Results

By type

          2022-10-21 08:05:52,125 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-10-21 08:05:53,495 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-10-21 08:05:54.394  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Oct 21, 2022 8:05:56 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Oct 21, 2022 8:05:56 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Oct 21, 2022 8:05:56 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Oct 21, 2022 8:05:57 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-10-21 08:05:57.741 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-10-21 08:05:58.204  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-10-21 08:05:58.399  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-10-21 08:05:59.903 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-10-21 08:05:59.910 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
2022-10-21 08:05:59.914 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-10-21 08:05:59.960 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-10-21 08:06:00.013 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2022-10-21 08:06:00.017 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/docs]}: redirectToUi(HttpServletRequest)
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
2022-10-21 08:06:00.174 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-10-21 08:06:01.136 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Oct 21, 2022 8:06:02 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-10-21 08:06:02.456  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 11.376 seconds (JVM running for 13.814)
Oct 21, 2022 8:06:19 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-10-21 08:06:34.669  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-10-21 08:06:34.679 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-10-21 08:06:34.731 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-10-21 08:06:34.734 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-10-21 08:06:34.757  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-10-21 08:06:34.761  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-10-21 08:06:34.762  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-10-21 08:06:34.763 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-10-21 08:06:34.764 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-21 08:06:34.768 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-10-21 08:06:34.776 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-10-21 08:06:34.780 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-10-21 08:06:34.836 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-10-21 08:06:34.843 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-21 08:06:34.844 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-21 08:06:34.848 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-21 08:06:35.394  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-10-21 08:06:35.397  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-10-21 08:06:35.397 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-10-21 08:06:35.399 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-21 08:06:35.408  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-10-21 08:06:35.409  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-10-21 08:06:35.410 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-21 08:06:35.411 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-21 08:06:35.411 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-21 08:06:35.426 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-21 08:06:35.427 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-21 08:06:35.427 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-21 08:06:35.433 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-21 08:06:35.434 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-21 08:06:35.434 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-21 08:06:35.435 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-10-21 08:06:35.470 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 696443217748555416225095593515302713360034442723
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Oct 21 08:03:39 UTC 2022
           Final Date: Wed Oct 20 08:03:38 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [7a:3b:6f:c2:ff:79:fe:f5:38:6d:0e:33:18:0d:bb:c3:a7:6b:d4:0d],[56:66:d1:a4]
        modulus: b67a0fcfa0cc5d311dfebecf4745f0e1342fdfe780718ec11442bbbd0c698a7587956538edd15a43980fc83e1d4ff0a91ec4677b2bd72dbcaceb763054670caf44810c64c0580a627f5a49368087e9d0dc3d535a413d3c9d0d7a70de993a375360400cfffcb6a3acc184534cadf377bfb3172540a3d74e4dc3e268080c0b9516579471320dd004c2848b8d778c531bf845c5998a043736a20d12ad8dec3da733b80df06fb753ab0f007aca42d8458b75a71a40467f800aea7b5bf3a64ed6313088d90601166a0516e072ea3e9b4291e0fea2f6ef1dcc4d342c036f82b63fe13abb62a7fb3c0402b1440b8d1e3fe165389d8f4de00ca91756f3330c8555015421869658cf272e6cdee759eaba2d836dbdbe7e14de1bf441fbdfd7f6180e8344743d24fd4c038be2ce222ae9e122bf0d383e69e3f3baa0144b58b53f251a872b0d3d1e03fc3886d60c3fcf8a193f5a4ba8de05034856d95ced672db34572c6106a4cd85adb3f71e1e8f960c5e68c184873045c4f9f4f4b65c9b52dd17746cf095b
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 4a1c96037890c623cf6559983de47c929eb5f352
                       67e8eb49b2fb7d72032b9fb211afe836ceff4577
                       4152ddd3fbc2b2d0b16d35c7288f95e6fd2ecf33
                       f1a65b591bb0e8348ff4c2145423690611cfa243
                       cf9231f3ecaa59d8fecb47c4aa6f0104ad754b4c
                       0a5b4d97280407a9b979a643356cb1725551f4b1
