  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-10-10 04:52:53.140  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-10-10 04:52:53.140 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-10 04:52:53.141 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-10 04:52:53.141 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-10 04:52:53.152 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-10 04:52:53.152 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-10 04:52:53.152 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-10 04:52:53.157 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-10 04:52:53.158 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-10 04:52:53.158 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-10 04:52:53.159 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-10-10 04:52:53.182 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 87538962260789059915381252635488162605906999365
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Oct 10 04:50:04 UTC 2022
           Final Date: Sat Oct 09 04:50:03 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [7f:f2:c3:e8:4e:fd:5f:f1:b5:56:82:9e:cb:43:0d:bf:8a:88:84:1a],[56:66:d1:a4]
        modulus: c2d32742277cdc42e0602a1171ef568881fd43d95820642fd9e0e2157f742c54ad4a628192af2a24a096bfc7a4d0c9a1c251cefc03e9bdb2d87d514afe6d7e90e4a5a90d27575af159f8057f3781924ca3f17c51038e82f6e0f4783b33f5af055857db05e00d1cd8e3bd048998a05a234919403385e5f6ca1e64fdf448f8f2f3df1849fa5c56d1ad807e06d2be3d46e18f4cbb6378d81a75a4c7a1897648d792019bcbeac19896386d509a3472ab534dbfc16c328fdfeb92c0979f0fd9e6b21d9917bd6193ad2c9bfb228f77b087cd6b307fcb8851c1a65d6b0bcce2da06c179d2b5928f039a22daf4afbe3071a528673265086e8ce14005fa56e64aac3fa72bc524142ff6d0edd17f2aecfc08d51b955448e10a784993e3ee52501353d661c9808219e79b7a750beba8236bfe9b81065cf296ee88eed8775417e91b573fc84e599f8220501ce7b7c5641d1e6e836a9b9999b2de220c4b54396163717d9e6ffb22424f963efbbc073cbcd666e16188398dca04ca80cddc9446a8b69d3c4e183b
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 593c6b0933838eda45e7348fdd6fac5e4a02c6b4
                       02c93bdc016d6f3b9d4f3b4024df3928c5477581
                       a9c8a13e499d3e712f3cab52ccf2c2352545ac63
                       c2ba9573b9a545943d3175fb2583b94ed2d340af
                       6e2fa6563a51c4d7dc93ee7a0923e3734b374ee8
                       3a86358d23cb855761cc14a38838aa96995e7d9f
                       d49d007a34a1c77d241d02f5147fa3a8f352c029
                       73480159e918dd70470c9efeb915a6cd6d4f00cd
                       aef6ea8dd2574be2f2f2a7624b5e00c3917ce6cd
                       9417e1f7bfab3fe039a58b987846a6f528a5c7ce
                       33eeaa8ff48b357ab96ef62a08b9a7094460b0f6
                       b28665c8209f6bb606f62fa44548f4dd265bb7c4
                       18838c6d372f7c3756d0eb4f3f34ae47b766815b
                       0db275cb12646a97f3690105cb6d10db5302c099
                       8dd522f083773e2d1ceac2a2846018c2a655f804
                       fd8d97bce1ed852a5629b5b616d441ffa43c46a7
                       8a9f2a9c1cdf08a3871bf06c049dbf28476a128f
                       90a6cd044dcc8abb775c775339d93a281e582328
                       2a11a373e49cd8fbaf4c285a6772a2a9d026538d
                       77ab33c1
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [6f:14:12:a0:33:0f:ae:da:b4:b1:f5:e7:5c:d2:31:48:da:ba:9c:00],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-10-10 06:04:30.424  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-10-10 06:04:30.427 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-10-10 06:04:30.430 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-10-10 06:04:30.432 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-10-10 06:04:30.432  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-10-10 06:04:30.433  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-10-10 06:04:30.433  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-10-10 06:04:30.433 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-10-10 06:04:30.434 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-10-10 06:04:30.434 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-10-10 06:04:30.438 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-10-10 06:04:30.438 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-10 06:04:30.439 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-10 06:04:30.439 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-10 06:04:30.629  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-10-10 06:04:30.631  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-10-10 06:04:30.631 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-10-10 06:04:30.631 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-10 06:04:30.633  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-10-10 06:04:30.633  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-10-10 06:04:30.634 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-10 06:04:30.634 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-10 06:04:30.634 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-10 06:04:30.635 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-10 06:04:30.635 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-10 06:04:30.635 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-10 06:04:30.636 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-10 06:04:30.636 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-10 06:04:30.636 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-10 06:04:30.637 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-10-10 06:04:30.641 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 87538962260789059915381252635488162605906999365