                       966ae452c5713925f3c886df3a28d96501fabf7e
                       342da0f688dfd79f2388797f9a2ce31685fb0db2
                       8bf09adf0eeec0875ebe09f26cb696e24d4bbc87
                       20eae0b9f17e7ca76c0a157603dd601f31ad46a4
                       15f9cfa66faa2a499c617077d08705afa46d4c35
                       d03aca0ea3d08d6e6b1bafd61b17f4ab69423984
                       4d12b591974ab1ebc80b41ed910973696e89f59a
                       1eb351d1f71092d052c091decf944eb88e7ac520
                       6ebb0fe3eff89971099135a94d6148b3631f7e0a
                       9668feb52c32f00779ddb40658ef5a1a589d2267
                       76f724bb29cf4fe4453a13d88ef927bde8ddab43
                       07804e601ba34a24b9ac340e0a5384b8eae83e0d
                       4cf7889482aa9a0320352b9b0546e484eab2fdc5
                       0fd47ed4
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [f2:80:38:cb:42:5d:13:0e:e8:db:11:b2:8e:95:c5:7b:28:b2:77:7d],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-10-21 09:26:15.351  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-10-21 09:26:15.355 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-10-21 09:26:15.358 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-10-21 09:26:15.360 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-10-21 09:26:15.361  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-10-21 09:26:15.362  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-10-21 09:26:15.362  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-10-21 09:26:15.363 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-10-21 09:26:15.364 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-10-21 09:26:15.365 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-10-21 09:26:15.369 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-10-21 09:26:15.370 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-21 09:26:15.371 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-21 09:26:15.371 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-21 09:26:15.616  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-10-21 09:26:15.618  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-10-21 09:26:15.618 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-10-21 09:26:15.619 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-21 09:26:15.626  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-10-21 09:26:15.626  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-10-21 09:26:15.627 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-21 09:26:15.628 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-21 09:26:15.628 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-21 09:26:15.630 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-21 09:26:15.630 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-21 09:26:15.630 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-21 09:26:15.631 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-21 09:26:15.632 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-21 09:26:15.632 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-21 09:26:15.633 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-10-21 09:26:15.638 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 696443217748555416225095593515302713360034442723
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Oct 21 08:03:39 UTC 2022
           Final Date: Wed Oct 20 08:03:38 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [7a:3b:6f:c2:ff:79:fe:f5:38:6d:0e:33:18:0d:bb:c3:a7:6b:d4:0d],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 4a1c96037890c623cf6559983de47c929eb5f352
                       67e8eb49b2fb7d72032b9fb211afe836ceff4577
                       4152ddd3fbc2b2d0b16d35c7288f95e6fd2ecf33
                       f1a65b591bb0e8348ff4c2145423690611cfa243
                       cf9231f3ecaa59d8fecb47c4aa6f0104ad754b4c
                       0a5b4d97280407a9b979a643356cb1725551f4b1
                       966ae452c5713925f3c886df3a28d96501fabf7e
                       342da0f688dfd79f2388797f9a2ce31685fb0db2
                       8bf09adf0eeec0875ebe09f26cb696e24d4bbc87
                       20eae0b9f17e7ca76c0a157603dd601f31ad46a4
                       15f9cfa66faa2a499c617077d08705afa46d4c35
                       d03aca0ea3d08d6e6b1bafd61b17f4ab69423984
                       4d12b591974ab1ebc80b41ed910973696e89f59a
                       1eb351d1f71092d052c091decf944eb88e7ac520
                       6ebb0fe3eff89971099135a94d6148b3631f7e0a
                       9668feb52c32f00779ddb40658ef5a1a589d2267
                       76f724bb29cf4fe4453a13d88ef927bde8ddab43
                       07804e601ba34a24b9ac340e0a5384b8eae83e0d
                       4cf7889482aa9a0320352b9b0546e484eab2fdc5
                       0fd47ed4
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [f4:af:d4:c8:3f:87:0d:95:b6:ed:99:52:a4:31:6c:07:eb:c4:b3:a7],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-10-21 09:27:55.287  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-10-21 09:27:55.288 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-10-21 09:27:55.290 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-10-21 09:27:55.291 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-10-21 09:27:55.292  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-10-21 09:27:55.293  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-10-21 09:27:55.293  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-10-21 09:27:55.294 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-10-21 09:27:55.294 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-10-21 09:27:55.295 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-10-21 09:27:55.302 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-10-21 09:27:55.303 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-21 09:27:55.304 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-21 09:27:55.305 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-21 09:27:55.486  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-10-21 09:27:55.488  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-10-21 09:27:55.488 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-10-21 09:27:55.489 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-21 09:27:55.493  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-10-21 09:27:55.494  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-10-21 09:27:55.495 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-21 09:27:55.495 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-21 09:27:55.495 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-21 09:27:55.497 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-21 09:27:55.497 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-21 09:27:55.498 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-21 09:27:55.499 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-21 09:27:55.500 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-21 09:27:55.500 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-21 09:27:55.502 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-10-21 09:27:55.507 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 696443217748555416225095593515302713360034442723
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Oct 21 08:03:39 UTC 2022
           Final Date: Wed Oct 20 08:03:38 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [7a:3b:6f:c2:ff:79:fe:f5:38:6d:0e:33:18:0d:bb:c3:a7:6b:d4:0d],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 4a1c96037890c623cf6559983de47c929eb5f352
                       67e8eb49b2fb7d72032b9fb211afe836ceff4577
                       4152ddd3fbc2b2d0b16d35c7288f95e6fd2ecf33
                       f1a65b591bb0e8348ff4c2145423690611cfa243
                       cf9231f3ecaa59d8fecb47c4aa6f0104ad754b4c
                       0a5b4d97280407a9b979a643356cb1725551f4b1
                       966ae452c5713925f3c886df3a28d96501fabf7e
                       342da0f688dfd79f2388797f9a2ce31685fb0db2
                       8bf09adf0eeec0875ebe09f26cb696e24d4bbc87
                       20eae0b9f17e7ca76c0a157603dd601f31ad46a4
                       15f9cfa66faa2a499c617077d08705afa46d4c35
                       d03aca0ea3d08d6e6b1bafd61b17f4ab69423984
                       4d12b591974ab1ebc80b41ed910973696e89f59a
                       1eb351d1f71092d052c091decf944eb88e7ac520
                       6ebb0fe3eff89971099135a94d6148b3631f7e0a
                       9668feb52c32f00779ddb40658ef5a1a589d2267
                       76f724bb29cf4fe4453a13d88ef927bde8ddab43
                       07804e601ba34a24b9ac340e0a5384b8eae83e0d
                       4cf7889482aa9a0320352b9b0546e484eab2fdc5
                       0fd47ed4
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [e5:90:e3:53:12:95:60:b2:63:04:53:23:24:79:33:f3:e6:3d:1e:61],[56:66:d1:a4]
        modulus: c8ee38e3a343da737876d3faae52b4da9c0c3d88e473325887e3ebf7934ddfa20ab6aa916e18dcb9706e4e07b340696ca0ca416b0808d066ace780808d5f87c28ba6ef6e31ed1094b04e500cd833f218904f7dcd5872e2ce7132c2ed223be8da4c332a24dc5aff64d215e9c8b3415badc4dc8631adfd420f75e67aafb48b4dcba4144838e44ab01e57ff900e4d53e6df37e4c2cf5802fd2a03157c2f0e8147c883e350da18018b2e71ee4ddd98e354d7cbc541fe434440957fcb139a1af22f43f4653ff05102d0e2fd41a72989abbaf0a0c949ca2efab676c232a87326ccb12946580854913c4d967bbe4493942f4fd32df8df39d1909ce401d99d85291c55a9
public exponent: 10001

] 
2022-10-21 09:29:05.225  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-10-21 09:29:05.227 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-10-21 09:29:05.229 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-10-21 09:29:05.230 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-10-21 09:29:05.230  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-10-21 09:29:05.238  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-10-21 09:29:05.238  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-10-21 09:29:05.239 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-10-21 09:29:05.240 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-10-21 09:29:05.241 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-10-21 09:29:05.247 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-10-21 09:29:05.248 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-21 09:29:05.249 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-21 09:29:05.250 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-21 09:29:05.398  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-10-21 09:29:05.399  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-10-21 09:29:05.400 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-10-21 09:29:05.400 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-21 09:29:05.401  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-10-21 09:29:05.402  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-10-21 09:29:05.403 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-21 09:29:05.403 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-21 09:29:05.403 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-21 09:29:05.404 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-21 09:29:05.405 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-21 09:29:05.405 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-21 09:29:05.406 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-21 09:29:05.406 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-21 09:29:05.407 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-21 09:29:05.407 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-10-21 09:29:05.411 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 696443217748555416225095593515302713360034442723