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Oct 10 04:50:04 UTC 2022
           Final Date: Sat Oct 09 04:50:03 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [7f:f2:c3:e8:4e:fd:5f:f1:b5:56:82:9e:cb:43:0d:bf:8a:88:84:1a],[56:66:d1:a4]
        modulus: c2d32742277cdc42e0602a1171ef568881fd43d95820642fd9e0e2157f742c54ad4a628192af2a24a096bfc7a4d0c9a1c251cefc03e9bdb2d87d514afe6d7e90e4a5a90d27575af159f8057f3781924ca3f17c51038e82f6e0f4783b33f5af055857db05e00d1cd8e3bd048998a05a234919403385e5f6ca1e64fdf448f8f2f3df1849fa5c56d1ad807e06d2be3d46e18f4cbb6378d81a75a4c7a1897648d792019bcbeac19896386d509a3472ab534dbfc16c328fdfeb92c0979f0fd9e6b21d9917bd6193ad2c9bfb228f77b087cd6b307fcb8851c1a65d6b0bcce2da06c179d2b5928f039a22daf4afbe3071a528673265086e8ce14005fa56e64aac3fa72bc524142ff6d0edd17f2aecfc08d51b955448e10a784993e3ee52501353d661c9808219e79b7a750beba8236bfe9b81065cf296ee88eed8775417e91b573fc84e599f8220501ce7b7c5641d1e6e836a9b9999b2de220c4b54396163717d9e6ffb22424f963efbbc073cbcd666e16188398dca04ca80cddc9446a8b69d3c4e183b
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 593c6b0933838eda45e7348fdd6fac5e4a02c6b4
                       02c93bdc016d6f3b9d4f3b4024df3928c5477581
                       a9c8a13e499d3e712f3cab52ccf2c2352545ac63
                       c2ba9573b9a545943d3175fb2583b94ed2d340af
                       6e2fa6563a51c4d7dc93ee7a0923e3734b374ee8
                       3a86358d23cb855761cc14a38838aa96995e7d9f
                       d49d007a34a1c77d241d02f5147fa3a8f352c029
                       73480159e918dd70470c9efeb915a6cd6d4f00cd
                       aef6ea8dd2574be2f2f2a7624b5e00c3917ce6cd
                       9417e1f7bfab3fe039a58b987846a6f528a5c7ce
                       33eeaa8ff48b357ab96ef62a08b9a7094460b0f6
                       b28665c8209f6bb606f62fa44548f4dd265bb7c4
                       18838c6d372f7c3756d0eb4f3f34ae47b766815b
                       0db275cb12646a97f3690105cb6d10db5302c099
                       8dd522f083773e2d1ceac2a2846018c2a655f804
                       fd8d97bce1ed852a5629b5b616d441ffa43c46a7
                       8a9f2a9c1cdf08a3871bf06c049dbf28476a128f
                       90a6cd044dcc8abb775c775339d93a281e582328
                       2a11a373e49cd8fbaf4c285a6772a2a9d026538d
                       77ab33c1
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [f4:69:ae:d7:a6:31:ef:7c:53:3f:31:3b:77:ad:57:fc:b8:34:a4:f1],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-10-10 06:06:02.106  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-10-10 06:06:02.108 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-10-10 06:06:02.111 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-10-10 06:06:02.112 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-10-10 06:06:02.113  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-10-10 06:06:02.115  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-10-10 06:06:02.115  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-10-10 06:06:02.116 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-10-10 06:06:02.117 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-10-10 06:06:02.117 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-10-10 06:06:02.123 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-10-10 06:06:02.124 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-10 06:06:02.125 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-10 06:06:02.125 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-10 06:06:02.317  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-10-10 06:06:02.318  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-10-10 06:06:02.318 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-10-10 06:06:02.318 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-10 06:06:02.321  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-10-10 06:06:02.321  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-10-10 06:06:02.322 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-10 06:06:02.322 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-10 06:06:02.322 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-10 06:06:02.323 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-10 06:06:02.323 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-10 06:06:02.323 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-10 06:06:02.324 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-10 06:06:02.324 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-10 06:06:02.325 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-10 06:06:02.326 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-10-10 06:06:02.331 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 87538962260789059915381252635488162605906999365