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Oct 21 08:03:39 UTC 2022
           Final Date: Wed Oct 20 08:03:38 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [7a:3b:6f:c2:ff:79:fe:f5:38:6d:0e:33:18:0d:bb:c3:a7:6b:d4:0d],[56:66:d1:a4]
        modulus: b67a0fcfa0cc5d311dfebecf4745f0e1342fdfe780718ec11442bbbd0c698a7587956538edd15a43980fc83e1d4ff0a91ec4677b2bd72dbcaceb763054670caf44810c64c0580a627f5a49368087e9d0dc3d535a413d3c9d0d7a70de993a375360400cfffcb6a3acc184534cadf377bfb3172540a3d74e4dc3e268080c0b9516579471320dd004c2848b8d778c531bf845c5998a043736a20d12ad8dec3da733b80df06fb753ab0f007aca42d8458b75a71a40467f800aea7b5bf3a64ed6313088d90601166a0516e072ea3e9b4291e0fea2f6ef1dcc4d342c036f82b63fe13abb62a7fb3c0402b1440b8d1e3fe165389d8f4de00ca91756f3330c8555015421869658cf272e6cdee759eaba2d836dbdbe7e14de1bf441fbdfd7f6180e8344743d24fd4c038be2ce222ae9e122bf0d383e69e3f3baa0144b58b53f251a872b0d3d1e03fc3886d60c3fcf8a193f5a4ba8de05034856d95ced672db34572c6106a4cd85adb3f71e1e8f960c5e68c184873045c4f9f4f4b65c9b52dd17746cf095b
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 4a1c96037890c623cf6559983de47c929eb5f352
                       67e8eb49b2fb7d72032b9fb211afe836ceff4577
                       4152ddd3fbc2b2d0b16d35c7288f95e6fd2ecf33
                       f1a65b591bb0e8348ff4c2145423690611cfa243
                       cf9231f3ecaa59d8fecb47c4aa6f0104ad754b4c
                       0a5b4d97280407a9b979a643356cb1725551f4b1
                       966ae452c5713925f3c886df3a28d96501fabf7e
                       342da0f688dfd79f2388797f9a2ce31685fb0db2
                       8bf09adf0eeec0875ebe09f26cb696e24d4bbc87
                       20eae0b9f17e7ca76c0a157603dd601f31ad46a4
                       15f9cfa66faa2a499c617077d08705afa46d4c35
                       d03aca0ea3d08d6e6b1bafd61b17f4ab69423984
                       4d12b591974ab1ebc80b41ed910973696e89f59a
                       1eb351d1f71092d052c091decf944eb88e7ac520
                       6ebb0fe3eff89971099135a94d6148b3631f7e0a
                       9668feb52c32f00779ddb40658ef5a1a589d2267
                       76f724bb29cf4fe4453a13d88ef927bde8ddab43
                       07804e601ba34a24b9ac340e0a5384b8eae83e0d
                       4cf7889482aa9a0320352b9b0546e484eab2fdc5
                       0fd47ed4
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [14:25:ba:17:b9:50:10:7b:8c:69:ca:29:fc:41:a9:c4:74:f8:d9:dd],[56:66:d1:a4]
        modulus: ec5867d406344065dcbe6e7554531ab89931d7857eed104c055e04dd270ab39239f584345a188483e6eb1255836cac8b6237de0a062430d7bb7a244a2f0fa18f4e403385210b2531d4f0a436a707bda7e1cde77ec1d082cdd7d792ef6a1066ba3570c604aef382f7099f0818a49dcdb20790ea36dba3c7707662ee436d1c822c005c041287ba1719a9a86abe621c6dfb06782517b5ceee5859c73ed6842b440a6ce442b8f171ea9326288b6aeca29e2a30579ad3b293c21c2f6db2c68fbebfe46f9663224f15e395b263fd6638e158832e500a237fbca68ccc7b02776afbc568571211f2e48a22956a8889c1d1f7d402548ffb0ea75461b700041fec099343f1
public exponent: 10001

] 
2022-10-21 09:31:29.932  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-10-21 09:31:29.934 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-10-21 09:31:29.938 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-10-21 09:31:29.939 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-10-21 09:31:29.939  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-10-21 09:31:29.940  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-10-21 09:31:29.940  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-10-21 09:31:29.941 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-10-21 09:31:29.941 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-10-21 09:31:29.941 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-10-21 09:31:29.945 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-10-21 09:31:29.946 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-21 09:31:29.946 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-21 09:31:29.946 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-21 09:31:30.062  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-10-21 09:31:30.063  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-10-21 09:31:30.064 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-10-21 09:31:30.064 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-21 09:31:30.066  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-10-21 09:31:30.067  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-10-21 09:31:30.068 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-21 09:31:30.068 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-21 09:31:30.068 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-21 09:31:30.070 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-21 09:31:30.070 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-21 09:31:30.073 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-21 09:31:30.077 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-21 09:31:30.078 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-21 09:31:30.078 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-21 09:31:30.079 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-10-21 09:31:30.086 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 696443217748555416225095593515302713360034442723
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Oct 21 08:03:39 UTC 2022
           Final Date: Wed Oct 20 08:03:38 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [7a:3b:6f:c2:ff:79:fe:f5:38:6d:0e:33:18:0d:bb:c3:a7:6b:d4:0d],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 4a1c96037890c623cf6559983de47c929eb5f352
                       67e8eb49b2fb7d72032b9fb211afe836ceff4577
                       4152ddd3fbc2b2d0b16d35c7288f95e6fd2ecf33
                       f1a65b591bb0e8348ff4c2145423690611cfa243
                       cf9231f3ecaa59d8fecb47c4aa6f0104ad754b4c
                       0a5b4d97280407a9b979a643356cb1725551f4b1
                       966ae452c5713925f3c886df3a28d96501fabf7e
                       342da0f688dfd79f2388797f9a2ce31685fb0db2
                       8bf09adf0eeec0875ebe09f26cb696e24d4bbc87
                       20eae0b9f17e7ca76c0a157603dd601f31ad46a4
                       15f9cfa66faa2a499c617077d08705afa46d4c35
                       d03aca0ea3d08d6e6b1bafd61b17f4ab69423984
                       4d12b591974ab1ebc80b41ed910973696e89f59a
                       1eb351d1f71092d052c091decf944eb88e7ac520
                       6ebb0fe3eff89971099135a94d6148b3631f7e0a
                       9668feb52c32f00779ddb40658ef5a1a589d2267
                       76f724bb29cf4fe4453a13d88ef927bde8ddab43
                       07804e601ba34a24b9ac340e0a5384b8eae83e0d
                       4cf7889482aa9a0320352b9b0546e484eab2fdc5
                       0fd47ed4
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [f9:a9:46:61:dc:fb:d0:6f:eb:a0:3a:19:dc:f2:fa:24:17:f5:ee:ee],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-10-21 09:37:34.758  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-10-21 09:37:34.763 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-10-21 09:37:34.768 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-10-21 09:37:34.770 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-10-21 09:37:34.771  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-10-21 09:37:34.772  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-10-21 09:37:34.773  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-10-21 09:37:34.773 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-10-21 09:37:34.774 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-10-21 09:37:34.775 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-10-21 09:37:34.782 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-10-21 09:37:34.784 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-21 09:37:34.784 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-21 09:37:34.785 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-21 09:37:34.966  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-10-21 09:37:34.967  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-10-21 09:37:34.968 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-10-21 09:37:34.968 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-21 09:37:34.970  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-10-21 09:37:34.971  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-10-21 09:37:34.972 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-21 09:37:34.972 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-21 09:37:34.972 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-21 09:37:34.974 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-21 09:37:34.974 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-21 09:37:34.975 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-21 09:37:34.976 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-21 09:37:34.976 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-21 09:37:34.977 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-21 09:37:34.978 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-10-21 09:37:34.982 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 696443217748555416225095593515302713360034442723
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Oct 21 08:03:39 UTC 2022
           Final Date: Wed Oct 20 08:03:38 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [7a:3b:6f:c2:ff:79:fe:f5:38:6d:0e:33:18:0d:bb:c3:a7:6b:d4:0d],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 4a1c96037890c623cf6559983de47c929eb5f352
                       67e8eb49b2fb7d72032b9fb211afe836ceff4577
                       4152ddd3fbc2b2d0b16d35c7288f95e6fd2ecf33
                       f1a65b591bb0e8348ff4c2145423690611cfa243
                       cf9231f3ecaa59d8fecb47c4aa6f0104ad754b4c
                       0a5b4d97280407a9b979a643356cb1725551f4b1
                       966ae452c5713925f3c886df3a28d96501fabf7e
                       342da0f688dfd79f2388797f9a2ce31685fb0db2
                       8bf09adf0eeec0875ebe09f26cb696e24d4bbc87
                       20eae0b9f17e7ca76c0a157603dd601f31ad46a4
                       15f9cfa66faa2a499c617077d08705afa46d4c35
                       d03aca0ea3d08d6e6b1bafd61b17f4ab69423984
                       4d12b591974ab1ebc80b41ed910973696e89f59a
                       1eb351d1f71092d052c091decf944eb88e7ac520
                       6ebb0fe3eff89971099135a94d6148b3631f7e0a
                       9668feb52c32f00779ddb40658ef5a1a589d2267
                       76f724bb29cf4fe4453a13d88ef927bde8ddab43
                       07804e601ba34a24b9ac340e0a5384b8eae83e0d