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Oct 10 04:50:04 UTC 2022
           Final Date: Sat Oct 09 04:50:03 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [7f:f2:c3:e8:4e:fd:5f:f1:b5:56:82:9e:cb:43:0d:bf:8a:88:84:1a],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 593c6b0933838eda45e7348fdd6fac5e4a02c6b4
                       02c93bdc016d6f3b9d4f3b4024df3928c5477581
                       a9c8a13e499d3e712f3cab52ccf2c2352545ac63
                       c2ba9573b9a545943d3175fb2583b94ed2d340af
                       6e2fa6563a51c4d7dc93ee7a0923e3734b374ee8
                       3a86358d23cb855761cc14a38838aa96995e7d9f
                       d49d007a34a1c77d241d02f5147fa3a8f352c029
                       73480159e918dd70470c9efeb915a6cd6d4f00cd
                       aef6ea8dd2574be2f2f2a7624b5e00c3917ce6cd
                       9417e1f7bfab3fe039a58b987846a6f528a5c7ce
                       33eeaa8ff48b357ab96ef62a08b9a7094460b0f6
                       b28665c8209f6bb606f62fa44548f4dd265bb7c4
                       18838c6d372f7c3756d0eb4f3f34ae47b766815b
                       0db275cb12646a97f3690105cb6d10db5302c099
                       8dd522f083773e2d1ceac2a2846018c2a655f804
                       fd8d97bce1ed852a5629b5b616d441ffa43c46a7
                       8a9f2a9c1cdf08a3871bf06c049dbf28476a128f
                       90a6cd044dcc8abb775c775339d93a281e582328
                       2a11a373e49cd8fbaf4c285a6772a2a9d026538d
                       77ab33c1
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [03:8b:95:8e:40:3a:e0:45:8e:b6:c4:aa:72:37:af:cb:db:11:fa:7c],[56:66:d1:a4]
        modulus: e513abdb32f470246932ad5a8b4ca6c19f64e8acaf2fe512efa0a01ff0835e42adc770ff2d655159986ce87b46ee8c27559de3e7faff9e7a7a4327a377780db8aa5bc34bff5605bc74fe4ec9ba2f0b4181173cb1ef09a4c56e9d53138f48ee6a4bd4ae8eeba983dfc5a61f2fa1f38f6c7e3e293eda869acab9f62c822778092d6cc57abb9abfe32ccd56193f53fe57feca908c09f7b0e30650cfb83df8b3d6eeec099ae954e2ad7152711c40a76a130eced70dc71e80379810e91bd5d657706aec74357f0448dd0b00a0ca1867ed6241bb2ea29c0cda825f82ecab05f05f61c85928a46da008f4d79d28f5347dc4ff6c519125a8d33fdb74969575bfb875fedf
public exponent: 10001

] 
2022-10-10 06:07:02.134  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-10-10 06:07:02.135 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-10-10 06:07:02.136 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-10-10 06:07:02.136 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-10-10 06:07:02.137  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-10-10 06:07:02.137  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-10-10 06:07:02.137  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-10-10 06:07:02.137 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-10-10 06:07:02.137 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-10-10 06:07:02.138 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-10-10 06:07:02.140 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-10-10 06:07:02.140 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-10 06:07:02.141 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-10 06:07:02.141 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-10 06:07:02.255  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-10-10 06:07:02.256  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-10-10 06:07:02.256 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-10-10 06:07:02.257 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-10 06:07:02.258  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-10-10 06:07:02.258  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-10-10 06:07:02.258 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-10 06:07:02.259 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-10 06:07:02.259 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-10 06:07:02.259 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-10 06:07:02.260 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-10 06:07:02.260 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-10 06:07:02.260 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-10 06:07:02.260 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-10 06:07:02.261 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-10 06:07:02.261 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-10-10 06:07:02.264 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 87538962260789059915381252635488162605906999365
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Oct 10 04:50:04 UTC 2022
           Final Date: Sat Oct 09 04:50:03 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [7f:f2:c3:e8:4e:fd:5f:f1:b5:56:82:9e:cb:43:0d:bf:8a:88:84:1a],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 593c6b0933838eda45e7348fdd6fac5e4a02c6b4
                       02c93bdc016d6f3b9d4f3b4024df3928c5477581
                       a9c8a13e499d3e712f3cab52ccf2c2352545ac63
                       c2ba9573b9a545943d3175fb2583b94ed2d340af
                       6e2fa6563a51c4d7dc93ee7a0923e3734b374ee8
                       3a86358d23cb855761cc14a38838aa96995e7d9f
                       d49d007a34a1c77d241d02f5147fa3a8f352c029
                       73480159e918dd70470c9efeb915a6cd6d4f00cd
                       aef6ea8dd2574be2f2f2a7624b5e00c3917ce6cd
                       9417e1f7bfab3fe039a58b987846a6f528a5c7ce
                       33eeaa8ff48b357ab96ef62a08b9a7094460b0f6
                       b28665c8209f6bb606f62fa44548f4dd265bb7c4
                       18838c6d372f7c3756d0eb4f3f34ae47b766815b
                       0db275cb12646a97f3690105cb6d10db5302c099
                       8dd522f083773e2d1ceac2a2846018c2a655f804
                       fd8d97bce1ed852a5629b5b616d441ffa43c46a7
                       8a9f2a9c1cdf08a3871bf06c049dbf28476a128f
                       90a6cd044dcc8abb775c775339d93a281e582328
                       2a11a373e49cd8fbaf4c285a6772a2a9d026538d
                       77ab33c1
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [7b:d1:c9:49:bf:d9:22:66:f9:87:01:7b:3d:33:f6:c2:fa:57:66:5f],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-10-10 06:09:07.703  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-10-10 06:09:07.704 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-10-10 06:09:07.705 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-10-10 06:09:07.706 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-10-10 06:09:07.706  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-10-10 06:09:07.706  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-10-10 06:09:07.706  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-10-10 06:09:07.707 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-10-10 06:09:07.707 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-10-10 06:09:07.707 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-10-10 06:09:07.709 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-10-10 06:09:07.710 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-10 06:09:07.710 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-10 06:09:07.711 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-10 06:09:07.833  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-10-10 06:09:07.833  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-10-10 06:09:07.834 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-10-10 06:09:07.834 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-10 06:09:07.834  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-10-10 06:09:07.835  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-10-10 06:09:07.835 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-10 06:09:07.835 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-10 06:09:07.835 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-10 06:09:07.836 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-10 06:09:07.836 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-10 06:09:07.836 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-10 06:09:07.836 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-10 06:09:07.836 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-10 06:09:07.837 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-10 06:09:07.837 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-10-10 06:09:07.839 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 87538962260789059915381252635488162605906999365
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Oct 10 04:50:04 UTC 2022
           Final Date: Sat Oct 09 04:50:03 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [7f:f2:c3:e8:4e:fd:5f:f1:b5:56:82:9e:cb:43:0d:bf:8a:88:84:1a],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 593c6b0933838eda45e7348fdd6fac5e4a02c6b4
                       02c93bdc016d6f3b9d4f3b4024df3928c5477581
                       a9c8a13e499d3e712f3cab52ccf2c2352545ac63
                       c2ba9573b9a545943d3175fb2583b94ed2d340af
                       6e2fa6563a51c4d7dc93ee7a0923e3734b374ee8
                       3a86358d23cb855761cc14a38838aa96995e7d9f
                       d49d007a34a1c77d241d02f5147fa3a8f352c029
                       73480159e918dd70470c9efeb915a6cd6d4f00cd
                       aef6ea8dd2574be2f2f2a7624b5e00c3917ce6cd
                       9417e1f7bfab3fe039a58b987846a6f528a5c7ce
                       33eeaa8ff48b357ab96ef62a08b9a7094460b0f6
                       b28665c8209f6bb606f62fa44548f4dd265bb7c4
                       18838c6d372f7c3756d0eb4f3f34ae47b766815b
                       0db275cb12646a97f3690105cb6d10db5302c099
                       8dd522f083773e2d1ceac2a2846018c2a655f804
                       fd8d97bce1ed852a5629b5b616d441ffa43c46a7
                       8a9f2a9c1cdf08a3871bf06c049dbf28476a128f
                       90a6cd044dcc8abb775c775339d93a281e582328
                       2a11a373e49cd8fbaf4c285a6772a2a9d026538d
                       77ab33c1