                       4cf7889482aa9a0320352b9b0546e484eab2fdc5
                       0fd47ed4
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [d4:67:77:17:6e:91:1f:04:0c:53:eb:0f:da:3c:a5:26:ad:16:25:55],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-10-21 09:42:31.466  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-10-21 09:42:31.467 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-10-21 09:42:31.470 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-10-21 09:42:31.470 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-10-21 09:42:31.471  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-10-21 09:42:31.473  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-10-21 09:42:31.477  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-10-21 09:42:31.478 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-10-21 09:42:31.478 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-10-21 09:42:31.479 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-10-21 09:42:31.485 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-10-21 09:42:31.486 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-21 09:42:31.486 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-21 09:42:31.486 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-21 09:42:31.620  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-10-21 09:42:31.621  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-10-21 09:42:31.621 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-10-21 09:42:31.622 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-21 09:42:31.623  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-10-21 09:42:31.623  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-10-21 09:42:31.624 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-21 09:42:31.624 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-21 09:42:31.625 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-21 09:42:31.626 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-21 09:42:31.626 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-21 09:42:31.627 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-21 09:42:31.629 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-21 09:42:31.629 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-21 09:42:31.629 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-21 09:42:31.630 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-10-21 09:42:31.634 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 696443217748555416225095593515302713360034442723
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Oct 21 08:03:39 UTC 2022
           Final Date: Wed Oct 20 08:03:38 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [7a:3b:6f:c2:ff:79:fe:f5:38:6d:0e:33:18:0d:bb:c3:a7:6b:d4:0d],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 4a1c96037890c623cf6559983de47c929eb5f352
                       67e8eb49b2fb7d72032b9fb211afe836ceff4577
                       4152ddd3fbc2b2d0b16d35c7288f95e6fd2ecf33
                       f1a65b591bb0e8348ff4c2145423690611cfa243
                       cf9231f3ecaa59d8fecb47c4aa6f0104ad754b4c
                       0a5b4d97280407a9b979a643356cb1725551f4b1
                       966ae452c5713925f3c886df3a28d96501fabf7e
                       342da0f688dfd79f2388797f9a2ce31685fb0db2
                       8bf09adf0eeec0875ebe09f26cb696e24d4bbc87
                       20eae0b9f17e7ca76c0a157603dd601f31ad46a4
                       15f9cfa66faa2a499c617077d08705afa46d4c35
                       d03aca0ea3d08d6e6b1bafd61b17f4ab69423984
                       4d12b591974ab1ebc80b41ed910973696e89f59a
                       1eb351d1f71092d052c091decf944eb88e7ac520
                       6ebb0fe3eff89971099135a94d6148b3631f7e0a
                       9668feb52c32f00779ddb40658ef5a1a589d2267
                       76f724bb29cf4fe4453a13d88ef927bde8ddab43
                       07804e601ba34a24b9ac340e0a5384b8eae83e0d
                       4cf7889482aa9a0320352b9b0546e484eab2fdc5
                       0fd47ed4
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [1e:4d:52:39:3e:60:06:09:1f:34:50:e4:7f:34:22:af:b7:f6:94:23],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-10-21 09:55:21.851  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-10-21 09:55:21.855 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-10-21 09:55:21.859 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-10-21 09:55:21.860 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-10-21 09:55:21.861  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-10-21 09:55:21.861  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-10-21 09:55:21.862  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-10-21 09:55:21.862 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-10-21 09:55:21.863 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-10-21 09:55:21.864 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-10-21 09:55:21.868 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-10-21 09:55:21.869 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-21 09:55:21.869 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-21 09:55:21.869 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-21 09:55:22.032  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-10-21 09:55:22.033  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-10-21 09:55:22.033 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-10-21 09:55:22.033 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-21 09:55:22.035  