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [da:d4:f4:d7:0b:ea:dd:68:1c:0f:85:85:06:3d:e9:08:bf:ee:f4:cf],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-10-10 06:18:52.197  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-10-10 06:18:52.199 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-10-10 06:18:52.201 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-10-10 06:18:52.202 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-10-10 06:18:52.202  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-10-10 06:18:52.202  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-10-10 06:18:52.203  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-10-10 06:18:52.203 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-10-10 06:18:52.203 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-10-10 06:18:52.204 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-10-10 06:18:52.207 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-10-10 06:18:52.208 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-10 06:18:52.208 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-10 06:18:52.209 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-10 06:18:52.367  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-10-10 06:18:52.368  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-10-10 06:18:52.369 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-10-10 06:18:52.369 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-10 06:18:52.370  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-10-10 06:18:52.370  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-10-10 06:18:52.371 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-10 06:18:52.371 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-10 06:18:52.371 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-10 06:18:52.372 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-10 06:18:52.373 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-10 06:18:52.373 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-10 06:18:52.374 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-10 06:18:52.374 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-10 06:18:52.375 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-10 06:18:52.375 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-10-10 06:18:52.379 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 87538962260789059915381252635488162605906999365
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Oct 10 04:50:04 UTC 2022
           Final Date: Sat Oct 09 04:50:03 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [7f:f2:c3:e8:4e:fd:5f:f1:b5:56:82:9e:cb:43:0d:bf:8a:88:84:1a],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 593c6b0933838eda45e7348fdd6fac5e4a02c6b4
                       02c93bdc016d6f3b9d4f3b4024df3928c5477581
                       a9c8a13e499d3e712f3cab52ccf2c2352545ac63
                       c2ba9573b9a545943d3175fb2583b94ed2d340af
                       6e2fa6563a51c4d7dc93ee7a0923e3734b374ee8
                       3a86358d23cb855761cc14a38838aa96995e7d9f
                       d49d007a34a1c77d241d02f5147fa3a8f352c029
                       73480159e918dd70470c9efeb915a6cd6d4f00cd
                       aef6ea8dd2574be2f2f2a7624b5e00c3917ce6cd
                       9417e1f7bfab3fe039a58b987846a6f528a5c7ce
                       33eeaa8ff48b357ab96ef62a08b9a7094460b0f6
                       b28665c8209f6bb606f62fa44548f4dd265bb7c4
                       18838c6d372f7c3756d0eb4f3f34ae47b766815b
                       0db275cb12646a97f3690105cb6d10db5302c099
                       8dd522f083773e2d1ceac2a2846018c2a655f804
                       fd8d97bce1ed852a5629b5b616d441ffa43c46a7
                       8a9f2a9c1cdf08a3871bf06c049dbf28476a128f
                       90a6cd044dcc8abb775c775339d93a281e582328
                       2a11a373e49cd8fbaf4c285a6772a2a9d026538d
                       77ab33c1
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [13:00:0b:38:54:92:13:9e:55:e6:b4:5a:37:2d:c8:a2:bb:63:62:1c],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-10-10 06:23:19.953  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-10-10 06:23:19.955 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-10-10 06:23:19.957 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-10-10 06:23:19.958 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-10-10 06:23:19.958  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-10-10 06:23:19.958  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-10-10 06:23:19.959  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-10-10 06:23:19.959 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-10-10 06:23:19.959 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-10-10 06:23:19.959 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-10-10 06:23:19.962 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-10-10 06:23:19.963 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-10 06:23:19.963 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-10 06:23:19.964 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-10 06:23:20.075  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-10-10 06:23:20.076  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-10-10 06:23:20.077 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-10-10 06:23:20.077 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-10 06:23:20.078  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-10-10 06:23:20.078  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-10-10 06:23:20.079 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-10 06:23:20.079 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-10 06:23:20.079 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-10 06:23:20.079 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-10 06:23:20.080 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-10 06:23:20.080 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-10 06:23:20.081 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-10 06:23:20.081 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-10 06:23:20.081 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-10 06:23:20.081 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-10-10 06:23:20.084 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 87538962260789059915381252635488162605906999365