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-10-21 09:55:22.035  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-10-21 09:55:22.036 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-21 09:55:22.036 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-21 09:55:22.036 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-21 09:55:22.038 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-21 09:55:22.038 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-21 09:55:22.039 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-21 09:55:22.039 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-21 09:55:22.039 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-21 09:55:22.040 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-21 09:55:22.041 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-10-21 09:55:22.045 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 696443217748555416225095593515302713360034442723
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Oct 21 08:03:39 UTC 2022
           Final Date: Wed Oct 20 08:03:38 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [7a:3b:6f:c2:ff:79:fe:f5:38:6d:0e:33:18:0d:bb:c3:a7:6b:d4:0d],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 4a1c96037890c623cf6559983de47c929eb5f352
                       67e8eb49b2fb7d72032b9fb211afe836ceff4577
                       4152ddd3fbc2b2d0b16d35c7288f95e6fd2ecf33
                       f1a65b591bb0e8348ff4c2145423690611cfa243
                       cf9231f3ecaa59d8fecb47c4aa6f0104ad754b4c
                       0a5b4d97280407a9b979a643356cb1725551f4b1
                       966ae452c5713925f3c886df3a28d96501fabf7e
                       342da0f688dfd79f2388797f9a2ce31685fb0db2
                       8bf09adf0eeec0875ebe09f26cb696e24d4bbc87
                       20eae0b9f17e7ca76c0a157603dd601f31ad46a4
                       15f9cfa66faa2a499c617077d08705afa46d4c35
                       d03aca0ea3d08d6e6b1bafd61b17f4ab69423984
                       4d12b591974ab1ebc80b41ed910973696e89f59a
                       1eb351d1f71092d052c091decf944eb88e7ac520
                       6ebb0fe3eff89971099135a94d6148b3631f7e0a
                       9668feb52c32f00779ddb40658ef5a1a589d2267
                       76f724bb29cf4fe4453a13d88ef927bde8ddab43
                       07804e601ba34a24b9ac340e0a5384b8eae83e0d
                       4cf7889482aa9a0320352b9b0546e484eab2fdc5
                       0fd47ed4
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [fc:c1:1f:82:eb:8c:06:fe:2d:bf:55:a9:3b:53:04:f8:78:c0:8e:ef],[56:66:d1:a4]
        modulus: bdc3194618b2fce9c6d7222bd9f329bac8eb9b18bc92e701cde875a7a897b071102c252281a3701315f2e7439da8e0029294650be8479569c48324ac0293bb22ce781b4f916350e376001d978b9f110fecd6046ed81f1b0bb159fc7549fc09c50a49e8d43640732280839a39a996d55ab9a3ab81ed72326116d229ff60cef19cb65b5872c68feb9d3dc3ac8d3efac61b9174c6e8e12911d46cd1c05b3480ae7036b4ed227915bc57bba0d839b04765168d29d6e5bcedefec8664000aa5750957f6fc090c89a34049ef4c3f855a63077c6b7edf55872239d1f280341ca030296c2cfa91cbf3e732e41e58727fc5847c538c2d4f8b18270bd3d0ee8f51fbb765ff
public exponent: 10001

] 
2022-10-21 10:00:06.544  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-10-21 10:00:06.545 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-10-21 10:00:06.546 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-10-21 10:00:06.547 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-10-21 10:00:06.547  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-10-21 10:00:06.548  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-10-21 10:00:06.548  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-10-21 10:00:06.548 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-10-21 10:00:06.549 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-10-21 10:00:06.549 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-10-21 10:00:06.552 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-10-21 10:00:06.553 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-21 10:00:06.553 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-21 10:00:06.553 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-21 10:00:06.713  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-10-21 10:00:06.714  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-10-21 10:00:06.714 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-10-21 10:00:06.714 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-21 10:00:06.716  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-10-21 10:00:06.716  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-10-21 10:00:06.716 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-21 10:00:06.717 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-21 10:00:06.717 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-21 10:00:06.718 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-21 10:00:06.718 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-21 10:00:06.718 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-21 10:00:06.719 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-21 10:00:06.719 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-21 10:00:06.719 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-21 10:00:06.720 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-10-21 10:00:06.723 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 696443217748555416225095593515302713360034442723
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Oct 21 08:03:39 UTC 2022