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Oct 10 04:50:04 UTC 2022
           Final Date: Sat Oct 09 04:50:03 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [7f:f2:c3:e8:4e:fd:5f:f1:b5:56:82:9e:cb:43:0d:bf:8a:88:84:1a],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 593c6b0933838eda45e7348fdd6fac5e4a02c6b4
                       02c93bdc016d6f3b9d4f3b4024df3928c5477581
                       a9c8a13e499d3e712f3cab52ccf2c2352545ac63
                       c2ba9573b9a545943d3175fb2583b94ed2d340af
                       6e2fa6563a51c4d7dc93ee7a0923e3734b374ee8
                       3a86358d23cb855761cc14a38838aa96995e7d9f
                       d49d007a34a1c77d241d02f5147fa3a8f352c029
                       73480159e918dd70470c9efeb915a6cd6d4f00cd
                       aef6ea8dd2574be2f2f2a7624b5e00c3917ce6cd
                       9417e1f7bfab3fe039a58b987846a6f528a5c7ce
                       33eeaa8ff48b357ab96ef62a08b9a7094460b0f6
                       b28665c8209f6bb606f62fa44548f4dd265bb7c4
                       18838c6d372f7c3756d0eb4f3f34ae47b766815b
                       0db275cb12646a97f3690105cb6d10db5302c099
                       8dd522f083773e2d1ceac2a2846018c2a655f804
                       fd8d97bce1ed852a5629b5b616d441ffa43c46a7
                       8a9f2a9c1cdf08a3871bf06c049dbf28476a128f
                       90a6cd044dcc8abb775c775339d93a281e582328
                       2a11a373e49cd8fbaf4c285a6772a2a9d026538d
                       77ab33c1
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [a2:0f:0a:84:b9:3b:d0:b0:00:19:20:4b:3d:db:02:91:9f:78:38:79],[56:66:d1:a4]
        modulus: d58bf69aeb62858933b6d8c8c0b70145d9903256badd6f72ae86f56a8a4632602e4edc7dad065b01e2f2b7dd1ccb0dc3ab1c172317edf34860e859f48cfad75fc4687f090501cd4893426b8868edcbfb306c216d679aafd9385f43ac0fd27670697f4dea990c1906d55b0d2e349ee25ffdcdc59eeb240af2c470f0eee6b86afc5341e9f34b81ed49c274b0b4e75900167dae4da3e02d6ae627e8ca594b426346393cc453f3419a47f631613d496814e12b0592e551983d1a29e5913a006eaf466e546df6ec2b48b788e9e25512aebfd5598370091331194fd88d1daa6d50bf8cc203e8a1396c90228357bcccfe3599ed796820aabc24a683dc5249723622c475
public exponent: 10001

] 
2022-10-10 06:23:38.666  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-10-10 06:23:38.667 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-10-10 06:23:38.668 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-10-10 06:23:38.669 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-10-10 06:23:38.669  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-10-10 06:23:38.669  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-10-10 06:23:38.670  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-10-10 06:23:38.670 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-10-10 06:23:38.670 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-10-10 06:23:38.670 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-10-10 06:23:38.674 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-10-10 06:23:38.674 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-10 06:23:38.675 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-10 06:23:38.675 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-10 06:23:38.785  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-10-10 06:23:38.786  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-10-10 06:23:38.786 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-10-10 06:23:38.786 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-10 06:23:38.787  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-10-10 06:23:38.788  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-10-10 06:23:38.788 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-10 06:23:38.788 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-10 06:23:38.789 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-10 06:23:38.789 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-10 06:23:38.790 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-10 06:23:38.790 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-10 06:23:38.791 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-10 06:23:38.791 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-10 06:23:38.791 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-10 06:23:38.792 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-10-10 06:23:38.794 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 87538962260789059915381252635488162605906999365
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Oct 10 04:50:04 UTC 2022
           Final Date: Sat Oct 09 04:50:03 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [7f:f2:c3:e8:4e:fd:5f:f1:b5:56:82:9e:cb:43:0d:bf:8a:88:84:1a],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 593c6b0933838eda45e7348fdd6fac5e4a02c6b4
                       02c93bdc016d6f3b9d4f3b4024df3928c5477581
                       a9c8a13e499d3e712f3cab52ccf2c2352545ac63
                       c2ba9573b9a545943d3175fb2583b94ed2d340af
                       6e2fa6563a51c4d7dc93ee7a0923e3734b374ee8
                       3a86358d23cb855761cc14a38838aa96995e7d9f
                       d49d007a34a1c77d241d02f5147fa3a8f352c029
                       73480159e918dd70470c9efeb915a6cd6d4f00cd
                       aef6ea8dd2574be2f2f2a7624b5e00c3917ce6cd
                       9417e1f7bfab3fe039a58b987846a6f528a5c7ce
                       33eeaa8ff48b357ab96ef62a08b9a7094460b0f6
                       b28665c8209f6bb606f62fa44548f4dd265bb7c4
                       18838c6d372f7c3756d0eb4f3f34ae47b766815b
                       0db275cb12646a97f3690105cb6d10db5302c099
                       8dd522f083773e2d1ceac2a2846018c2a655f804
                       fd8d97bce1ed852a5629b5b616d441ffa43c46a7
                       8a9f2a9c1cdf08a3871bf06c049dbf28476a128f
                       90a6cd044dcc8abb775c775339d93a281e582328
                       2a11a373e49cd8fbaf4c285a6772a2a9d026538d
                       77ab33c1
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [17:f9:ba:5b:cb:1a:63:7b:22:15:b6:39:36:2d:d7:16:54:f2:23:6e],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-10-10 06:39:48.427  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-10-10 06:39:48.430 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-10-10 06:39:48.433 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-10-10 06:39:48.434 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-10-10 06:39:48.434  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-10-10 06:39:48.435  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-10-10 06:39:48.435  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-10-10 06:39:48.436 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-10-10 06:39:48.436 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-10-10 06:39:48.436 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-10-10 06:39:48.439 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-10-10 06:39:48.440 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-10 06:39:48.441 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-10 06:39:48.441 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-10 06:39:48.566  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-10-10 06:39:48.566  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-10-10 06:39:48.567 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-10-10 06:39:48.567 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-10 06:39:48.568  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-10-10 06:39:48.568  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-10-10 06:39:48.569 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-10 06:39:48.569 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-10 06:39:48.569 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-10 06:39:48.570 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-10 06:39:48.570 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-10 06:39:48.570 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-10 06:39:48.570 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-10 06:39:48.571 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-10 06:39:48.571 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-10 06:39:48.571 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-10-10 06:39:48.574 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 87538962260789059915381252635488162605906999365
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Oct 10 04:50:04 UTC 2022
           Final Date: Sat Oct 09 04:50:03 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [7f:f2:c3:e8:4e:fd:5f:f1:b5:56:82:9e:cb:43:0d:bf:8a:88:84:1a],[56:66:d1:a4]
        modulus: c2d32742277cdc42e0602a1171ef568881fd43d95820642fd9e0e2157f742c54ad4a628192af2a24a096bfc7a4d0c9a1c251cefc03e9bdb2d87d514afe6d7e90e4a5a90d27575af159f8057f3781924ca3f17c51038e82f6e0f4783b33f5af055857db05e00d1cd8e3bd048998a05a234919403385e5f6ca1e64fdf448f8f2f3df1849fa5c56d1ad807e06d2be3d46e18f4cbb6378d81a75a4c7a1897648d792019bcbeac19896386d509a3472ab534dbfc16c328fdfeb92c0979f0fd9e6b21d9917bd6193ad2c9bfb228f77b087cd6b307fcb8851c1a65d6b0bcce2da06c179d2b5928f039a22daf4afbe3071a528673265086e8ce14005fa56e64aac3fa72bc524142ff6d0edd17f2aecfc08d51b955448e10a784993e3ee52501353d661c9808219e79b7a750beba8236bfe9b81065cf296ee88eed8775417e91b573fc84e599f8220501ce7b7c5641d1e6e836a9b9999b2de220c4b54396163717d9e6ffb22424f963efbbc073cbcd666e16188398dca04ca80cddc9446a8b69d3c4e183b
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 593c6b0933838eda45e7348fdd6fac5e4a02c6b4
                       02c93bdc016d6f3b9d4f3b4024df3928c5477581
                       a9c8a13e499d3e712f3cab52ccf2c2352545ac63