           Final Date: Wed Oct 20 08:03:38 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [7a:3b:6f:c2:ff:79:fe:f5:38:6d:0e:33:18:0d:bb:c3:a7:6b:d4:0d],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 4a1c96037890c623cf6559983de47c929eb5f352
                       67e8eb49b2fb7d72032b9fb211afe836ceff4577
                       4152ddd3fbc2b2d0b16d35c7288f95e6fd2ecf33
                       f1a65b591bb0e8348ff4c2145423690611cfa243
                       cf9231f3ecaa59d8fecb47c4aa6f0104ad754b4c
                       0a5b4d97280407a9b979a643356cb1725551f4b1
                       966ae452c5713925f3c886df3a28d96501fabf7e
                       342da0f688dfd79f2388797f9a2ce31685fb0db2
                       8bf09adf0eeec0875ebe09f26cb696e24d4bbc87
                       20eae0b9f17e7ca76c0a157603dd601f31ad46a4
                       15f9cfa66faa2a499c617077d08705afa46d4c35
                       d03aca0ea3d08d6e6b1bafd61b17f4ab69423984
                       4d12b591974ab1ebc80b41ed910973696e89f59a
                       1eb351d1f71092d052c091decf944eb88e7ac520
                       6ebb0fe3eff89971099135a94d6148b3631f7e0a
                       9668feb52c32f00779ddb40658ef5a1a589d2267
                       76f724bb29cf4fe4453a13d88ef927bde8ddab43
                       07804e601ba34a24b9ac340e0a5384b8eae83e0d
                       4cf7889482aa9a0320352b9b0546e484eab2fdc5
                       0fd47ed4
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [46:d6:7c:74:39:cd:4a:ab:20:ff:c8:bd:8d:2d:22:09:e3:96:e3:94],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

] 
2022-10-21 10:00:21.418  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-10-21 10:00:21.421 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-10-21 10:00:21.422 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-10-21 10:00:21.423 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-10-21 10:00:21.423  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-10-21 10:00:21.424  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-10-21 10:00:21.424  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-10-21 10:00:21.425 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-10-21 10:00:21.425 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-10-21 10:00:21.425 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-10-21 10:00:21.429 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-10-21 10:00:21.430 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-21 10:00:21.430 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-10-21 10:00:21.430 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-21 10:00:21.551  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-10-21 10:00:21.552  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-10-21 10:00:21.553 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-10-21 10:00:21.554 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-10-21 10:00:21.559  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-10-21 10:00:21.560  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-10-21 10:00:21.561 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-21 10:00:21.562 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-21 10:00:21.563 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-21 10:00:21.564 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-21 10:00:21.564 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-21 10:00:21.564 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-21 10:00:21.565 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-10-21 10:00:21.565 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-10-21 10:00:21.566 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-10-21 10:00:21.566 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-10-21 10:00:21.569 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 696443217748555416225095593515302713360034442723
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Oct 21 08:03:39 UTC 2022
           Final Date: Wed Oct 20 08:03:38 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [7a:3b:6f:c2:ff:79:fe:f5:38:6d:0e:33:18:0d:bb:c3:a7:6b:d4:0d],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 4a1c96037890c623cf6559983de47c929eb5f352
                       67e8eb49b2fb7d72032b9fb211afe836ceff4577
                       4152ddd3fbc2b2d0b16d35c7288f95e6fd2ecf33
                       f1a65b591bb0e8348ff4c2145423690611cfa243
                       cf9231f3ecaa59d8fecb47c4aa6f0104ad754b4c
                       0a5b4d97280407a9b979a643356cb1725551f4b1
                       966ae452c5713925f3c886df3a28d96501fabf7e
                       342da0f688dfd79f2388797f9a2ce31685fb0db2
                       8bf09adf0eeec0875ebe09f26cb696e24d4bbc87
                       20eae0b9f17e7ca76c0a157603dd601f31ad46a4
                       15f9cfa66faa2a499c617077d08705afa46d4c35
                       d03aca0ea3d08d6e6b1bafd61b17f4ab69423984
                       4d12b591974ab1ebc80b41ed910973696e89f59a
                       1eb351d1f71092d052c091decf944eb88e7ac520
                       6ebb0fe3eff89971099135a94d6148b3631f7e0a
                       9668feb52c32f00779ddb40658ef5a1a589d2267
                       76f724bb29cf4fe4453a13d88ef927bde8ddab43
                       07804e601ba34a24b9ac340e0a5384b8eae83e0d
                       4cf7889482aa9a0320352b9b0546e484eab2fdc5
                       0fd47ed4
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [CONTEXT 0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [9d:a4:31:67:2f:41:b9:9b:5f:70:84:ed:49:b3:82:20:ac:db:a1:02],[56:66:d1:a4]
        modulus: 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
public exponent: 10001

]