                       c2ba9573b9a545943d3175fb2583b94ed2d340af
                       6e2fa6563a51c4d7dc93ee7a0923e3734b374ee8
                       3a86358d23cb855761cc14a38838aa96995e7d9f
                       d49d007a34a1c77d241d02f5147fa3a8f352c029
                       73480159e918dd70470c9efeb915a6cd6d4f00cd
                       aef6ea8dd2574be2f2f2a7624b5e00c3917ce6cd
                       9417e1f7bfab3fe039a58b987846a6f528a5c7ce
                       33eeaa8ff48b357ab96ef62a08b9a7094460b0f6
                       b28665c8209f6bb606f62fa44548f4dd265bb7c4
                       18838c6d372f7c3756d0eb4f3f34ae47b766815b
                       0db275cb12646a97f3690105cb6d10db5302c099
                       8dd522f083773e2d1ceac2a2846018c2a655f804
                       fd8d97bce1ed852a5629b5b616d441ffa43c46a7
                       8a9f2a9c1cdf08a3871bf06c049dbf28476a128f
                       90a6cd044dcc8abb775c775339d93a281e582328
                       2a11a373e49cd8fbaf4c285a6772a2a9d026538d
                       77ab33c1
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [9d:5e:2f:1d:db:69:bc:98:05:9c:56:26:aa:c2:e1:91:7e:55:59:06],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-10-10 06:39:53.293  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-10-10 06:39:53.294 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-10-10 06:39:53.296 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-10-10 06:39:53.296 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-10-10 06:39:53.297  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-10-10 06:39:53.297  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-10-10 06:39:53.297  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-10-10 06:39:53.298 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-10-10 06:39:53.298 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-10-10 06:39:53.298 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-10-10 06:39:53.302 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-10-10 06:39:53.302 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-10 06:39:53.303 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-10 06:39:53.303 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-10 06:39:53.410  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-10-10 06:39:53.411  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-10-10 06:39:53.411 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-10-10 06:39:53.412 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-10 06:39:53.413  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-10-10 06:39:53.413  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-10-10 06:39:53.414 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-10 06:39:53.414 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-10 06:39:53.414 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-10 06:39:53.415 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-10 06:39:53.415 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-10 06:39:53.415 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-10 06:39:53.416 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-10 06:39:53.416 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-10 06:39:53.416 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-10 06:39:53.417 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-10-10 06:39:53.419 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 87538962260789059915381252635488162605906999365
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Oct 10 04:50:04 UTC 2022
           Final Date: Sat Oct 09 04:50:03 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [7f:f2:c3:e8:4e:fd:5f:f1:b5:56:82:9e:cb:43:0d:bf:8a:88:84:1a],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 593c6b0933838eda45e7348fdd6fac5e4a02c6b4
                       02c93bdc016d6f3b9d4f3b4024df3928c5477581
                       a9c8a13e499d3e712f3cab52ccf2c2352545ac63
                       c2ba9573b9a545943d3175fb2583b94ed2d340af
                       6e2fa6563a51c4d7dc93ee7a0923e3734b374ee8
                       3a86358d23cb855761cc14a38838aa96995e7d9f
                       d49d007a34a1c77d241d02f5147fa3a8f352c029
                       73480159e918dd70470c9efeb915a6cd6d4f00cd
                       aef6ea8dd2574be2f2f2a7624b5e00c3917ce6cd
                       9417e1f7bfab3fe039a58b987846a6f528a5c7ce
                       33eeaa8ff48b357ab96ef62a08b9a7094460b0f6
                       b28665c8209f6bb606f62fa44548f4dd265bb7c4
                       18838c6d372f7c3756d0eb4f3f34ae47b766815b
                       0db275cb12646a97f3690105cb6d10db5302c099
                       8dd522f083773e2d1ceac2a2846018c2a655f804
                       fd8d97bce1ed852a5629b5b616d441ffa43c46a7
                       8a9f2a9c1cdf08a3871bf06c049dbf28476a128f
                       90a6cd044dcc8abb775c775339d93a281e582328
                       2a11a373e49cd8fbaf4c285a6772a2a9d026538d
                       77ab33c1
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [61:9a:38:ee:15:04:fe:40:32:b9:78:ab:16:6d:e6:b2:75:1f:48:45],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

]